New Release: Tor Browser 10

by sysrqb | September 22, 2020

Update 1700 UTC 2020-09-24: After investigating the error seen by Windows users while playing videos on Youtube, a user helped us identify the cause. Until this is fixed in an upcoming release, a workaround is setting media.rdd-opus.enabled as false in about:config.

The new shiny Tor Browser 10 for Desktop is now available from the Tor Browser download page and also from our distribution directory!

Android Tor Browser 10 is under active development and we are supporting the current 9.5 series for Android until the new one is ready. We are informed by Mozilla of any issues they learn about affecting the 9.5 series. We expect to release the new Tor Browser for Android based on Fenix in the following weeks.

Tor Browser 10 ships with Firefox 78.3.0esr, updates NoScript to 11.0.44, and Tor to 0.4.4.5. This release includes important security updates to Firefox.

This new Tor Browser release is focused on stablizing Tor Browser based on a new extended support release of Mozilla Firefox. Tor Browser 10.0 is the first stable release of the 10.0 series based on Firefox 78esr.

Note: Tor Browser 10.0 is the final Tor Browser series supporting CentOS 6. Beginning with the 10.5 series, CentOS 6 is not supported.

Note: In this release JavaScript is controlled by NoScript again. JavaScript was completely disabled on the Safest security level beginning in Tor Browser 9.0.7. The Firefox preference javascript.enabled is reset to true in this release. You must re-set it as false if that is your preference.

Give Feedback

If you find a bug or have a suggestion for how we could improve this release, please let us know. Thanks to all of the teams across Tor, and the many volunteers, who contributed to this release.

Full Changelog

The full changelog since Tor Browser 9.5.4 is:

