Tor is free and open network software that helps you protect against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and national security known as traffic analysis.
Tor is a virtual tunnel network that allows people and groups to increase their privacy and security on the Internet. It also allows software developers to create new communication tools with built-in privacy features. Tor provides the basis for a variety of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to prevent websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet provider. Tor’s hidden service allows users to publish websites and other services without needing to reveal the site’s location. Individuals also use Tor for socially sensitive communications: chat rooms and web forums for survivors of rape and abuse, or people with illnesses.
Journalists use Tor to communicate more securely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home websites when they are in a foreign country, without telling everyone around that they work with the organization.
Groups like Indymedia recommend Tor to maintain the privacy and online safety of their members. Activist groups such as the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for safeguarding civil liberties online. Companies use Tor as a safe way to conduct competition analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and time of communication. Where do employees work overtime? Which locations lead employees to consult job seeker websites? Which research division communicates with the company’s patent attorneys?
The US Navy branch uses Tor for open source intelligence gathering, and one of its teams used Tor while stationed in the Middle East recently. Law enforcement uses Tor to visit or monitor websites without leaving government IP addresses in their web logs, and for security during attack operations.
Our old screen had too much information for users, causing many of them to spend a lot of time confused about what to do. Some users on the paper experiment spent up to 40 minutes confused about what to do here. Apart from simplifying screens and messages, to make it easier for users to know if they need to configure something or not, we also did a ‘brand refresh’ by bringing our logo to the launcher.
Sensor circumvention configuration
This is one of the most important steps for users trying to connect to Tor while their network is censoring Tor. We also worked really hard to make sure the UI text would make it easier for users to understand what the bridge is for and how to configure it to use it. Another update is a little tip we added in the drop-down menu (as you can see below) for which bridge to use in countries that have very advanced censorship methods.
Proxy help information
The proxy settings in our Tor Launcher configuration wizard are an essential feature for users under a network demanding such configuration. But it can also cause a lot of confusion if the user doesn’t know what a proxy is. Since this is such a very important feature to users, we decided to keep it in the main configuration screen and introduced a help prompt with an explanation of when someone would need the configuration.
As part of our work with the UX team, we will also be coordinating user testing of this new UI to keep iterating and making sure we are always improving our user experience. We’re also planning a series of improvements not only to the Tor Launcher flow but to the overall browser experience (once you’re connected to Tor) including a new user-oriented stream. And last but not least, we streamlined our mobile and desktop experiences: Tor Browser 7.5 adapted the security slider design we did for mobile, bringing a better user experience to desktops too.
- We are shipping the first release in the 0.3.2 Tor, 0.3.2.9 series. This release includes support for Next Generation Onion Services.
- On the security side, we enabled content sandboxing in Windows and fixed a lingering issue on Linux that prevented printing to files from working properly. Additionally, we improved compiler hardening on macOS and fixed holes in W ^ X mitigation in Windows.
- We ended up moving away from Gitian / tor-browser-bundle as the base reproducible build environment. Over the last few weeks and months the rbm / tor-browser-build has been developed to make it easier to reproduce Tor Browser builds and add reproducible builds for new platforms and architectures. This will allow us to ship a 64bit bundle for Windows (currently in the alpha series available) and a bundle for Android on the same day as the release for the current platform / architecture.
Tor Browser 9.5.3 is now available from the Tor Browser download page as well as from our distribution directory. This release updates Firefox to 68.11.0esr, NoScript to 11.0.34, and Tor to 0.4.3.6.
Additionally, this release features important security updates for Firefox.
The complete list of changes since Tor Browser 9.5.1 is:
- Update Firefox to 68.11.0esr
- Update NoScript to 11.0.34
- Update Tor to 0.4.3.6
- Open about: config
- If the “Value” column says “true”, right click and select “Toggle” so it is now disabled or double click on the row and the row will be disabled.
The complete list of changes since Tor Browser 9.0.5 is:
- Update Firefox to 68.6.0esr
- Bump NoScript to 11.0.15
- Bug 33430: Disable downloadable fonts at the Safest security level
Build Windows System
- Bug 33535: Patch openssl to use SOURCE_DATE_EPOCH for copyright year
Source link : https://www.techspot.com/downloads/5184-tor-browser-for-mac.html