Tor Browser 5.5.3 is released
Tor Browser 5.5.3 is now available from the Tor Browser Project page and also from our distribution directory.
This release features important security updates to Firefox.
This release bumps the versions of several of our external components: Firefox to 38.7.0esr, OpenSSL to 1.0.1s, NoScript to 2.9.0.4 and HTTPS-Everywhere to 5.1.4.
Additionally, we fixed long-standing bugs in our Tor circuit display and window resizing code, and improved the usability of our font fingerprinting defense further.
The full changelog since 5.5.2 is:
Tor Browser 5.5.3 -- March 8 2016
-
All Platforms
- Update Firefox to 38.7.0esr
- Update OpenSSL to 1.0.1s
- Update NoScript to 2.9.0.4
- Update HTTPS Everywhere to 5.1.4
- Update Torbutton to 1.9.4.4
- Bug 18030: Isolate favicon requests on Page Info dialog
- Bug 18297: Use separate Noto JP,KR,SC,TC fonts
- Bug 18170: Make sure the homepage is shown after an update as well
-
Windows
- Bug 18292: Disable staged updates on Windows
Comments
Please note that the comment area below has been archived.
Does Tor Project have any
Does Tor Project have any comment regarding the playpen bust in 2015? Zero-day?
one of the pedos had
one of the pedos had javascript activated. if you catch one greedy of them, you catch all them greedy.
stupid pedos.. they deserved it! i myself would install a backdoor into tor to catch all those childf****ng guys and bust them. But unlucky me is not member of tor creators :D
nomber one good job thank
nomber one good job thank you.
https://goo.gl/2rxsJh At
https://goo.gl/2rxsJh At very this moment Tor was crashed and then updated unexpectedly
Is this reproducible? If so,
Is this reproducible? If so, how?
Thanks!
Thanks!
The about:tbupdate tab loads
The about:tbupdate tab loads every time when i start the browser since this update, how to switch this off?
I am not sure yet as I can't
I am not sure yet as I can't reproduce your behavior on any of my testing machines. Does closing the about:tbupdate tab manually help before restarting?
How can I reproduce your problem? https://oiyfgiixvl.tudasnich.de/torbrowser/5.5.2/ has old Tor Browser bundles (for testing purposes).
Thank you!
Thank you!
Thank you. When do you
Thank you. When do you switch to Firefox 45 esr?
The release on June 7th
The release on June 7th should be based on Firefox 45.2 ESR.
Tor.exe is update??
Tor.exe is update??
TAILS 2.2 is out, i haven't
TAILS 2.2 is out, i haven't test it, yet.
Problem is i need editing the torcc file when booting from DVD. Bridges are no substitute!
Booting from USB is no substitute, too.
I Hope, Tails distributors have considered that,
torcc editing, hasn't seen in the docs.
The only bad alternative would be using old TAILS. Or mabe don't using Tor anymore.
Time wrap on restart Mar 09
Time wrap on restart
[geshifilter-code]
Mar 09 06:30:13.000 [notice] New control connection opened from 127.0.0.1.
Mar 09 06:30:13.000 [notice] New control connection opened from 127.0.0.1.
Mar 09 06:31:36.000 [notice] Owning controller connection has closed -- exiting now.
Mar 09 06:31:36.000 [notice] Catching signal TERM, exiting cleanly.
Mar 09 04:31:39.553 [notice] Tor v0.2.7.6 (git-7a489a6389110120) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.1s and Zlib 1.2.3.3.
Mar 09 04:31:39.553 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://sedvblmbog.tudasnich.de/download/download#warning
[/geshifilter-code]
Hello
Hello (torproject),
https://ocewjwkdco.tudasnich.de/blog/tails-22-out
has no Comment, support-feedback-visit the Support section is complicated, so i try it here:
In older TAILS versions -with Vidalia- i can edit the torcc file easy. Important.
I like Tails and i use it sometimes on DVD, no USB!(read the HackingTeam archive and you know why).