  • Windows + OS X + Linux
    • Update Firefox to 78.3.0esr
    • Update Tor to 0.4.4.5
    • Update Tor Launcher to 0.2.25
      • Bug 32174: Replace XUL <textbox> with <html:input></html:input></textbox>
      • Bug 33890: Rename XUL files to XHTML
      • Bug 33862: Fix usages of createTransport API
      • Bug 33906: Fix Tor-Launcher issues for Firefox 75
      • Bug 33998: Use CSS grid instead of XUL grid
      • Bug 34164: Tor Launcher deadlocks during startup (Firefox 77)
      • Bug 34206: Tor Launcher button labels are missing (Firefox 76)
      • Bug 40002: After rebasing to 80.0b2 moat is broken
      • Translations update
    • Update NoScript to 11.0.44
      • Bug 40093: Youtube videos on safer produce an error
    • Translations update
    • Bug 10394: Let Tor Browser update HTTPS Everywhere
    • Bug 11154: Disable TLS 1.0 (and 1.1) by default
    • Bug 16931: Sanitize the add-on blocklist update URL
    • Bug 17374: Disable 1024-DH Encryption by default
    • Bug 21601: Remove unused media.webaudio.enabled pref
    • Bug 30682: Disable Intermediate CA Preloading
    • Bug 30812: Exempt about: pages from Resist Fingerprinting
    • Bug 31918+33533+40024+40037: Rebase Tor Browser esr68 patches for ESR 78
    • Bug 32612: Update MAR_CHANNEL_ID for the alpha
    • Bug 32886: Separate treatment of @media interaction features for desktop and android
    • Bug 33534: Review FF release notes from FF69 to latest (FF78)
    • Bug 33697: Use old search config based on list.json
    • Bug 33721: PDF Viewer is not working in the safest security level
    • Bug 33734: Set MOZ_NORMANDY to False
    • Bug 33737: Fix aboutDialog.js error for Firefox nightlies
    • Bug 33848: Disable Enhanced Tracking Protection
    • Bug 33851: Patch out Parental Controls detection and logging
    • Bug 33852: Clean up about:logins to not mention Sync
    • Bug 33856: Set browser.privatebrowsing.forceMediaMemoryCache to True
    • Bug 33862: Fix usages of createTransport API
    • Bug 33867: Disable password manager and password generation
    • Bug 33890: Rename XUL files to XHTML
    • Bug 33892: Add brandProductName to brand.dtd and brand.properties
    • Bug 33962: Uplift patch for bug 5741 (dns leak protection)
    • Bug 34125: API change in protocolProxyService.registerChannelFilter
    • Bug 40001: Generate tor-browser-brand.ftl when importing translations
    • Bug 40002: Remove about:pioneer
    • Bug 40002: Fix generateNSGetFactory being moved to ComponentUtils
    • Bug 40003: Adapt code for L10nRegistry API changes
    • Bug 40005: Initialize the identity UI before setting up the circuit display
    • Bug 40006: Fix new identity for 81
    • Bug 40007: Move SecurityPrefs initialization to the StartupObserver component
    • Bug 40008: Style fixes for 78
    • Bug 40017: Audit Firefox 68-78 diff for proxy issues
    • Bug 40022: Update new icons in Tor Browser branding
    • Bug 40025: Revert add-on permissions due to Mozilla's 1560059
    • Bug 40036: Remove product version/update channel from #13379 patch
    • Bug 40038: Review RemoteSettings for ESR 78
    • Bug 40048: Disable various ESR78 features via prefs
    • Bug 40059: Verify our external helper patch is still working
    • Bug 40066: Update existing prefs for ESR 78
    • Bug 40066: Remove default bridge 37.218.240.34
    • Bug 40073: Disable remote Public Suffix List fetching
    • Bug 40073: Repack omni.ja to include builtin HTTPS Everywhere
    • Bug 40078: Backport patches for bug 1651680 for now
    • Bug 40082: Let JavaScript on safest setting handled by NoScript again
    • Bug 40088: Moat "Submit" button does not work
    • Bug 40090: Disable v3 add-on blocklist for now
    • Bug 40091: Load HTTPS Everywhere as a builtin addon
    • Bug 40102: Fix UI bugs in Tor Browser 10.0 alpha
    • Bug 40106: Cannot install addons in full screen mode
    • Bug 40109: Playing video breaks after reloading pages
    • Bug 40119: Enable v3 extension blocklisting again
  • Windows
    • Bug 33855: Don't use site's icon as window icon in Windows in private mode
    • Bug 40061: Omit the Windows default browser agent from the build
  • OS X
    • Bug 32252: Tor Browser does not display correctly in VMWare Fusion on macOS (mojave)
  • Build System
    • Windows + OS X + Linux
      • Bump Go to 1.14.7
      • Bug 31845: Bump GCC version to 9.3.0
      • Bug 34011: Bump clang to 9.0.1
      • Bug 34014: Enable sqlite3 support in Python
      • Bug 34390: Don't copy DBM libraries anymore
      • Bug 34391: Remove unused --enable-signmar option
      • Bug 40004: Adapt Rust project for Firefox 78 ESR
      • Bug 40005: Adapt Node project for Firefox 78 ESR
      • Bug 40006: Adapt cbindgen for Firefox 78 ESR
      • Bug 40037: Move projects over to clang-source
      • Bug 40026: Fix full .mar creation for esr78
      • Bug 40027: Fix incremental .mar creation for esr78
      • Bug 40028: Do not reference unset env variables
      • Bug 40031: Add licenses for kcp-go and smux.
      • Bug 40045: Fix complete .mar file creation for dmg2mar
      • Bug 40065: Bump debootstrap-image ubuntu_version to 20.04.1
      • Bug 40087: Deterministically add HTTPS Everywhere into omni.ja
    • Windows
      • Bug 34230: Update Windows toolchain for Firefox 78 ESR
      • Bug 40015: Use only 64bit fxc2
      • Bug 40017: Enable stripping again on Windows
      • Bug 40052: Bump NSIS to 3.06.1
      • Bug 40061: Omit the Windows default browser agent from the build
      • Bug 40071: Be explicit about no SEH with mingw-w64 on 32bit systems
      • Bug 40077: Don't pass --no-insert-timestamp when building Firefox
      • Bug 40090: NSIS 3.06.1 based builds are not reproducible anymore
    • OS X
      • Bug 34229: Update macOS toolchain for Firefox 78 ESR
      • Bug 40003: Update cctools version for Firefox 78 ESR
      • Bug 40018: Add libtapi project for cctools
      • Bug 40019: Ship our own runtime library for macOS
    • Linux
      • Bug 34359: Adapt abicheck.cc to deal with newer GCC version
      • Bug 34386: Fix up clang compilation on Linux
      • Bug 40053: Also create the langpacks tarball for non-release builds

Comments

Please note that the comment area below has been archived.

