New Alpha Release: Tor Browser 13.0a5 (Android, Windows, macOS, Linux)
Tor Browser 13.0a5 is now available from the Tor Browser download page and also from our distribution directory.
This release updates Firefox to 115.3.0esr, including bug fixes, stability improvements and important security updates. Android-specific security updates from Firefox 118 are not yet available, but will be part of the next alpha release scheduled for next week.
Major Changes
This is our fifth alpha release in the 13.0 series which represents a transition from Firefox 102-esr to Firefox 115-esr. This builds on a year's worth of upstream Firefox changes, so alpha-testers should expect to run into issues. If you find any issues, please report them on our gitlab or on the Tor Project forum.
We are in the middle of our annual esr transition audit, where we review Mozilla's year's worth of work with an eye for privacy and security issues that would negatively affect Tor Browser users. This will be completed before we transition the 13.0 alpha series to stable. At-risk users should remain on the 102-esr based 12.5 stable series which will continue to receive security updates until 13.0 alpha is promoted to stable.
Build Output Naming Updates
As a reminder from the 13.0a3 release post, we have made the naming scheme for all of our build outputs mutually consistent. If you are a downstream packager or in some other way download Tor Browser artifacts in scripts or automation, you will have a bit more work to do beyond bumping the version number once the 13.0 alpha stabilizes. All of our current build outputs can be found in the distribution directory
Known Issues
All Platforms
The Snowflake pluggable-transport is no longer working for some users due to cdn.sstatic.net resolving to a Cloudflare IP rather than a Fastly one. As a result, the domain fronting functionality required by the Snowflake pluggable-transport no longer works and users will not be able to use it to connect to tor on versions of Tor Browser older than 13.0a5.
For now, this can be worked around by using custom Snowflake bridge lines with an updated fronting domain. Directions on how to do this can be found on this post on the tor forum:
This issue is being tracked here and is fixed in 13.0a5 and will also be fixed in the next stable release. Users who rely on Snowflake for Tor connectivity will not be able to bootstrap and update their Tor Browser instance without the aforementioned manual workaround.
Desktop
The automatic censorship circumvention system is also currently failing due to the same domain-fronting issue affecting snowflake. As a workaround, users can set the extensions.torlauncher.bridgedb_front
preference to foursquare.com
in Tor Browser's about:config page.
This issue is being tracked here and will be fixed in the next stable and alpha releases.
Full changelog
The full changelog since Tor Browser 13.0a4 is:
- All Platforms
- Updated Translations
- Updated OpenSSL to 3.0.11
- Updated tor to 0.4.8.6
- Bug tor-browser#40938: Migrate remaining torbutton functionality to tor-browser
- Bug tor-browser#41327: Disable UrlbarProviderInterventions
- Bug tor-browser#42026: Disable cookie banner service and UI.
- Bug tor-browser#42094: Disable media.aboutwebrtc.hist.enabled as security in-depth
- Bug tor-browser#42112: Rebase alpha to 115.3.0esr
- Bug tor-browser#42120: Use foursquare as domain front for snowflake
- Windows + macOS + Linux
- Updated Firefox to 115.3.0esr
- Bug tor-browser-build#40893: Update (Noto) fonts for 13.0
- Bug tor-browser#41639: Fix the wordmark (title and background) of the "About Tor Browser" window
- Bug tor-browser#41822: The default browser button came back on 115
- Bug tor-browser#41864: TOR_CONTROL_HOST and TOR_SOCKS_HOST do not work as expected when the browser launches tor
- Bug tor-browser#41903: The info icon on the language change prompt is not shown
- Bug tor-browser#41957: Revert to Fx's default identity block style for internal pages
- Bug tor-browser#41958: Console error when closing tor browser with about:preferences open
- Bug tor-browser#41986: Fix the control port password handling
- Bug tor-browser#42037: Disable about:firefoxview
- Bug tor-browser#42073: Add simplified onion pattern to the new homepage
- Bug tor-browser#42079: TorConnect: handle switching from Bootstrapped to Configuring state
- Bug tor-browser#42083: RemoteSecuritySettings.init throws error in console
- Bug tor-browser#42091: Onion authorization prompt overflows
- Bug tor-browser#42092: Onion services key table display problems.
- Bug tor-browser#42102: TorProcess says the SOCKS port is not valid even though it is
- Bug tor-browser#42110: Add a utility module for shared UI methods needed for several tor browser components
- Windows
- Bug tor-browser#41798: Stop building private_browsing.exe on Windows
- macOS
- Bug tor-browser#42078: Implement MacOS application icons
- Linux
- Bug tor-browser#42088: Implement Linux application icons
- Android
- Updated GeckoView to 115.3.0esr
- Bug tor-browser#42089: Disable Mozilla 1805450
- Bug tor-browser#42122: Fix crash due to bad android deprecation and APIs
- Build System
- Windows + macOS + Linux
- Bug tor-browser-build#40956: Allow testing the updater also with release and alpha channel
- Windows
- Bug tor-browser#41995: Generated headers on Windows aren't reproducible
- Windows + macOS + Linux
Comments
We encourage respectful, on-topic comments. Comments that violate our Code of Conduct will be deleted. Off-topic comments may be deleted at the discretion of the moderators. Please do not comment as a way to receive support or to report bugs on a post unrelated to a release. If you are looking for support, please see our FAQ, user support forum or ways to get in touch with us.