Very convenient -with VIDALIA !- and you see the complete relay list with country and the Fingerprint, nice for editing the torcc.
Bridges are NO substitute for the capability to editing the torcc -in Tails, too. With some exclamation points.
Onion Circuits -on tails.boum.org- looks rudimentarely, only )-: sorry, i like Tails.
Can i do this -editing torcc normal- in the new version of TAILS with"Onion Circuits"?
May with arm, with the persistence feature? Bad hacks like manually searching, editing torcc -really bad with DVD-booting and no complete relay list?
Can you answer?
Thanks for reading
" Can i do this -editing
" Can i do this -editing torcc normal- in the new version of TAILS with"Onion Circuits"? "
torcc editor is gone? Would be bad, very bad. Hope this is only a rumour. Vidalia was well thought-out.
Thank YOU for hard job
Thank YOU for hard job !!!!! T H A N K S !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Tor! -Hm
Tor! -Hm
What's going on with entry
What's going on with entry relays? I had install fresh TBB for windows 50 times and every time entry relay was the same from France, Germany or Netherlands. Is it safe to use only 3 entry relays for all users of the Tor network?
Interesting.. This needs
Interesting.. This needs looking into, seriously weakens security
Same here.....same thing,
Same here.....same thing, Germany, France and Netherlands exact same order, exact everything. no matter where i or how many times i refresh he exact same entry From Germany.
1st.) thank you guys so much
1st.) thank you guys so much for everything you do, your time, your work everything you do is awesome. 2.) same thing here, same exact entry, no matter where i go or what i do.
Limiting the entry relay to
Limiting the entry relay to one protects from the eventuality of randomly selecting an entry relay and exit relay that are collaborating.
Imagine using Tor to browse the web and one time you are unlucky and pick and entry/exit pair operated by the same entity. By using a timing attack, that entity now knows with complete certainty your IP address and destination. All it takes is one time.
The odds of eventually choosing collaborating relays at both ends of the Tor circuit are surprisingly high when using a pool of entry relays. By using only one, as long as you weren't unlucky with that first choice, those odds are sharply reduced.
Since the single point of entry can be deduced by monitoring a user, wouldn't adding a relay to the chain be preferable?
Can U guys do anything about
Can U guys do anything about saving passwords? I cant do that I have to write in same thing everytime
hi boklm please give me a
hi boklm please give me a clear answer: is tor safe on http sites? or isp can track my traffic on target site ?
This page explains what is
This page explains what is visible with or without https, and with or without Tor:
https://www.eff.org/pages/tor-and-https/
How come "view page source"
How come "view page source" doesn't work on the bundled browser?
It should work. If it
It should work.
If it doesn't work for you, can you give more details so we can try to reproduce the issue?
The problem is that it loads
The problem is that it loads the page fresh from the server without using the credentials from the rendered page. So if I want to look at the source for a page in a site that requires a login, I'll get the source for the login page, or whatever. Why on earth doesn't the browser just use the source from it's own cache?
I assume you don't have that
I assume you don't have that problem in a normal Firefox browser? If so, my guess is that you've found a bug that is essentially https://trac.torproject.org/projects/tor/ticket/15555.
"I assume you don't have
"I assume you don't have that problem in a normal Firefox browser?"
I have no idea. I use Chrome for my non-Tor browsing.
Now that I've read that
Now that I've read that ticket, it sure sounds like the same bug. Someone suggests using Firefox development tools to view the source. What's the quickest was to invoke that?
Never mind. It's
Never mind. It's [CTRL]+[SHIFT]+C
My experience with regular
My experience with regular Firefox, not TBB, may help:
on the regular html page, select all (Ctrl+A), then context click view source.
The source apparently is as rendered not as received.
I discovered this while fiddling with rss news feeds, which render very differently than as received.
If that doesn't work for you, maybe there' a Firefox pref?
do you intend to add
do you intend to add something like 'Onion Circuits' to TBB?
i would like to know who i am connected to.
'Tor circuits for this site' shows just IP addresses i'm not able
to handle.