September 22, 2020

Permalink

I love Tor and ten is my lucky number! Can't wait to see android get some updates too! :)

September 22, 2020

Permalink

Were there any changes to browser size rounding? 10.0 is opening at 999x499 for me, if maximized it's 1198x599. This is viewport size as reported by websites.

However everything is also quite zoomed-in by default, I've checked Preferences and the zoom setting claims "100%". But judging by the actual browser size in terms of native OS pixels the zoom is about 125%. The OS is not using any kind of resolution scaling or anything similar, everything is at native resolution.

This is on Linux.

I'm also wondering about this. I love the scaling, it's easier on the eyes, but I'm wondering about it maximizing and why there isn't anything in the changelog about it. Is maximizing the browser no longer a problem? Linux here too.

Does not work for torbrowser-launcher 3.2 in ubuntu. Torbrowser-launcher is steadfastly plagued with update issues. Developer not competent? Bad image for torproject team. Torbrowser-launcher from ubuntu software manager is how majority install tor browser.

September 23, 2020

In reply to gk

Permalink

If it's not maintained properly then why don't you fork it and make it an official one? There already seems to be tor developers helping to maintain it (intrigeri)
It supports AppArmor profiles on Debian/Ubuntu by default and feels a lot better than to launch a commonly used system application from an ugly folder all the time. You maintain a more legit app on Android/F-Droid at this point than desktop, you absolutely should fork this imo if you're having trouble with the current maintainer.

September 22, 2020

Permalink

long time bug ubuntu. noscript and httpseverywhere plugin icons do not show top right. version 9 and 10 tbb.

This applies to NoScript (and HTTPS Everywhere):

The noscript icon was removed from the location bar intentionally, as part of Tor Browser's security controls redesign:
https://gitweb.torproject.org/tor-browser-spec.git/tree/proposals/101-s…
boklm

[...] and there are risks that you make changes in its settings that make you stand out of Tor Browser users. Tor Browser users should not need to mess with NoScript at all. But you are of course free to add it back to your toolbar if you feel more comfortable that way.
gk

To add it back:
Click The Firefox menu button, select "Customize" (screenshot and button image from Firefox help)
Customize menu
Right-click and select "Add to toolbar", or drag them to the desired places yourself.

Those icons were hidden a long time ago. If you need them, then open "Customize..." and drag them onto the toolbar. Modifying the settings of those add-ons may make your browsing activity unique however, so it's recommended to use the security level icon instead.

To be fair NoScript needs to be there in the Safest mode. When people click it there should be a small warning to tell people that enabling Javascript on a per domain basis might be used to fingerprint you.

I only say this because at a seminar I went to virtually someone was teaching people JS tactics to use for some sites. Everyone who attended this virtual seminar will revert to using the same tactics, thus they would likely be indistinguishable from each other.

The NoScript & HTTPS-Everywhere plugin-icons were removed from the URL-bar,

To reinstate them, Click Menu, click Customize,

Then left-click and hold button down on the NoScript icon,
and then drag it to the URL-bar and drop it (release the mouse button).

...

September 22, 2020

Permalink

Tor 10, unlike Firefox ESR 78.3, does not have telemetry or unwanted connections to hosts such as firefox.services.settings.mozilla.org among many others. It would be great if you create a guide or a patch to remove those connections for Firefox ESR users.

September 23, 2020

In reply to sysrqb

Permalink

If i use only TOR_TRANSPROXY=1, i have error "The proxy server is refusing connections"
If i use TOR_SKIP_LAUNCH=1 and TOR_TRANSPROXY=1 i have "Hmm. We’re having trouble finding that site." No internet access.

9 version work perfect. But after update i have this trouble.
OS Windows 10

Thanks for the information, I already had the steps of the Mozilla guide and I have not managed to eliminate all the connections. firefox.settings.services.mozilla.com continues making connections even after adding it to the host list, other connections not mentioned in the guide are made like location.services.mozilla.com, push.services.mozilla.com, among other.

