Page 34«..1020..33343536..4050..»

Category Archives: Tor Browser

7 Best Alternatives to Tor Browser for Anonymous Browsing

Posted: December 26, 2016 at 2:52 pm

Tor is free software that will help you go anonymous while surfing the web. It is not anything ordinary that can be ignored. Let me explain you little bit interesting about Tor, you people do search various things via search engines like; Google, Bing, etc. But these search engines displays only indexed results to you, means it will show you the result which is naked in web and anyone can see that. But Tor makes it way different while showing search results; in Tor search results it shows each and every hidden and protected articles, websites and information regarding your desired search without getting tracked.

Due to this, it is used in many bad businesses, an example is Silk Road. Yes! It was tracked by NSA lately; it used to be an online shopping website for illegal drugs. It is an open source network that helps you protect against traffic analysis. Even your internet service providers wont be able to track you while using Tor. It is a form of network assessment that pressurizes personal freedom and privacy, secret business activities and relationships, state security. This is not meant to design for all this illegal businesses, but it allows you to improve your privacy and security so much that it attracts many bad users to do illegal business over using Tor. There are many good things could be done using Tor, but due to surveillance by NSA threatens users to use Tor much.

Also Read: Top 7 Alternatives To HootSuite

There are many projects under Tor Project including; Tor Browser, Orbot, Tails, Arm, Atlas, Pluggable Transports, Stem, OONI and many more.

I2P is an unidentified peer-to-peer distributes communication layer which is built by means of the open source tools. It is a complete alternative to TOR. The software implementing this computer network layer like any other P2P software is called I2P layer. It is designed and optimized for secret services, faster than Tor with completely distributed and self-organizing potential.

Freenet is a peer-to-peer to oppose the censorship similar to I2P. It uses the same P2P tools of distributing data storage to distribute and keep the information but separates the set of rules of the user interface and network structure. Freenet comes with the two-tier safety measures: Darknet and Opennet.

Freepto is a different Linux-based OS that could be booted using a USB disk on any computer. The data you put aside on the USB disk will be mechanically encrypted. It offers the hacktivists an uncomplicated way to communicate effortlessly just like Tor. It is easy to use and fastest way to save encrypted data.

JonDo Live-DVD is a Debian GNU/Linux based OS; with pre-configured applications to be used for web surfing, has Thunderbird, Torbrowser, Pdigin and other programs.

Tox isnt a complete substitute for Tor, but it can help to provide messaging services. Tox gives private and encrypted IM, video conferencing and calls that is somewhat user-friendly.

Ipredia OS is a quick, commanding and stable operating system based on Linux that provides an unknown environment. All set-up traffic is automatically and evidently encrypted and anonymized. Many applications are obtainable in Ipredia OS, mention may be made of mail, peer-to-peer, bittorrent, IRC chat and others. You may get:

Lightweight Portable Security (LPS) creates a safe end node from dependable media on nearly any Intel-based computer (PC or Mac). It boots a CD from Linux operating system. USB flash stick with no mounting on a local hard drive. Administrator privileges are not required; not anything is installed. The LPS family was shaped to address specific use cases: A general-purpose solution for using web-based applications is referred to as LPS-Public.

Virtual Private Networks (VPNs) are authentic when it comes to privacy improvement, censorship avoidance, anonymous file sharing, and more. It is important to know the benefits and drawbacks of using both Tor and a VPN for privacy, security, and anonymity online.

Even lately the internet privacy tool Tor was hardly heard of outside the tech community. NSA has been working to corrupt the user experience to discourage people from using the Tor browser, trying to crack its security. Tor was compromised by NSA, so there was a need for best alternatives to Tor Project.

Read more from the original source:
7 Best Alternatives to Tor Browser for Anonymous Browsing

Posted in Tor Browser | Comments Off on 7 Best Alternatives to Tor Browser for Anonymous Browsing

Tor Browser Free Download for Windows 10, 7, 8/8.1 (64 bit/32 …

Posted: at 2:52 pm

Tor Browser Description

Tor Browser is based off of the Firefox project, and is very similar in most aspect to the regular Firefox browser. The big difference though, is that all traffic is routed through Tor. This means you can be sure that your time spent browsing online is anonymous and safe.