What do you mean? Clicking
What do you mean? Clicking on the green onion in your browser toolbar should show you whom you are connected to for a particular domain.
but vidalia shows me all
but vidalia shows me all circuits, destinations and NAMES of the
relays instead of IPs only. this is much better for those who want
to see what FF and Tor does.
Old versions of TBB has had
Old versions of TBB has had the great tool Vidalia; canceled.
The only alternative was Tails.Have seen 'Onion Circuits' on the documents(homepage) and it's looking strong cut back. Vidalia has been unmaintained for years but unsecure enough to cancel it in Tails?
If 'Onion Circuits' has not the same practicality like Vidalia(goodlokin' relay list, editing tor behaviour, Message Log etc.),
Tails would be a Gadget only.........)-:. I hope it isn't so.
Yes, being unmaintained for
Yes, being unmaintained for years is a very valid reason to stop using it. Even if it was secure (very questionable,) it was a GUI control for tor and tor is still currently under active development.
There are alternatives that include at least some of the functionality (see https://www.atagar.com/arm/;) they do not, however, include the nice map display that was pretty but unnecessary. Most people used Vidalia for the map display. I did, with the exception of requesting new circuits, which is functionality best left to Tor Browser at this time (because it can do new circuits for individual sites in addition to all connections.
"There are alternatives ...
"There are alternatives ... (see https://www.atagar.com/arm/;)".
With Vidalia in Tails you had a smart, usefull, handy Tor GUI.
With Onion Circuits you have nearly nothing?
With Vidalia and arm you can close connections, you have a complete relay list, you can edit the torcc(some tor user like it to have normal Guard security......., the Tails developers obvious not?).
Without Vidalia and with Onion Circuits Tails is a -little bit- *WTF*. I'm speechless.
I like handy innovation but Onion Circuits is not. It is cripple(sic!) Tails. Sorry, i wannabe constructive.
vidalia is still a very
vidalia is still a very useful tool.
developers think they do
developers think they do good and never ask users what they need
+1 to adding the new "onion
+1 to adding the new "onion circuits" tool
I'm glad to hear the Tor Button circuit display bugs are fixed but I just got a "Secure connection failed" error (probably due to a bad exit) and Tor Button didn't show me the circuit that caused it. (It did show my new circuit after I selected "New Tor Circuit for this Site" and loaded the page, and so far it has shown circuits for every successful page load I've tried, but I want cicuit display for unsuccessful requests like SSL errors).
let's start a crowdfunding
let's start a crowdfunding campaign for Vidalia maintenance
your IP based circuit
your IP based circuit information is crap.
i'm still using vidalia standalone especially to terminate suspicious
circuits like
EntryNode 1 - random relay - EntryNode 2 or
EntryNode 2 - random relay - EntryNode 1
(both among ExcludeExitNodes ... and StrictNodes 1)
OR
the 1st is busy and the 2nd EntryNode is building this:
EntryNode 2 - random relay - static Exit (=always the same ExitNode)
you call it feature - i don't want such circuits.
thank you
thank you
cool
cool
thank u so much, this tor is
thank u so much, this tor is very nice n simple
Thank you!
Thank you!
T H A N K S !!!!!!
T H A N K S !!!!!!
Iam nearly new with TBB and
Iam nearly new with TBB and have questions:
-Is it normal the 3 Guards are rotating, with every new TBB start i get
random 1 of 3 Entry Guards ?
-How can i set a fix/1 Entry Guard?
There is no entry in the manual for setting a fix Entry Guard?
I am a little bit confused.
thanks
thanks
this fuckin awesome
this fuckin awesome
thank you very mucy
thank you very mucy
beautiful
beautiful
Thank you for your job.
Thank you for your job. Great project!
T H A N K S :))
T H A N K S :))
Security question A company
Security question
A company called Bluecoat, is offering "SSL Interception" tools and methods. Company-site: bluecoat.com .
Are encrypted connections on Tornetwork and especially on exit-nodes vulnerable for interception techniques offered by this and probably other companies?