The very best:*wtf*

firefox.settings.services.mozilla.com
Firefox connects to firefox.settings.services.mozilla.com. You cannot disable this. Your only recourse is to block access to this host in your "hosts" file by putting in this line:
127.0.0.1 firefox.settings.services.mozilla.com

That's right, there is no way to disable this. The only way is by adding to the host list of the operating system. In my case it has not worked and Firefox continues to do so. In Wireshark I see that 2 DNS requests are made and the corresponding responses are received. 4 IP addresses belonging to AWS are associated, these IP addresses are not always the same.

September 22, 2020

Permalink

Youtube now gives this error now when starting a video after the new update.

An error occurred. Please try again later.

September 22, 2020

Permalink

Hi,
I have been having issues with updating tor. It started with me not realizing that it needed an update. I recognize this as my fault and I tried to fix it but as I tried I feel like it just got worse and worse. At first I tried the classic uninstall and redownload method but that didn't work. First off for some reason the tor browser installer kept saying "The destination directory already exists. You can try to upgrade the Tor Browser Bundle, but if you run into any problems, use a new directory instead Continue?". Even when I clicked yes my antivirus software would say that the firefox.exe was a high level threat so at first I ignored it but even when I did I would run into the problem of the tor browser saying "Tor Browser is already running, but is not responding. The old Tor Browser process must be closed to open a new window.". Now I know that Firefox was ok but my antivirus didn't like so I am not sure what to do. I have checked every last square inch of my files even when I delete all mentions of it will continue to say "The destination directory already exists. You can try to upgrade the Tor Browser Bundle, but if you run into any problems, use a new directory instead Continue?". Now even when I say yes it pops up in the middle of the download saying that it couldn't open the files for writing. I don't know what's going on all I know is I cant get into tor because I didn't know that I myself had to prompt it to update which is what caused all of this. I need help is the message I am trying to get across.
Thank you for your time.

Try rebooting (I know, not very good advice), and you can delete the current directory and then re-install Tor Browser using the installer. However, before you try this, first please try using the built-in automatic updater (open the Help menu, then click About Tor Browser).

September 23, 2020

In reply to sysrqb

Permalink

That is actually the correct suggestion, the user has a background Tor process running and rebooting is the quickest solve to dismiss it. After reboot, the user should NOT start Tor again but instead uninstall at that time, then reboot again, then reinstall fresh.

September 22, 2020

Permalink

This broke torbrowser-launcher (SO ANNOYNING! Not the first time this happens...)
Unable to use tor browser, it errors with "I'm being attacked"...

Yeah, i have the same problem. I've done a fresh install of Ubuntu 20.04.1 and try to install Tor. I'm stuck in installing window with error I'm being attacked. I left the installing run for several minutes but it didn't finish.

September 22, 2020

Permalink

Instead of loading some well-known .com site, Tor browser shows:

Onionsite Has Disconnected
Browser
Network
Onionsite

The most likely cause is that the onionsite is offline. Contact the onionsite administrator.

Details: 0xF2 — Introduction failed, which means that the descriptor was found but the service is no longer connected to the introduction point. It is likely that the service has changed its descriptor or that it is not running.

September 23, 2020

In reply to sysrqb

Permalink

It happened just one time. Probably, related to alt-svc. What else could it be...

September 22, 2020

Permalink

All tabs closed. A lot of new connections to addresses like cflares35lvdlczhy3r6qbza5jjxbcplzvdveabhf7bsp7y4nzmn67yd.onion
continue to have a sex with my PC (approx. 2 per second).
What the hell?

September 23, 2020

In reply to sysrqb

Permalink

Since cloudflare sites offers alt-svc, with TBB endless rotating cloudflare-onion-addresses are 'normal.'

September 23, 2020

In reply to sysrqb

Permalink

> I can't reproduce this. Are you still seeing this issue?

Yes. This is something very new to TB10, I have never experienced this issue on previous releases. Let me be clear, this is running TB10 on Linux, I am not using TAILS.

I can use DDG only via clearnet HTTPS but not via .onion. Something has changed. Hmmmm?

September 22, 2020

Permalink

Norton stopped the latest download of Tor Update 10, saying unsafe. Now I cannot even access Tor. Please advise asap.

