Tor Browser 7.0.5 is released

by gk | September 4, 2017

Tor Browser 7.0.5 is now available from the Tor Browser Project page and also from our distribution directory.

This release makes HTTPS-Everywhere compatible with Tor Browser on higher security levels and ensures that browser windows on macOS are properly rounded.

The full changelog since Tor Browser 7.0.4 is:

  • All Platforms
    • Update Torbutton to 1.9.7.6
      • Bug 22989: Fix dimensions of new windows on macOS
      • Translations update
    • Update HTTPS-Everywhere to 2017.8.31
    • Update NoScript to 5.0.9
    • Bug 23166: Add new obfs4 bridge to the built-in ones
    • Bug 23258: Fix broken HTTPS-Everywhere on higher security levels
    • Bug 21270: NoScript settings break WebExtensions add-ons

Comments

Please note that the comment area below has been archived.

September 04, 2017

Permalink

After upgrading to version 7.x.x, Google Checker extensions do not work: Checker Plus for Gmail / Gmail Notifier / Gmail Notifier + ...

Using Gmail and Tor together is counter intuitive and you should not install any other extension in Tor because they can easily break your anonymity. Use normal Firefox if still want to be survailed by Google...

Because of this problem, there are also difficulties with activating through a Google Account (Gmail, Youtube, Google Analytics, third-party API services ...). Services for some reason do not see a logged-in account. And you have to log in to each service again. This problem arose just after the upgrade to version 7.x.x.

Interesting observation!
For some reason, first my Gmail account, then my entire Google internet connection has gone. So I thought, What a brilliant flanking maneuver if I access my gmail account thru Tor. This appeared to be working, but then, because it was an unrecognised access point, Google/Gmail asked for verification that it was indeed me. At that point I backed off - and read your comment.
You warn against "using Gmail and Tor together". I guess the above is an example of what you are referring to?

No. I sign into my Gmail account, then I go to YouTube and I need to re-enter my login and password to log into the same Google account. And so in all Google services.

The same is connected with the fact that Gmail Checker extensions have stopped working. They just do not see the mail account.

These problems appeared after the transition to the version of TB 7.x.x.

There are different levels of security, and depending on threat model maybe you're not worried about google reading your email, but you are worried about google tracking you and knowing where you are.

Don't be such an overzealous butt. Gmail is still one of the most convenient free email services that has a decent UI. Have you even tried using a privacy focused provider like Tutanota? There isn't even search!! And they're more likely to shut down (remember Ghostmail?).

I guess this is related to our anti-tracking features that got upstreamed for Firefox 52. Just to test that: does your setup work again if you set privacy.firstparty.isolate to false? (You might want to restart to test with a clean session)

September 04, 2017

Permalink

thanks! :)
I was really struggling not having HTTPS-Everywhere protecting me. Glad to have it back!

September 04, 2017

In reply to by Anonymous (not verified)

Permalink

Its really odd that this hasn't been tested before being released.

All it would take to see it didn't work properly is clicking on the HTTPS Everywhere button since the whole UI would be messed up.
And of course it wouldn't redirect sites listed as supporting HTTPS to HTTPS.

You have put many users at risk with this easy to spot and fix bug here ... I'm sure of it.

September 05, 2017

In reply to boklm

Permalink

Would it then not make more sense to disable automatic extension updates all together?

So now that you pointed out how simple it is to find did you tell anyone? Do or did you offer a fix?
I didn't think so. Just another user like me but you are a whiner, I'm a user and thank all the people
who work so hard to make TOR for us.

Way to go guys and gals. Some of us are highly appreciative. Won't hear me bitching.

Please shut up. There is simply nothing more disagreeable than somebody cutting off the option of negative feedback. Not everything in existence is perfect or finished and not every hard working and dedicated helpful person is competent or useful. Some endanger you with good intentions. Some are malevolently lazy. Some have overlooked something.

Fucking complain if you feel like it and stop imposing correctness upon incorrect reality.

To those that do the work, thanks. Don't be hyper-sensitive and if you can't work within reality and require constant affirmation, then consider different work.

And you, GW, just shut the fuck up forever.