Does, or can Torbrowser warn for this "ssl interception" or must a user always on every website do a manual ssl encryption to check the validity of the offered certificate in the browser-lock? Does anybody do that? All the time?
What are a good practices on this matter?
Or isn't it a matter at all, and why so?
Thank you in advance for hopefully answering my question.
"user always on every
"user always on every website do a manual ssl encryption to check the validity of the offered certificate in the browser-lock (icon)"
I may have this wrong, but AFAIK the browser checks the site certificate against certificates installed.
Certificate revocation check seems more on-the fly, but I don't know....
Excuse me for my crippled
Excuse me for my crippled sentence
The sentence:
"Does, or can Torbrowser warn for this "ssl interception" or must a user always on every website do a manual ssl encryption to check the validity of the offered certificate in the browser-lock?
Had to be more like this:
Does, or can Torbrowser warn for this "ssl interception" or must a user always on every website do a manual ssl check by manually checking the validity of the offered certificate in the browser-lock? Therefore looking at "more information", "View certificate" and then find out if the certificate really is belonging to / assigned to the owners of the website you are visiting.
Now, the reason for this question is that people who are against Tor try to convince others that Tor is a unsafe technique because it is not protected to MitM interception even on encrypted connections.
The idea is that MitM attacks can take place on an exit node by using another certificate so the user actually sees a lock in the url bar but when manually checking could find (or not) out that this is not the right certificate but simply an intermediate certificate of the interceptor.
So, what I would know if it's is possible to intercept an encrypted connection on an exitnode and decrypt this (I hope not) while letting the user believe that it is using the original encrypted connection because it will see a lock in the url bar.
I see over and over again people saying that this kind of interception attack is possible and therefore that using Torbrowser over the Tornetwork is unsafe because one never could know (directly) if the information the Torbrowser user is sending over a fully encrypted connection is intercepted.
Although I got the impression that this is probably not possible, I would rather see a clear answer to that matter so that if people start using these kind of "Tor is not secure reasons" again we could refer to the answer on Torproject space.
I'm not familiar with this
I'm not familiar with this specific company, but the way these things generally work is that the proxy generates its own certificate for every site you attempt to visit. So unless you have the proxy's CA certificate installed in your browser you'll see a big scary error message.
If you (a Tor user) are behind such a proxy, you will probably find that you're unable to connect to the Tor network at all, except possibly via pluggable-transport bridges.
If an exit node is behind such a proxy, then anyone who uses that exit node (assuming they're using the Tor Browser) will see an error message when they try to visit an HTTPS site. If you find such an exit node you should report it so it can be blacklisted.
Window maximizing was
Window maximizing was finally fixed! After months and months and months of ignoring a basic usability problem.
For me maximizing is
For me maximizing is actually broken with this update. Was fine before.
What do you mean with
What do you mean with "broken"? How can we reproduce your issues?
With broken I mean when I
With broken I mean when I click maximize button window briefly maximizes, then immediately goes back to the size it was started with.
Never mind though. After I rearmed extensions.torbutton.maximize_warnings_remaining to 1 and dismissed warning about maximizing window, it seems to work fine again.
Sorry, but it seems like I
Sorry, but it seems like I had misinformed you. extensions.torbutton.maximize_warnings_remaining is unrelated. And it is about:tor start page, that is preventing maximization. Once closed maximizing window is working.
Interesting. So, could you
Interesting. So, could you give me some steps to reproduce? Ideally, starting from a clean 5.5.3 bundle? If that clean bundle does not exhibit the problems what modifications did you make?
I just checked that now. It
I just checked that now. It looks like te window maximizes as any window maximizes. Isn't this a fingerprinting risk? Or does tbb send a fake window size that is a near size? or???
Yes, this is a
Yes, this is a fingerprinting risk and has always been so. Which is why you get a warning three times you are doing that.
i have never seen any
i have never seen any warning.
Maximizing is reflex action from regular browser use.
