Malicious relays and the health of the Tor network
In this post, we'll explain what we do to fight malicious relays in our network, how we did in the past, and what further improvements are upcoming and being worked on.
In this post, we'll explain what we do to fight malicious relays in our network, how we did in the past, and what further improvements are upcoming and being worked on.
In this post, we want to share a little bit of Tor Browser history with you, the origins of our features and designs, and how many of our innovative privacy and security features have been adopted by other browsers.
Tor Browser 10.5a11 is now available from the Tor Browser Alpha download page and also from our distribution directory.
Tor Browser 10.5a6 is now available from the Tor Browser Alpha download page and also from our...
Tor Browser 10.5a4 is now available from the Tor Browser Alpha download page and also from our...
Maintaining a browser like Tor Browser has its challenges but also its rewards. It allows us to...
In the past few years, a technique called browser fingerprinting has received a lot of attention because of the risks it can pose to privacy. What is it? How is it used? What is Tor Browser doing against it? In this blog post, I’m here to answer these questions.
Due to a mistake in Mozilla's signing infrastructure, NoScript and all other Firefox extensions...
Tor Browser 8.0.4 is now available from the Tor Browser Project page and also from our...
Tor Browser 8.5a6 is now available from the Tor Browser Project page and also from our...