Some antivirus software will pop up malware and/or vulnerability warnings when Tor Browser is launched. If you downloaded Tor Browser from our main website or used GetTor, and verified it, these are false positives and you have nothing to worry about. Some antiviruses consider that files that have not been seen by a lot of users as suspicious. To make sure that the Tor program you download is the one we have created and has not been modified by some attacker, you can verify Tor Browser's signature. You may also want to whitelist certain processes to prevent antiviruses from blocking access to Tor Browser.
ijpaagiacu.tudasnich.de

By the way, you can be updating automatically from within Tor Browser, if you aren't already.

September 22, 2020

Permalink

The browser up date was interrupted by my computer crashing due to printing a document. When I restarted the computer I can no longer open up Tor. I have tried many things including a backup restore. My question is, if I download the newest version of Tor, will it delete my bookmarks, etc. I really don't want everything gone. I can not find where to upgrade the browser bundle.

September 24, 2020

In reply to sysrqb

Permalink

This has happened to me before. When the computer crashed it corrupted omni.ja or addonStartup.json.lz4 if I remember correctly, preventing the browser from starting. Also what happens frequently is, the browser opens but comes up with half the stuff not loaded and requires a second load to open correctly, though this is a long standing issue.

Tor Browser is based on Firefox, so for things like bookmarks that aren't related to Tor, search for how to solve it in Firefox.

For your problem,

  1. With Tor Browser closed, backup (copy) your places.sqlite file, which contains your bookmarks, to a directory (folder) outside of your Tor Browser directory. It is found in the directory where you installed Tor Browser. For example, /tor-browser_en-US/Browser/TorBrowser/Data/Browser/profile.default/
  2. If you don't have your installer for 9.5.4, download it from https://archive.torproject.org/tor-package-archive/torbrowser/9.5.4/ Choose the correct installer for your OS, architecture (64 or 32 bit), and language. You might need 9.5.4 because your places.sqlite file might work only with 9.5.4.
  3. At this point, you could try one of two things. Either you could try installing 9.5.4 over your existing Tor Browser directory, which will overwrite files essential to run Tor Browser, or you could delete your existing Tor Browser directory and install a new clean copy of 9.5.4.
  4. Next, open Tor Browser. Configure it if necessary. Do you see your bookmarks in the browser? You might see them if you tried to install over your existing installation.
  5. If your bookmarks are not there, close Tor Browser as quickly as possible. Do not open the browser just yet because it might start updating to 10.0 when you open, and your places.sqlite file might work only with 9.5.4. Copy your backup of places.sqlite into your Tor Browser directory, overwriting the places.sqlite that is there. Then, open Tor Browser. You should see your bookmarks in the browser now.

If you installed 9.5.4 over your existing installation, then once Tor Browser is running and you see your bookmarks in the browser, I strongly suggest that you properly export your bookmarks to an HTML file as explained here https://ijpaagiacu.tudasnich.de/tbb/export-and-import-bookmarks/ and write down any "etc." things as you said in your post. Then, delete your existing Tor Browser directory. Install a new clean copy of 10.0. And finally, import your HTML bookmarks into your new clean 10.0.

Pro tip: Always backup (export) your bookmarks and custom settings before you update in case something breaks in the process of updating.

September 22, 2020

Permalink

I updated, but it says "The bookmarks and history system will not be functional because one of Tor Browser's files is in use by another application. Some security software can cause this problem." I also can't browse on Tor anymore, and it always says "Secure Connection Failed An error occurred during a connection to [site]. security library failure. Error code: SEC_ERROR_LIBRARY_FAILURE"

Please help with the fix?

> "The bookmarks and history system will not be functional because one of Tor Browser's files is in use by another application. Some security software can cause this problem."

Possible solution:
https://ocewjwkdco.tudasnich.de/comment/289228#comment-289228
But that problem continued in 9.5.4 and 10.0, so this Tor blog post needs a note added to it.

Exactly this error is happening on my system. I've restarted and tried reinstalling TOR but it's made no difference. Started to happen following the update. TOR was working ok before the update.

September 22, 2020

Permalink

Starting with Tor Browser 10 on Ubuntu NoScript is now preventing videos from playing if they are visited directly e.g. https://example.com/video.mp4

NoScript ignores any attempt to allow the media to play and changing Tor Browser's security level has no effect.