September 04, 2017

Permalink

2017/09/04 21:16:39 firefox: 1504552599800 addons.webextension.{73a6fe31-595d-460b-a920-fcc0f8843232} WARN Loading extension '{73a6fe31-595d-460b-a920-fcc0f8843232}': Reading manifest: Error processing permissions.1: Unknown permission "privacy"
2017/09/04 21:16:39 firefox: 1504552599900 addons.webextension.https-everywhere-eff@eff.org WARN Loading extension 'https-everywhere-eff@eff.org': Reading manifest: Error processing devtools_page: An unexpected property was found in the WebExtension manifest.
2017/09/04 21:16:40 firefox: 1504552600000 addons.webextension.https-everywhere-eff@eff.org WARN Please specify whether you want browser_style or not in your browser_action options.

September 04, 2017

Permalink

Security Error: Content at moz-extension://44ef1069-8279-4018-9045-cf2409de304a/popup.html may not load or link to chrome://favicon/https://affiliates.mozilla.org/.
Invalid chrome URI: /
Cannot send message: Other side disconnected: ["MessageChannel:Response", {result:4, messageName:"1349-0", recipient:{}, error:{message:"Message manager disconnected", result:(void 0)}}] ExtensionUtils.jsm:1091
Cannot send message: Other side disconnected: ["MessageChannel:Response", {result:4, messageName:"1350-0", recipient:{}, error:{message:"Message manager disconnected", result:(void 0)}}] ExtensionUtils.jsm:1091
Error: Popup destroyed ext-utils.js:124:39

September 04, 2017

Permalink

Is there a way to make the TBB avoid using such circuits which have two or more relays from the same country? For example I wish that the TBB would avoid using circuits such as Germany-Germany-Germany or France-Germany-France.

Also, it would be nice if there would be a way to choose the country of the exit node by site, because there are some sites which are available only from some specific countries, and clicking several hundreds of times the "new circuit for this site" can go very time wasting and annoying in case of bad luck, as new circuits are probably random, or anyway the user has no control over them.

Thanks for the update, best wishes for the developers.

For example I wish that the TBB would avoid using circuits such as Germany-Germany-Germany or France-Germany-France.

No way. It was intentional. TorProj thinks that in this case diversity beats security. Either you hack tor or use manual chains construction using ControlPort portocol (usable in shell commanline or with arm).

Also, it would be nice if there would be a way to choose the country of the exit node by site

Answer is the same as above. However, you can enable one option in torrc to use exit notation for site chosen. Keep in mind it may harm anonymity, so this option is disabled by default.

Tor follows its way (discussing about the best settings or countries is a political question and even open a doubt on the chain trust _ are the dev/relays compromised ? e.g._ ) ; and according on where you live and the nearest server it could be france france france ... do not tweak if you do not know what you are doing ... do not break Tor ...
- be involved , run a relay, make a donation , support the others in their struggles on the net or in the real life.
- a lot of e.u countries are closing slowly their e-frontiers (except for their commercial & private benefits of course) ,
- open a window at the european limits (spain _support cataluna ; turquey _ support against u.s.a/cia threats ; crimea _ support russia independence ; france _ support their enemies ; germany _ support assange/snowden & all the others ...
it costs nothing , no risk , no danger, just a voice, an opinion , few dollars here ; some message there ; just an human being who need to be free without walls , chains , barriers on the net like in the real life.
That is the best solution for obtaining a better onions network.

There are A few good VPns that let you pick the country. Like Cyberghost. They dont keep logs, Plus I think its made in Germany or close, So USA cant find out shit bout your use of it..

they cant request something a program doesnt keep.. NO VPN SHOULD KEEP logs, its retarded imo

Really? Out of all the VPNS you recommend CyberGhost?....... either you're police posting misleading reviews, or you're clueless as to what Cyber Ghost does.

Cyber Ghost is by far the worst VPN in terms of keeping it's users safe, i would only ever use it for torrenting or everyday basic clear net browsing on an unsecured network, but even then i would be hesitant,

They do maintain logs, and with the right warrant in place, they will hand them over. They would also highly likely turn a blind eye if they noticed their service was attacked by an agency and the traffic was monitored. They are the same as Hide My Ass and all the other free VPNS with shit service.