The Tor Project is an open source project that was created to help people browse the Internet safely. This has been used in a wide variety of aplications, ranging from helping bypass firewalls in countries like China to ensuring safe communications between diplomats. But with the increasing pressure on everyone to keep basic online browsing private from markters, governments, and other snoops, it is starting to be more commonly used in everyday life for many people.

Tor works by channeling your traffic through a multi-step encryption across a globally-distributed servers. This means that not only your identity is completely hidden from the website/onlien service you are trying to connect to, it is close to impossible for anyone to intercept and read the communication en route.

With Tor browser, you can now get all of the powerful security in Tor, but with the ease of a common web browser. If you are interested in learning more about the Tor network and how it works, we highly recommend reading through their explanation.

Features

Disclaimer

Tor Browser is a product developed by Tor Project. This site is not directly affiliated with Tor Project. All trademarks, registered trademarks, product names and company names or logos mentioned herein are the property of their respective owners. Our download manager distributes the original unmodified software, obtained directly from Tor Project website, and does not modify it in any way.

Tips & Tricks

You can find a lot of useful information about the different software on our QP Download Blog page.

How to uninstall Tor Browser?

How do I uninstall Tor Browser in Windows Vista / Windows 7 / Windows 8?

How do I uninstall Tor Browser in Windows XP?

How do I uninstall Tor Browser in Windows 95, 98, Me, NT, 2000?

Frequently Asked Questions

Nothing! Download Tor Browser free from QPDownload.com.

It's easy! Just click the free Tor Browser download button at the top left of the page. Clicking this link will start the installer to download Tor Browser free for Windows.

Yes! The free Tor Browser download for PC works on most current Windows operating systems.

Read more:
Tor Browser Free Download for Windows 10, 7, 8/8.1 (64 bit/32 ...

Posted in Tor Browser | Comments Off on Tor Browser Free Download for Windows 10, 7, 8/8.1 (64 bit/32 …

Tor Browser 6.0.7 is released | The Tor Blog

Posted: December 7, 2016 at 7:57 am

Tor Browser 6.0.7 is now available from the Tor Browser Project page and also from our distribution directory.

This release features an important security update to Firefox and contains, in addition to that, an update to NoScript (2.9.5.2).

The security flaw responsible for this urgent release is already actively exploited on Windows systems. Even though there is currently, to the best of our knowledge, no similar exploit for OS X or Linux users available the underlying bug affects those platforms as well. Thus we strongly recommend that all users apply the update to their Tor Browser immediately. A restart is required for it to take effect.

Tor Browser users who had set their security slider to "High" are believed to have been safe from this vulnerability.

We will have alpha and hardened Tor Browser updates out shortly. In the meantime, users of these series can mitigate the security flaw in at least two ways:

1) Set the security slider to "High" as this is preventing the exploit from working. 2) Switch to the stable series until updates for alpha and hardened are available, too.

Here is the full changelog since 6.0.6:

Update: We would like to remind everyone that we (The Tor Project) are having our 2016 fundraising campaign! Donate today!

Read more from the original source:
Tor Browser 6.0.7 is released | The Tor Blog

Posted in Tor Browser | Comments Off on Tor Browser 6.0.7 is released | The Tor Blog

What is TOR browser? Is TOR Safe? – vpntorrents.com

Posted: October 1, 2016 at 1:43 am

We are living in the era of internet where it is now possible to reach to anywhere in the world virtually with the help of internet. Internet has bring new revolutions in humans history. We have invented so many things with the help of internet which the people living in last century cannot even think about it. But, the invention of new technology does not came along with positive changes only but there are negative impacts of technology as well. For example, people, today, who are using internet has issues of privacy and day by day, online privacy issues are getting complicated.

Privacy is not just all about your personal information but also, businesses who are using e-business in their business faces lot of problem regarding to the leakage of very important information, which could be anything from a business idea to financial information etc. Although governments all around the world is very concern about the online activities of their citizens. Many governments are spying the online activities of people to have better control on them and stop any activities which is being planned online against them etc. In short, internet has bring many privacy related issues and people are looking for cheap solutions to get rid from them.

There are several ways through which you can make your online activities anonymous. The popular ways including online proxy, web proxy, VPN, Hotspots, browsers related plug-in and extension. Although, there is a popular browser called TOR which is believed a secure browser to hide your online activities.