However, I use a "Fit To Width" bookmarklet on many websites.
Many months ago, TBB had horrible response when clicking maximize. TBB window would blow up to multiples of display size. Then trying any size adjustment would send TBB off-screen.
Now, when click maximize button, TBB responds as normal app responds (maximizes). I'm using Windows OS.
I read a few comments above
I read a few comments above about maximize warning pref.
Inexplicably to me, my pref was "user set" to
extensions.torbutton.maximize_warnings_remaining;-1
though I don't recall this pref and wouldn't have disabled the anti-fingerprinting feature.
I reset the pref then, while still in about:config, a local url, I clicked maximize. TBB obeyed, but showed a yellow warning bar. Clicking OK button caused the pref value to increment down from 3 to 2. Apparently I have dismissed the warning (after accidentally maximizing) 4 times (setting values to 2, 1, 0, then finally to -1)
My opinion:
Clicking "OK" should only dismiss the warning. Perhaps instead of eventually disabling the warning, the warning message should only hint at how to disable warnings by editing the pref.
------------------
For convenience of comment readers, this url will show the pref
about:config?filter=maximize
Big thanks.
Big thanks.
hi... flash player cant be
hi... flash player cant be installed pls help
You should not use Flash on
You should not use Flash on Tor. It will give away everything about you, and is a huge malware target.
Hello, is https://gitweb.torp
Hello,
is
https://gitweb.torproject.org/nyx.git/log/
a Tor controller with gui LIKE Vidalia.
Is it available for windows, Linux(Tails)?
TBB
TBB fingerprinting:
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-finger…
i am happy to be part of
i am happy to be part of Tor Browser. Thanks a lot.
https://developer.mozilla.org
https://developer.mozilla.org/en-US/docs/Mozilla/Preferences/Preference…
Torbrowser's default weakens user's anonymity. Imagine user selecting a name or address from a query result of many names or addresses. Server gets this information.
hello, i can not see bengali
hello,
i can not see bengali language in tor browser... can u pls tell me ,how can i fix it......it will be very help full for me....
thanks
tor is not updated on this
tor is not updated on this version,anti virus detec bad appli !!!
hey! I can't level up dudes
hey! I can't level up dudes please help me
question: in
question:
in TBB-Linux/tails, you can copy URL, open new tab, click with mouse-middle-wheel in new tab and this URL is loading.
In TBB-MSWindows you do the same and URL is not loading. How configure to have same behaviour like TBB-Linux/tails?
i think that difference is
i think that difference is due the OS clipboard behavior.
in windows, right click, "paste & go"
Youtube changed something on
Youtube changed something on their website and now the videos wont play directly on TOR browser and I can't forward/rewind videos. Anyone else having this problem?
Yes, same problem here.
Yes, same problem here.
I am also experiencing this
I am also experiencing this problem.
I also noticed on youtube no longer seeing the warning about "this website trying to extract HTML5 canvas image data" that I always used to see when temporarily allowing all on this page via noscript. I can see the forward/rewind/timeline if I turn it on via right click in image area, but it does not work correctly. i.e. I cannot click on controls for timeline so cannot get it to move timeline and timeline controls disappear when I hover over the controls for timeline etc.
Tor Browser 5.5.3 in Tails
Tor Browser 5.5.3 in Tails does play YouTube videos. I don't know about the Windows, Mac and Linux versions.
For me on Windows, it will
For me on Windows, it will play the first 20 seconds or so with no visible controls. If I right-click during that time I have some basic controls. After the 20 seconds, the rest of the page loads (comments, thumbnails for other videos), but playback stops and is replaced by a static image. Not sure if this is due to a Youtube change (but seems likely) or a difference between TBB 5.5.2 and 5.5.3.