If you use a VPN with TOR, use something like AIRvpn or Proton Mails VPN, or find a dodgy eastern European based/Chinese vpn and pay for it in tumbled BTC while accessing the service from a chain of proxys.

protonmail is not at all a secure and safe webmail : i do not recommended it (sold/rotten/falsehood/crook/untrust) and i have not read a sincere review about their vpn (audit ?)

airvpn like some others one have a good reputation but they do not provide a free version.

do you know uncensored dns DK ?

OneFromMany: I have some of the same concerns as you, that may or may not be without merit. I get very nervous when I see all three nodes residing in the same country, or certain partner countries. I'll admit I don't know the exact method of how Tor selects nodes, but I think we must realize that the capabilities of both corporations and governments to have access to and to aggregate and correlate data from a wide variety of sources is much, much more advanced than when Tor first rolled out. Such organizations can procure bandwidth and computer power never dreamed of when Tor first started, and to many such organizations the cost of said resources is small potatoes. Complex correlation software is already being developed by advertisers and other data miners, so the software involved would be in a number of org's budgets if the data was worth it. So when I see a node trio I don't like, I keep selecting new circuits until I see something I'm more comfortable with.

September 04, 2017

Permalink

I must addd to your prefs.js b/c you are missing imortants prefs:

# Mozilla User Preferences

/* Do not edit this file.
*
* If you make changes to this file while the application is running,
* the changes will be overwritten when the application exits.
*
* To make a manual change to preferences, you can visit the URL about:config
*/

[snip]

I edited your post omitting all the prefs you posted as some contain information that could be sensitive. [G.K.]

September 04, 2017

Permalink

without javascript the GUI of HTTPS-Everywhere is broken.
The counter, HTTPS-Everywhere protecting site or not, is gone.

September 04, 2017

Permalink

HTTPS-Everywhere is REALLY messed-up.
No 'Block all unencrypted requests' !
No GUI without javascript.
No counting.

Whats Going On??

September 05, 2017

In reply to gk

Permalink

"No 'Block all unencrypted requests' !
No GUI without javascript.
No counting."

Here, too.
Javascript off, security slider:high.
Thats's a problem.

September 05, 2017

In reply to gk

Permalink

Have test it with " Tor Browser 7.0.5 and HTTPS-Everywhere 2017.8.31".

With Security slider High and javascript ON there is still this problem with HTTPS-Everywhere:
No "Block all unencrypted requests", nearly blank GUI and no counting.
That's new.

September 05, 2017

Permalink

"about:config" : 2
- TRUE = network.IDN_show_punycode
- FALSE = browser.urlbar.trimURLs
"searchengine" : 4
- UNCHECKED : google, tweeter, yahoo, youtube
that's the settings i recommended.

September 12, 2017

In reply to gk

Permalink

I have the same problem, when i start Tor Browser it stops working, but it doesn't close the window. The browser itself works, but it doesn't load any tab.

September 05, 2017

Permalink

Why after posting a comment on this page does the page keep constantly refreshing forcing you to restart Tor Browser? The 'old' Tor Blog page had no such issue.

And why does Tor Browser have such a high start-up load - unlike any other browser?

tor7.0.4 worked very well.
new identity, tor circuit worked.

with 7.0.5 tor circuit always same first relay, any time delete and reinstall, re download, and install, this occur, first relay is set to the same relay node IP. ( on windows version )

this is not good.

September 05, 2017

Permalink

I like to use Tor Browser to surf politically sensitive issues. I'm using 7.0.5. In the past, I had been able to search YouTube, see the videos in a playlist, but not all the uploads in a channel. I had been able to read the description. The first few lines would be visible, but I could select the text by dragging from above it to below the missing comments, copying, and pasting in another application. I was able to watch the videos by installing Video DownloadHelper and downloading (I checked for direct access by watching in URLSnooper2, and I saw no unencrypted accesses.)

Recently, about a week or two before this update, YouTube quit displaying correctly. The main screen had only a faint line across the top. Video pages had only a list of URL's. I had no way to search. I could still download videos. Then, video downloading quit working.

With this update, video downloading works again. When I installed it, I got a YouTube page to display correctly. I thought it was working as described in the first paragraph again. After that, I haven't gotten another Youtube page to display correctly - thus I cannot search, see playlists, etc. Disabling HTTPS Everywhere does not fix the problem.