Unlike other ways of going online anonymously, TOR is a web browser which is created to make web suffering totally anonymously. It was developed by a nonprofit organization but later due to the new idea and privacy concern, the government of United States has funded the organization who was developing it. It is also popular that the government of America has used this browser during their war related activities in different countries to send important information from one place to another place to hide from other people. Although, there is another rumor, according to which, it has been believed that TOR browser was originally designed and developed for USA navy.

The TOR was originally called the Onion Router due to its software design which hides the online activity of a user with layers of different routers in same way like an onion.

It is true that TOR helps with anonymity of traffic but TOR does not promise about online privacy at all. To make it clear to their users, TOR did not comes up with their complete privacy policy or what they do with the data logs of their user. Although, isnt not enough to know that the whole software is funded by government? Why would the government of a country is interested to fund a software which makes online traffic anonymous? In Short, TOR is not safe because your online activities can be still recorded by the government. Even, the issue regarding to the privacy or TOR is always in news and many studies has been arranged by different companies which proves that TOR is not so anonymous in terms of online privacy.

Instead of above issues which makes TOR un-safe, the design of TOR software is enough to make it one of the unreliable software to use it to hide your online activities because there are many routers get involved to make your online activity anonymous in TOR which means that any break of security at any point of the router will leaked your information to anonymous people or to those who break this security or hack it on purpose etc.

Even if you are planning to use TOR for regular purpose like browsing websites anonymously, unblocking the blocked content and watching movies at Netflix, TOR is still not a reliable choice to choose because TOR is using Java technology which makes online browsing very slow. Although, TOR itself is very slow software to operate. Number of IP address available to hide your activities through TOR is very limited and internet speed on those servers are not always stable. So, forget about your online security and online privacy for a second, TOR is even not a good choice for other purposes as well.

There are number of different ways which you can use instead of TOR as I have mentioned earlier like web proxy, online proxy, VPN and Hotspot etc but not all of them comes up with super features which you deserve while you are using internet. For example, Hotspot has slow internet speed where options like web proxy comes up with limited features, high prices and web ads in case if you are using free proxy. As compare to these alternatives, you can go with VPN which is stands for virtual private network and created to provide online privacy and online security to the people.

VPN may comes up with limited privacy option but online if you choose a low quality VPN company. There are some companies which provide high internet speed, excellent privacy policy and 100% guaranty of your online security. For example ExpressVPN do that.

ExpressVPN is different from others in terms to provides you an exclusive privacy solution. Their privacy policy is very clean in which they have mentioned that they do not record the data logs of their clients activities where they have sent different online security protocols to make the online security possible of their users as well.

Indeed TOR browser is cheap where ExpressVPN is not but if you compare the features of both of them and you are concern about your privacy then you should not be worried about very little monthly fee of ExpressVPN because in terun you are getting fast internet, access of hundreds of VPN servers in 90 countries, unlimited monthly bandwidth and excellent 24 hours support to get your problem solved etc. Read our ExpressVPN Review

More here:
What is TOR browser? Is TOR Safe? - vpntorrents.com

Posted in Tor Browser | Comments Off on What is TOR browser? Is TOR Safe? – vpntorrents.com

Tor Browser Portable Download – softpedia.com

Posted: at 1:43 am

Hide your identity when navigating the web, encrypt communication and access blocked content, with this portable version of the popular Tor browser

While antivirus software may protect you against malware attacks, countless websites track your location and browsing habits when you navigate the web, something many users prefer to avoid.

Tor Browser Portable provides you with a solution, as it directs traffic through large network of relays maintained by volunteers from around the world. Not only does this browser maintain your online anonymity, but it enables you to access regionally restricted content as well.

Tor Browser Portable does not store any information on your PC outside of the application folder, so it can be installed on USB flash drives and deployed on any system that meets the OS requirements.

It can be integrated with the PortableApps.com Platform, making it possible to include it in a custom application suite for use on your PC, USB stick or cloud drive.

Tor Browser Portable works by routing your URL request through a series of servers from around the world, thus preventing others from viewing the direct path from your PC to the visited website.

The browser displays the Tor circuit for each web page you have accessed, and a new identity can be created with a couple of mouse clicks.

When first launching the application, you may need to configure the Tor network settings, although the default configuration should work in most scenarios.

Tor Browser Portable is essentially a modified version of Mozilla Firefox, so users who are familiar with it should have an easy time making the transition.

However, the browser also includes the NoScript and HTTPS Everywhere add-ons, which provide an extra layer of security and encrypt communication.