Fonts which are not like
Fonts which are not like English do not display properly. I have provided screenshot link below. Please check.
http://www.xossip.com/forumdisplay.php?s=7ce60be455eef087bfdb3ead81c75a…
TBB package should be
TBB package should be smaller or the Tor network should be faster, or updated from Bittorrent network like Tails if it is possible...
update tor
update tor
recently i switched from
recently i switched from siphone3 to TOR ,since am new in here i got to see how good is TOR and i hope it would not get cut off a lot and stay on for long time ,,,,,,,,thanks
HTTPS Everywhere? Only
HTTPS Everywhere?
Only sometimes i see HTTPS Everywhere infos in Tools(Menu Bar), on an HTTPS Everywhere database entry. Especially if i want to see
URL is in the database before i load site.
If i want see it reliable everytimes, i must set it in the Toolbar.
Is this a failure or normal?
Second question:
How can i see Tor log in Windows with TBB? With setting different info
levels(notice,warn,error).
In past you can use Tails for using Tor and have a APPROPRIATE
level of handling and info.
NOW with Tails you get TBB as a gadget? *W T F*
On just one Windows 8.1
On just one Windows 8.1 desktop computer, all attempts to update from 5.5.2 to 5.5.3 fail. On restart Tor always gives "Could not load XPCOM"
xpcom is Firefox. Maybe that
xpcom is Firefox. Maybe that exact message, "Could not load XPCOM" is in support.mozilla.org, or on mozillazine forum?
but also,
when i have any problem with firefox restart, I check task manager (start, run, taskmgr.exe). if firefox.exe is invisibly running, you'll see it in taskmgr list.
kill firefox in the list, then try starting TBB.
How often do pedos use this
How often do pedos use this to explore and do they're pedo deeds.. & HOW CAN WE STOP THEM?
Can't read text in Bengali!
Can't read text in Bengali! previously can. Any solution?
What do you mean with
What do you mean with "previously"? Which version worked for you? Do you have a link to a screenshot showing your problem? Which operating system and which Tor Browser bundle are you using?
Will the new version 5.5.3
Will the new version 5.5.3 sometimes still use three nodes within the same country? I feel this is unwise coding and use separate IP blocking software.
Keep up the good work.
Can you tell me, why in my
Can you tell me, why in my tor browser all 3 relays from 1 country????? Is it safe?
Can someone tell why it's
Can someone tell why it's not possible to download the Firefox Addons via a TBB on Windows OS?
When I go to https://addons.mozilla.org/en-US/firefox/
pick any Addon extension, right-click on the + Add to Firefox button, and select Save Link As... it fails, TBB downloads a 0 Byte empty file onto the hard drive.
Interesting. I don't know at
Interesting. I don't know at the moment to be honest. I've opened a bug in our bug tracker: https://bugs.torproject.org/18542. Thanks for reporting this issue.
To be more specific, if I
To be more specific, if I Right-click the + Add to Firefox button in the upper part of any addons webpage, I get the following pop-up window message:
Download Error
The download cannot be saved because an unknown error occurred.
Please try again.
....but, if I scroll down to the bottom of the addons page and click/open up "Version Information" portion, TBB downloads the XPI file, but it is a 0 Byte file.
Further, if I Left-click on the upper button I get the:
The add-on could not be download because of a connection failure on addons.mozilla.org
but when clicking on the button lower down in the "Version Information" portion of the web page, it installs properly into the browser.
I found some further information on this web-site explaining:
https://hacks.mozilla.org/2016/02/implementing-content-security-policy/
The add-ons team recently completed work to enable Content Security Policy (CSP) on addons.mozilla.org (AMO). This article is intended to cover the basics of implementing CSP, as well as highlighting some of the issues that we ran into implementing CSP on AMO.
It's an old bug, seen this
It's an old bug, seen this for years.
Are there any issues with
Are there any issues with Tweetdeck? Tor users have been blocked for over a month. Twitter owns Tweetdeck.
Not sure what you mean but
Not sure what you mean but https://trac.torproject.org/projects/tor/ticket/16450 might play a role. Have you tried the workaround in comment 1 in this ticket?
When trying to log into
When trying to log into Tweetdeck, we aren't able to. First it would just land back on the login page. Now it says there's a bad request.