I thought with HTML5, we would be able to watch videos again, and we used to be able to. I surmise that YouTube is intentionally breaking their site for Tor. They easily could get SOME sort of site for non-Javascript browsers. I don't know if the problem is that recent changes in the Tor Browser keep even a semblance of a YouTube page from displaying, or if YouTube has been breaking things intentionally recently.

YouTube is an important site for users of the Tor Browser. Could anybody tell me if my anonymity would be at anything more than a theoretical risk by dropping down to Medium security? I would hope some of you Tor Browser guys would study the issue, and either get it working a little better under High Security, tell us what settings we need to make with plugins, or put up a blog post explaining why getting a YouTube page to display at all in the TB is just not feasible.

Here's a fun issue. I go to post this comment, and hit Preview. I get a window with the text in a box, and Save and Preview buttons. I hit Preview again, and it goes into a loop of eternal loading. I had to drop down to Medium security to even post this comment, or else I got an eternal page load loop again! I'm running on Win7.

You're asking Tor Browser to disable certain functionality in the browser. Youtube wants to use that functionality, and has decided to just fail if it isn't there. I don't think there's an easy way around that one. :(

September 06, 2017

In reply to arma

Permalink

The problem here is that Tor Browser reports to Youtube that it supports SVG, but actually disables it.

"Could anybody tell me if my anonymity would be at anything more than a theoretical risk by dropping down to Medium security?"

No one should be lulled into dropping protections which exist for very good reasons in order to use a site. Yes, it appears YouTube is now broken for Tor users who care about their privacy.

I won't drop my drawers for javascript.

September 05, 2017

Permalink

Correct testing -littlebit tired,no coffee:
with javascript ON, Security slider High,

-GUI seems normal, BUT
-"Block all unencrypted requests" ISN'T working, can't click it ON
-no counting.

Not good.

Make a clean new installation, then test.

But that HTTPSE is really a hole! It bypasses unencrypted images on encrypted pages even when you can click that checkbox!

September 06, 2017

Permalink

It won't connect and opens oddly sised and placed windows. Then it usually crashes.

I'm using the 64 bit version on Linux. The tarball checks out - md5 is
dd94e0655818035d3129028c88b1bc31

This is the first time tor browser has actually not worked for me.

September 07, 2017

In reply to gk

Permalink

After posting that, I worked out the problem only occurs if I also have Firefox running. Maybe one is not supposed to but I generally do, and have not seen this with previous versions.

Yes - the EN_US version, freshly downloaded and untarred. I tried several times before finding the connection with running another Firefox instance.

September 06, 2017

Permalink

12:53:13.424 [Exception... "Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsIHttpChannel.suspend]" nsresult: "0x80040111 (NS_ERROR_NOT_AVAILABLE)" location: "JS frame :: resource://gre/modules/WebRequest.jsm :: maybeSuspend :: line 601" data: no] 1 (unknown)
maybeSuspend resource://gre/modules/WebRequest.jsm:601:7
HttpObserverManager.applyChanges< resource://gre/modules/WebRequest.jsm:749:24
next self-hosted:1120:9
TaskImpl_run resource://gre/modules/Task.jsm:319:42
TaskImpl resource://gre/modules/Task.jsm:277:3
createAsyncFunction/asyncFunction resource://gre/modules/Task.jsm:252:14
runChannelListener resource://gre/modules/WebRequest.jsm:738:12
observe resource://gre/modules/WebRequest.jsm:504:9

September 06, 2017

Permalink

how come every time since an upload to an .onion site the first tor relay is always ROMANIA 185.100.84.212?

even reinstalled tor from the old 7.0.1 and updated
still romania 185.100.84.212
every time.

do i have to entirely delete tor from the machine and run from the ISO 7.0.5? instead?

can someone through a relay sniff the traffic, and change tor relay settings so that the aforementioned relay is always first, set.

September 06, 2017

Permalink

Hi, will tails users be affected by this update? On tails 3.1 the browser is version 7.0.4, and it did not automatic upgrade me, I can not manually upgrade either.

Please help.

September 06, 2017

Permalink

Hi the TOR browser in Tails 3.1 is still at 7.0.4, it does not automatically upgrade, and I can not manually upgrade it from within Tails 3.1.

Is this a security concern?

September 07, 2017

In reply to gk

Permalink

Can i use 7.0.4 on MSWindows without problems, too?