To sum up, Tor Browser Portable is a great solution for users who wish to hide their identity when navigating the web. It prevents others from tracking your location or browsing habits, and it can even be run from portable storage devices.

Go here to read the rest:
Tor Browser Portable Download - softpedia.com

Posted in Tor Browser | Comments Off on Tor Browser Portable Download – softpedia.com

How to: Use Tor on Mac OS X | Surveillance Self-Defense

Posted: September 25, 2016 at 7:19 am

What is Tor?

Tor is a volunteer-run service that provides both privacy and anonymity online by masking who you are and where you are connecting. The service also protects you from the Tor network itself.

For people who might need occasional anonymity and privacy when accessing websites, Tor Browser provides a quick and easy way to use the Tor network.

The easiest way to use the Tor network is to use the Tor Browser Bundle, which combines a web browser, the Tor software, and other helpful software that will give you a way of more securely accessing the web.

The Tor Browser works just like other web browsers, except that it sends your communications through Tor, making it harder for people who are monitoring you to know exactly what you're doing online, and harder for people monitoring the sites you use to know where you're connecting from. Keep in mind that only activities you do inside of Tor Browser itself will be anonymized. Having Tor Browser installed on your computer does not make things you do on the same computer using other software (such as your regular web browser) anonymous.

Open a browser like Mozilla Firefox or Safari and type: https://www.torproject.org/download/download-easy.html.en in the URL bar. If you are using a search engine to look for the Tor Browser Bundle, make sure that the URL is correct.

Click the big purple download button to get the installation program for Tor Browser Bundle.

The website will have detected your operating system and you'll get the correct file for OS X. If this fails you can click the link to the side of the purple button to download to the correct version.

If you are using Safari, the Tor Browser Bundle will start to download. In Firefox you will be asked whether you wish to open or save the file. It is always best to save the file, so click the Save button. This example shows Tor Browser Bundle Version 4.0.8, which was the most current version at the time this guide was published. There may be a more recent version available for download by the time you read this.

After the download is complete, you might get an option to open the folder where the file was downloaded to. The default location is the Downloads folder. Double-click on the file Torbrowser-4.0.8-osx32_en-US.dmg

A window will open asking you to install Tor Browser Bundle by dragging it to your applications folder. You may do so now.

Tor Browser is now installed in your applications folder.

To open Tor Browser for the first time, locate it in the finder or in launchpad on newer versions of OS X.

After clicking on the Tor Browser icon, a window will open with a warning about the origin of the software. You should always take these warnings seriously and make sure you trust the software you want to install and that you got an authentic copy from the official site over a secure connection. Since you know what you want, and you know where to get the software, and the download was from the Tor Project's secure HTTPS site, click Open.

The first time Tor Browser starts, you'll get a window that allows you to modify some settings if necessary. You might have to come back and change some configuration settings, but go ahead and connect to the Tor network by clicking the Connect button.

After clicking Connect, a new window will open with a green bar that will get longer as the Tor software starts up.

The first time Tor Browser starts it might take a bit longer than usual; within a few minutes Tor Browser should be ready and a web browser will open congratulating you.

You can verify that you are connected to the Tor network by visiting check.torproject.org. If you are connected the website it will say Congratulations. This browser is configured to use Tor.

Browsing with Tor is different in some ways from the normal browsing experience. We recommended reading the tipsfor properly browsing with Tor and retaining your anonymity.

You are now ready to browse the internet anonymously with Tor.

Continued here:
How to: Use Tor on Mac OS X | Surveillance Self-Defense

Posted in Tor Browser | Comments Off on How to: Use Tor on Mac OS X | Surveillance Self-Defense

7 Things You Should Know About Tor | Electronic Frontier …

Posted: at 7:19 am

Updated: July 1st at 6:30PM to add information about traffic correlation attacks.

We posted last week about the Tor Challengeand why everyone should use Tor. Since we started our Tor Challenge two weeks ago we have signed up over 1000 new Tor relays. But it appears that there are still some popular misconceptions about Tor. We would like to take this opportunity to dispel some of these common myths and misconceptions.