Yes I've now tried "Restrict third party cookies" in the "Privacy & Security Settings" after seeing that link being tweeted by a Tweetdeck employee. Myself and others can now log in. We just have to be careful where else we go on Tor while third party cookies are enabled. After logging out of Tweetdeck, I block third party cookies in "Privacy & Security Settings".
Many on twitter had assumed tweetdeck was blocking Tor users which was odd considering twitter owns tweetdeck.
hi, can anyone tell what i
hi,
can anyone tell what i need to do to load this site www.spadesplus.com using google account ... it keeps loading but never actually loads ... i tried allowing everything but it never loads ... why does this site never loads can anyone answer me? i can load other site with flash player but not this site.
i posted comments about
i posted comments about asking how to load www.spadesplus.com using google account ... but my post not on the page?
It is now. This blog is
It is now. This blog is moderated due to spam. Thus, it can take a while until your post is getting visible.
TBB in Tails is great but
TBB in Tails is great but where is the tor controller gone?
Ебать ,всё по
Ебать ,всё по Англйски...чё русских нету чтоли тут ?
Да есть
Да есть конечно, просто не все понимают как коммент написать)))
good job!!!!!!!!!!!!
good job!!!!!!!!!!!!
I'd like to know if this
I'd like to know if this behavior of onion circuit / tor circuit / exit node is safe. I'm using tor-browser-linux64-5.5.3_en-US screenshots provided.
Is that a bug?
Is it targeting / hacking ?
http://s28.postimg.org/cx4fbtqwd/Screen_Shot_01_2016_03_17.png
http://s28.postimg.org/3t60bdpbh/Screen_Shot_02_2016_03_17.png
http://s28.postimg.org/eu15gehkd/Screen_Shot_03_2016_03_17.png
http://s28.postimg.org/93az2o9kd/Screen_Shot_04_2016_03_17.png
Anyone have had this issue?
Anyone have had this issue? So, is that regular?
thank you very much guys you
thank you very much guys you are heroes..
Here's a question that I
Here's a question that I don't think has been asked before.
Ip-check.info displays a lot of information. At the right of the correctly detected ip, as confirmed by the green TOR onion as: "Tor circuit for this site", it offers a Traceroute.
If the ip-check.info site can only see the last (exit) node, how can it give, in one case, information on eleven hops up to that exit node?
That's a good
That's a good question.
Developers, what's the answer?
Thank you.
It is just giving the route
It is just giving the route from their server to your exit node, without going through the Tor network. This is unrelated to the Tor circuit used.
Boklm Thanks for your quick
Boklm
Thanks for your quick reply.
ok
ok
hello, can u pls help me ..
hello,
can u pls help me .. how can I read Bengali front in tor browser ?
it will b very helpful for me .
The fucking captcha from
The fucking captcha from cloudflare is irritating.
cloudflare captchas never
cloudflare captchas never work for me. i use google cache, though some web pages aren't in google cache.
here is example of google cache url
https://webcache.googleusercontent.com/search?q=cache:https%3A%2F%2Fblo…
you can create a keyword search bookmark
or
a search plugin at mycroft. http://mycroftproject.com/search-engines.html?name=google+cache
I would first try the search plugin by "anon".
text editors can easily edit search plugins.
on windows, the files are in \Browser\browser\searchplugins\
Same here, I use a search
Same here, I use a search engines cache or proxy link if such exists, Cloudflare is an absolute PITA!
Also, when Google Captcha pops up as a Cloudflare gatekeeper is, I believe, they do some network analysis soft-hacking by measuring load and transient behaviour of the network and some other type of fingerprinitng stuff in order to estimate your location etc.
The scary part for us here in EU for instance, is all those CDN (Content Delivery Network) providers such as Akami which is an American company, but also Cloudflare and others. I read some years back, already then the CDN covered some 40% of all network bandwidth in Europe and probably much more these days, those CDN's are very scary things, X-Eyes, Echelon... :O
i use tor browser i love it
i use tor browser i love it