There is no essential change in 7.0.5? And the broken HTTPS-Everywhere 2017.8.31, no "unencrypted requests" blocking -that shouldn't happen, is a problem here.

There is no other simple way to stop HTTP requests?)-:

Webextensions are working with javascript only ? -would be a problem.

Yes, cou can stay on 7.0.4. 7.0.5 is no security release. As to the broken "unencrypted-requests-blocking" I am not sure it seems to work for me on my Linux box. Does this happen with an unmodified, clean Tor Browser?

September 08, 2017

In reply to gk

Permalink

I have the same problem with HTTPS-Everywhere2017.8.31 in TBB 7.0.5.

"happen with an unmodified, clean Tor Browser?"
I can not testing yet but when H-E2017.8.31 in TBB 7.0.6 will working
like TBB 7.0.4 WITHOUT javascript, that would be very good and necessary.

September 08, 2017

Permalink

I hope developers can reassess the capacity of the great firewall of china in the furture, the last article on this subject is at least a few years ago.

Ever since July this year, connection to Tor network can be routinely and effectively blocked by GFW, regardless of what type of bridges I'm using. I'm able to get past GFW by forcing Tor to use a free/commercial VPN, even the effectiveness of this workaround is diminishing now.

Don't get me wrong, the fact that such a small development team is able to challenge the world's most sophisticated censorship is a huge accomplishment. I appreciate Tor team's effort in ending censorship and promoting online privacy. If there's anything I can do that will help Tor(and not get me killed in the process), let me know.

September 09, 2017

Permalink

hi, had a bit of trouble during the verification. several outputs looked quite different to what is mentioned on your verification guide. can you please help me on this? sorry, i'm new to gpg.

1)
after i imported the public key, I ran gpg --fingerprint 0x4E2C6E8793298290 and it gave me:

pub rsa4096 2014-12-15 [C] [expires: 2020-08-24]
EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290
uid [ unknown] Tor Browser Developers (signing key)
sub rsa4096 2016-08-24 [S] [expires: 2018-08-24]

key fingerprint is correct, but why does the rsa key only say "4096" while it should say "4096R/93298290"? And why is the uid line tagged "unknown"?

2)
when trying to verify the tar.xz and tar.xz.asc files, it gave me:

gpg: Signature made Mo 04 Sep 2017 00:37:26 CEST
gpg: using RSA key D1483FA6C3C07136
gpg: Good signature from "Tor Browser Developers (signing key) " [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290
Subkey fingerprint: A430 0A6B C93C 0877 A445 1486 D148 3FA6 C3C0 7136

Fingerprints are correct, but is there a new RSA key? It differs from what is shown on the verification guide ("RSA key ID D40814E0" is mentioned there). Also, why is something regarding the signature "unknown"?

Is there a reason to be concerned? Would be very thankful for your help

September 09, 2017

Permalink

Hello all,I hope all is right in every ones world.I am new to all this like many on here,went from a good working Tor to "After the Update"not so much.But we as a legion have not only the means but the sheer multitude of almost unlimited human knowledge.So i have tweaked my settings here and there and not yet perfect but i have learned a lot.So thank all of you who have spent untold hours,days and weeks in the development of Tor.And free say it with me free,who are these crazy lovable people who do this for $0.00 you have my respect and thanks.And i feel honored to part of this History.
Sincerely the ghost

September 09, 2017

Permalink

So what is the right browserwindow dimension then?
No one is mentioning that.

September 10, 2017

Permalink

This be all soooo funny!

Support for 32 bit systems by Mozilla was announced as ending in September 2017 yet i now see that Mozilla has decided to continue with the current series ad infinitum due to the millions of 32 bit systems still happily grinding away

Never mind. I blew $US 260 recently on acquiring the home version of Win 10 and I'm slowly setting it up for Lubuntu and Tor. Yes, when the project is complete I'll somehow network my XP home to this Linux OS so that I can continue with the XP and use the Linux as an up-to-date browser.

The good news is that my total expenditure on laptops and ancillaries since 2004 is still less than $US 750 - or $US 58 per year. Viva Linux!

No It is not funny.

They did not extend support for fine working Mac OS X versions.
And that is probably because they totally messed up the firefox browser from version 31 - 38.