One of the many things that we learned from the NSA leaks is that Tor still works. According to the NSA "Tor Stinks"slides revealed by the Guardian last year, the NSA is still not able to completely circumvent the anonymity provided by Tor. They have been able to compromise certain Tor users in specific situations. Historically this has been done by finding an exploit for the Tor Browser Bundle or by exploiting a user that has misconfigured Tor. The FBIpossibly in conjunction with the NSAwas able to find one serious exploit for Firefox that lead to the takedown of Freedom Hosting and exploit of its users. Firefox was patched quickly, and no major exploits for Firefox affecting Tor users appear to have been foundsince. As the Tor developers noted in 2004, if someone is actively monitoring both your network traffic and the network traffic of the Internet service you're communicating with, Tor can't prevent them from deducing that you're talking to that service. Its design does assume that at least one side of the connection isn't being monitored by whomever you're trying to stay private from.

We can conclude from this that Tor has probably not been broken at a cryptographic level. The best attacks on Tor are side-channel attacks on browser bugs or user misconfiguration and traffic correlation attacks.

One of the most common misconceptions we hear is that Tor is only used by criminals and pedophiles. This is simply not true! There are many types of people that use Tor. Activists use it to circumvent censorship and provide anonymity. The military uses it for secure communications and planning. Families use Tor to protect their children and preserve their privacy. Journalists use it to do research on stories and communicate securely with sources. The Tor Project website has an excellent explanation of why Tor doesn't help criminals very much. To paraphrase: Criminals can already do bad things since they will break laws they have much better tools at their disposal than what Tor offers, such as botnets made with malware, stolen devices, identity theft, etc. In fact using Tor may help you protect yourself against some of these tactics that criminals use such as identity theft or online stalking.

You are not helping criminals by using Tor any more than you are helping criminals by using the Internet.

Another common opinion that we hear is that Tor was created by the military and so it must have a military backdoor. There is no backdoor in the Tor software. It is true that initial development of Tor was funded by the US Navy. However, it has been audited by several very smart cryptographers and security professionals who have confirmed that there is no backdoor. Tor is open source, so any programmer can take a look at the code and verify that there is nothing fishy going on. It is worked on by a team of activists who are extremely dedicated to privacy and anonymity.

As far as EFF is aware, no one in the US has been sued or prosecuted for running a Tor relay. Furthermore we do not believe that running a Tor relay is illegal under US law. This is, of course, no guarantee that you won't be contacted by law enforcement, especially if you are running an exit relay. However EFF believes this fact so strongly that we are running our own Tor relay. You can find out more about the legalities of running a Tor relay at the Tor Challenge Legal FAQ. However, if you are going to use Tor for criminal activity (which the Tor project asks that you not do) you can create more problems for yourself if you get prosecuted. Criminal activity also brings more scrutiny on to Tor making it worse for the public as a whole.

You might think that because it is privacy software Tor must be hard to use. This is simply not true. The easiest way to get started with Tor is to download the Tor Browser Bundle. This is a browser that comes pre-configured to use Tor in a secure manner. It is easy to use and is all you need to start browsing with Tor. Another easy way to use Tor is with Tails. Tails is a live operating system that runs on a DVD or thumb drive. Tails routes your entire Internet connection through Tor. And when you shut it down, Tails forgets everything that was done while it was running.

It is true that Tor is slower than a regular Internet connection. However, the Tor developers have been doing a lot of hard work to make the Tor network faster. And it is faster today than ever before. One of the best things that can be done to speed up the Tor network is to create more relays. If you would like to contribute to making the Tor network faster, you can check out our Tor Challenge

Tor is not perfect; you can destroy your own anonymity with Tor if you use it incorrectly. That's why it is important to always use Tor Browser Bundle or Tails and make sure that you keep your software up to date. It is also important to remember that if you log into services like Google and Facebook over Tor, those services will still be able to see your communications within their systems. Additionally Tor users should be mindful of the fact that an adversary who can see both sides of their connection may be able to perform a statistical analysis to confirm that the traffic belongs to you.

Tor is some of the strongest anonymity software that exists. We think that it is important to dispel misconceptions about it so that the public can be more informed and confident in its usefulness. There are many great reasons to use Tor and very few reasons not to. So get started with Tor, and take back your privacy online.

View post:
7 Things You Should Know About Tor | Electronic Frontier ...

Posted in Tor Browser | Comments Off on 7 Things You Should Know About Tor | Electronic Frontier …

Tor Browser Torrent Downloads – download free torrents!