This seams to only apply to directly linked media from a remote server, embedded media still play normally, and local files also play normally.

Just to add to this. Directly visited videos seem to briefly start playing before showing the NoScript blocked icon. Seems counterintuitive? Though this is not a new thing.

September 22, 2020

Permalink

media.videocontrols.picture-in-picture.enabled; true

Picture-in-picture blue icon appears over the right side of videos played in safer mode. It never appeared in older versions. None of the bugs reference it. Is picture-in-picture considered safe now, or was it overlooked in this release?

September 22, 2020

Permalink

You removed Enhanced Tracker Protection and DNT options from normal Firefox browser. This is very bad, allowing anyone to distinguish Firefox+Tor or TorBrowser.

Add back ETP like normal Firefox has.

September 24, 2020

In reply to sysrqb

Permalink

Sysrqb, thanks for commenting. The first part of his request is actually valid, please don't dismiss it by rightfully faulting his last words.
TorBrowser has the User-Agent of Firefox, so by design it needs to blend in with the Firefox signatures. If now TorBrowser differs more (like he claims), it needs to be investigated and addressed ASAP. Would you be so kind to open the ticket for the issue?
Thanks.

When experienced users of Tor Browser talk about distinguishing, it's usually in comparison to other users of Tor Browser. It is definitely not in comparison to normal web browsers because those are not designed to remain as identical as possible, and they start their traffic on the regular Internet. When you customize options like those compared to other users in the Tor network, you don't protect yourself from trackers. You make your Tor Browser more distinguishable from other Tor Browsers. Remember, Tor Browser does not operate starting on the regular Internet but through the Tor network. Tor Browser is designed to attempt to blend in with all of the other Tor Browsers coming out of the exit nodes as you are at the same time.

DNT: https://ocewjwkdco.tudasnich.de/comment/283701#comment-283701

Enhanced Tracking Protection is a third-party blocklist managed by Disconnect.me:
https://blog.mozilla.org/blog/2019/06/04/firefox-now-available-with-enh…
https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firef…
https://2019.sedvblmbog.tudasnich.de/docs/faq.html.en#TBBOtherExtensions
https://2019.sedvblmbog.tudasnich.de/projects/torbrowser/design/#philosophy

September 22, 2020

Permalink

Disable:

Always check if Tor Browser is your default browser
Recommend extensions as you browse
Recommend features as you browse
Show alerts about passwords for breached websites
Prevent accessibility services from accessing your browser

September 22, 2020

Permalink

XML Parsing Error: undefined entity
Location: chrome://browser/content/browser.xhtml
Line Number 1317, Column 7:

September 23, 2020

Permalink

Updated from 9.5.4 and browser no longer connects to the port set with TOR_CONTROL_PORT environment variable. Why is there no documentation of this change and how do I fix it?

September 23, 2020

Permalink

On Windows 10, it's not possible to load any website. Absolutely everything returns the "Secure Connection Failed" error.

September 23, 2020

Permalink

fullscreen mode of tube shows the real screen resolution, the letterboxing function doesn't work at this case.

September 23, 2020

Permalink

Hello, it's not possible to post in the tails blog post however the title is wrong it says version 4.10 instead of 4.11, I hope any admin who sees my message will fix this.

September 23, 2020

Permalink

We have detected that you have connected over Tor.There appears to be an issue with the exit node...
I get this massage constantly while using DDG Onion.
Is that a problem of DDG?
I am using the latest android version.

Does anybody else gets this message?

September 23, 2020

Permalink

How do you get wayland to work? Seems to be x11 by default.

MOZ_ENABLE_WAYLAND=1 doesn't help

September 23, 2020

Permalink

Letterboxing appears to still be producing temporary window sizes that don't comply to the divisible by 100 rule. For example while resizing a window, width and height can be all over the place. I expect this to leak information about the window manger in use.

Similar temporary sizes are produced when using "Find in This Page" (Ctrl+F), window menu (Alt), "Full Screen" (F11), or "Developer Tools".