And you know what is actually funny (but not)?
While ff versions where crashing 45, the torbrowser version was working fine.
But torproject stopped support because mozilla was ending support.

Difference is that mozilla had troubling code in their browser while the 'same' esr torbrowser had not.
End of the story: torproject is blindly following mozilla regardless of any, any, any knowledge or interest in real mac OS X marketshare.
And mozilla is just not interested in their own unique selling points (their old userbase and mac os x).

September 11, 2017

Permalink

We've detected that you have connected over Tor. There appears to be an issue with the Tor Exit Node you are currently using. Please recreate your Tor circuit or restart your Tor browser in order to fix this.

If this error persists, please let us know: error-tor@duckduckgo.com

September 12, 2017

Permalink

BUG: after updating my dns , a copy (empty) of the folder(s) [without any file] appeared.
my dns was updated [disconnected] and i did not restarted the p.c.
TBB was downloaded & verified from your site and i did not install one from my o.s.

7.0.5 version runs perfectly ; thank you very much.

September 12, 2017

Permalink

At startup, no e10s:
15:20:55.404 NS_ERROR_NOT_AVAILABLE: Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsIDOMWindowUtils.isParentWindowMainWidgetVisible] 1 nsPrompter.js:350

September 12, 2017

Permalink

New NoScript 5.0.10 was pushed with
x Fixed some moz-webextension: subrequests blocked in content blocking mode
But there is no moz-webextension:, only moz-extension: - so what was fixed?

September 12, 2017

Permalink

new https everywhere 2017.9.12 doesn't work properly with javascript disabled.
EFF wants us to keep it enabled. why?
is noscript free of bugs?
what's more important, usability or security?

September 14, 2017

Permalink

HI,
I am able to connect to TOR Network on 6.5.2 but if I upgrade to 7.x.x, I cannot get connection at all. No response on the screen when double click on browser to open it.
I'm using Windows 10 OS.
Please help.

gk

September 14, 2017

In reply to by Tor Lover (not verified)

Permalink

Do you have any Firewall/Anti Virus software that could interfere with Tor Browser? If so, which one? Does it help if you uninstall it (for testing purposes)? (Note: Disabling might not be enough)

September 15, 2017

Permalink

The latest version of Tails does not connect to some public sites but the TOR browser after several minutes does connect to the same sites.

I was wondering why Tails doesnt give an option to choose the transport type?

September 20, 2017

Permalink

Hi there. I am very grateful to your work for all us, but there is a problem about this last version 7.05, in respect of all previous other. Once updated, a bunch of malicious sites (stopped by my Malwarebytes protection) tried to enter my computer: a thing never happened before. Let you know that I check at least twice in a week my computer by some good antimalware software.
I do not know the why of such several attempts. They were always detected as "Outbound" malicious sites, and I underline how they tried to enter BEFORE I had tried to open any site. Very weird...
Can you tell me something about that, please..?

akirod@live.it

September 20, 2017

Permalink

Tor browser install for ubuntu doesn't work. I have tried it on Ubuntu 16.04LTS and installed it from Ubuntu software store. Is this a known issue?

September 22, 2017

Permalink

With Tor Browser 7.05 64 bit linux, going to url:

http://www.asstr.org/newfiles.html
results in this:

Come visit us at https://www.asstr.org/ https://aSstr.org/ to read this story and hundreds of thousands of other works!
Are you a tor user seeing this message by mistake? Take a look at http://awe-kyle.ru/ to see why. They ahve found a way touse tor to their commercial advantage.

Note that--
https://www.asstr.org/ https://aSstr.org/ is:
http://tinyurl.com/yd2saseg

asstr
Tor circuits for this site
This browser
Germany 178.254.20.254
France 5.51.106.108
France 62.210.129.246
Internet

Clicking "New Tor Circuit for this site" many times may eventually get the correct site. What is going on?

September 25, 2017

Permalink

since this update i have not been able to use tor and get online on my mac. tor quits unexpectedly. this could be due to a bug in tor......! 0 logs copy to clip board. anyone know whats up with this?

October 05, 2017

Permalink

People for god sacks don't fucking download version 7.0.6 it has malware on it and I can prove it. And here is the thing I tested other versions I.E italin german japananese and it doesn't have it, just good old fucking America