  1. <br />
  2. window.onresize = function() {<br />
  3. document.body.innerHTML += "<br />" + Date.now() + ": " + window.innerWidth + " / " + window.innerHeight;<br />
  4. window.scrollTo(0, window.scrollMaxY);<br />
  5. };<br />

I run your js code on a localhost apache2 server. Interesting values all quite over the place:
1601986376300: 900 / 700 <- pressing strg+f
1601986395300: 900 / 676
1601986395300: 900 / 611
1601986395400: 900 / 608
1601986395400: 900 / 602
1601986395400: 900 / 600
1601986451800: 900 / 599
1601986451800: 900 / 598
1601986451900: 900 / 600
1601986451900: 900 / 598
1601986451900: 900 / 600
1601986452100: 900 / 599
But I'm not sure how this could reveal the window manger in use.

September 23, 2020

Permalink

Google and YouTube display a pop-up on European exit nodes for Alphabet Inc. privacy switches. Those links open new tabs to other Alphabet domains where the switches are. Will customizing those switches backfire and identify us across domains? Does Tor Project recommend users avoid those switches, or do the default preferences in Tor Browser nullify that possibility of backfiring?

September 23, 2020

Permalink

Picture-in-picture isn't working for me on macOS and linux. The button shows up (except on YouTube) and it expands when I hover over it but clicking does nothing. Is this known/is this supposed to happen?

September 23, 2020

Permalink

One more thing to take care of. When Android version is released, make sure that intl.locale.requested and intl.accept_languages are set to default values or can be changed and stay changed. That's something currently Fenix nightly won't do.

September 23, 2020

Permalink

just a heads-up; bug when browser is set to "Safest," javascript.enabled is still set to true in about:config. Tor Browser 10, non-alpha, linux

Yes, that was this note:
"""
Note: In this release JavaScript is controlled by NoScript again. JavaScript was completely disabled on the Safest security level beginning in Tor Browser 9.0.7. The Firefox preference javascript.enabled is reset to true in this release. You must re-set it as false if that is your preference.
"""

September 24, 2020

Permalink

What´s up with https-everywhere?
It may be in a built-in addon in omni.ja now, but it doesn´t work apparently. So many sites now open as http and you have to manually change them to https and there´s nothing indicating https-everywhere is present, which also mean you can´t force encryption. Tried Tor 9.54 with https-everywhere removed and that works exactly the same way. So https-everywhere seems not to work in Tor 10. Also tried to install https-everywhere manually but it is being removed and the xpi-file gets deleted.

September 24, 2020

Permalink

I can't remove HTTPS Everywhere since this new version, is there a reason to prohibit its removal? please add that option, I just removed NoScript tho.

September 24, 2020

Permalink

Browser size is not rounding properly, it's slightly off both in width and height (x99 or x98 instead of x00). I've tested this with various sites, including AmIUnique and TorZillaPrint, and compared it to 9.5.4 release which is always rounded to multiples of 100.

AmIUnique also reports that my canvas is unique. The displayed canvas is not just white anymore like in previous releases but filled with RGB lines.

I've tried running a fresh copy of the browser as well (i.e. not upgraded from older release but unpacked from tarball), and the issues persist. I'm not sure if it's safe to use the new release in terms of anonymity anymore, so I'd appreciate an answer from the team.

September 24, 2020

Permalink

Have you considered incorporating something similar to LocalCDN (but better), so people can use safest mode but also have websites work correctly? Thank you for this great release!

September 24, 2020

Permalink

17:47:20.059 [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIXPCComponents_Utils.readUTF8URI]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/L10nRegistry.jsm :: L10nRegistry.loadSync :: line 661" data: no] 2 L10nRegistry.jsm:661:19

September 24, 2020

Permalink

Thank you for writing those notes and the update workaround in the original blog post!! Good management right there.

September 24, 2020

Permalink

I updated, but it says "The bookmarks and history system will not be functional because one of Tor Browser's files is in use by another application. Some security software can cause this problem." I also can't browse on Tor anymore, and it always says "Secure Connection Failed An error occurred during a connection to [site]. security library failure. Error code: SEC_ERROR_LIBRARY_FAILURE"
i rebooted pc but nothing .. does not work.

September 24, 2020

Permalink

On upgrading to Tor 10, using Tor browser in transparent mode (i.e. TOR_TRANSPROXY=1) doesn't work.

I have a linux system that connects to the internet via a gateway running on a VM, so I don't use the tor proxy on the client VM. This client VM can no longer connect to the internet after the upgrade. Note that non-Tor browsers on this client machine CAN connect to the internet.

I tried re-installing Tor 10 with the same result. I re-installed Tor 9.5 and everything works ok. I have disabled upgrades because Tor 10 is currently unusable for me.

September 25, 2020

Permalink

I am confused, in this post you say "Bug 40016: Update Snowflake to discover NAT type", but Snowflake is still not available in the stable release?

September 26, 2020

Permalink

how to turn off animations/effects like it was with toolkit.cosmeticAnimations.enabled;false in previous version of firefox?

September 26, 2020

Permalink

browser.tabs.maxOpenBeforeWarn

Seems to be broken.

September 26, 2020

Permalink

Recently switched from Windows 10 to Ubuntu 20.04. Was able to download and use tor with just a minimal learning curve thing.

Tor updated. So did Ubuntu, to 20.04 LTS. Somewhere along the way, I can't access tor any longer. I have spent 4 days that I will never get back doing every damn trick that is out there in the blogs to make tor functional. I get bupkis.

Am I the only schlepp on the planet going through this? Or are there others just not bothering and using clearnet instead.

I'm new to Linux, to be sure. I also have buddies in the tor world that are really tech savvy and need to use little words for me. That said... I'm NOT imagining this. I've tried both Ubuntu and Linux mint 20.04 LTS. I've done simple and not so simple things in terminal.

I want to say again... before the TBB update, I had NO such hoops to jump through. It was super easy to get tor to work. Really. Now? Damn near impossible. Help needed. If you send me to blog posts already posted? I've tried them. It's not working.

Somewhere between the latest updates that collided TBB and Linux vs 20.04 LTS? Hell came to my breakfast table.

Help appreciated.

Thanks.

FML

September 27, 2020

Permalink

It seems letterboxing doesn't work properly when HiDPI scaling enabled on GNOME.
Previous version works good.

September 28, 2020

Permalink

I do love Tor Browser, but the list of "popular" websites blocking/censoring Tor seem to be growing by the day:

https://www.macys.com/
https://www.merriam-webster.com/
https://www.quora.com/ (Partial block)
https://www.snopes.com/

These are just four websites that are either difficult to access natively in Tor Browser—i.e., clicking the "New Circuit for this Site" button enough times will eventually provide access—or impossible to access natively in Tor Browser—i.e., clicking the "New Circuit for this Site" button umpteen times won't give you access.

You've successfully implemented solutions to deal with blocks/censorship on a country level, but can anything be done to mitigate/circumvent the blocking/censorship that's happening more and more on a website level?

An official up-to-date list of websites currently blocking Tor would be a good start!

October 01, 2020

Permalink

> Bug 33856: Set browser.privatebrowsing.forceMediaMemoryCache to True
Playing video is fully broken in 32-bit Windows!

October 01, 2020

Permalink

Hello! TBB10 is fine!
Here some regressions since TBB9.5.4 however:
- open https://vc.ru - you may see the site-icon at browser-tab is BROKEN. I had observed such kind of icon-corruption at some other sites too - do not remember the urls.

October 01, 2020

Permalink

This version of Tor Browser ignores window manager settings like "do nothing" on title bar double click, and will maximize when double clicked.

Previous version honored this setting and would not maximize. Regular firefox continues to honor this. This is unique to TB 10.0.

October 02, 2020

Permalink

What happened to the blinking yellow exclamation point when an update is available? I just realized one of my VMs was still on 9.5.1, and must have missed several updates due to insufficient disk space. I only noticed it was still an old version because the URL bar looks slightly different in 10.

October 05, 2020

Permalink

AmIUnique.org says my browser is unique because of canvas. Is canvas now being deliberately randomized? I thought Tor Project always argued than uniformity is better than randomization, so why this change in strategy now?

October 13, 2020

Permalink

The picture-in-picture button appears on videos now. Clicking it does nothing, but right-clicking a video and clicking "Picture-in-Picture" in the menu activates picture-in-picture.