Posted: August 27, 2016 at 7:09 pm

Browser

xul.dll

TorBrowser

Data

Browser

profile.default

places.sqlite

extensions

defaults

rulesets.sqlite

preferences

preferences.js

chrome

content

code

X509ChainWhitelist.js

HTTPSRules.js

Root-CAs.js

NSS.js

ChannelReplacement.js

HTTPS.js

commonOCSP.json

ApplicableList.js

sha256.js

IOUtil.js

AndroidUI.jsm

Cookie.js

Thread.js

toolbar_button.js

observatory-xul.js

ruleset-tests.js

observatory-preferences.xul

fetch-source.js

toolbar_button.xul

about.xul

observatory-popup.xul

observatory-warning.xul

ruleset-tests-status.xul

fetch-source.xul

toolbar_button_binding.xml

meta-preferences.xul

ruleset-tests-status.js

about.js

ruleset-tests-status.css

skin

ssl-observatory-messy.jpg

https-everywhere-banner.jpg

https-everywhere-128.png

https-everywhere.css

https-everywhere.png

https-everywhere-24-red.png

https-everywhere-half-24.png

https-everywhere-24.png

https-everywhere-16-red.png

https-everywhere-24-gray.png

https-everywhere-16.png

https-everywhere-16-gray.png

loop.png

tick.png

eff-16.png

tick-moot.png

cross.png

locale

km

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

el

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

si_LK

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

th

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

fa

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

ru

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

uk

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

bg

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

ar

ssl-observatory.dtd

https-everywhere.dtd

https-everywhere.properties

ja

See the rest here:
Tor Browser Torrent Downloads - download free torrents!

Posted in Tor Browser | Comments Off on Tor Browser Torrent Downloads – download free torrents!

Amazon.com: Tor: Tor Browser: Anonymous Surfing Ultimate …

Posted: at 7:09 pm

All You Ever Needed And Wanted To Know about the Tor Browser and how it relates to Internet Security

With The Complete Tor Browser Guide, you'll learn everything that you need to know about the Tor Browser and how it relates to internet security. When you enter the online world you are putting yourself at risk every time you log on. With the Tor Browser you can safely shield your identity from those who might want to take advantage of you. The Tor Browser bounces your internet communications across the Tor Network to ensure:

Anonymity Tor Browser Tor Relays Hidden Services Security Total Privacy Tor Abuse

When you install the Tor Browser on your local computer you are ensuring yourself total privacy while you are on the internet. To maintain total anonymity while browsing the internet your information will pass through a minimum of three Tor relays before it reaches its final destination. Tor users can set up relays to become part of the Tor network, but they can also configure hidden services to offer even more security. As with any privacy software there is a potential for abuse, but actual Tor abuse is minimal.

One of the greatest things about the Tor Browser is it can be used by anybody looking to protect their privacy. Unlike other similar programs the Tor Browser offers users total anonymity and security. Ordinary people can use it to protect themselves from identity thieves, while law enforcement and military personnel can use it to gather intelligence for investigations and undercover operations. With the Tor Browser nobody will know who you are or where you are.

The rest is here:
Amazon.com: Tor: Tor Browser: Anonymous Surfing Ultimate ...

Posted in Tor Browser | Comments Off on Amazon.com: Tor: Tor Browser: Anonymous Surfing Ultimate …

Tor Browser Counterpunches With a Security Upgrade

Posted: at 7:09 pm

Larry Loeb

Principal, PBC Enterprises

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor...

Tor is fighting back. The Onion Router (Tor) released version 6.5a1 of its browser in early June, and users will be happy to note that the updated browser contained some welcome security initiatives.

As the Tor Project announced on its blog, the latest version of its browser updates Firefox to 45.2.0esr and contains all the improvements that went into Tor Browser 6.0. Specifically, this new release boasts significant security advancements designed to avoid privacy invasions and deanonymization things Tor is supposed to fundamentally prevent.

The Project worked on the Firefox browser that runs underneath Tor to reduce its potential as an attack surface. This hardening was needed given recent and apparently successful deanonymization attacks, which revealed the identities of Tor users.

But theres more: Softpedia reported that this hardened version of the Tor browser includes a new feature called Selfrando. The article described this feature as an enhanced and practical load-time randomization technique. This should prevent user identities from ever going public as the result of a cyberattack.

The Tor Project and researchers from the University of California, Irvine have been collaborating to create Selfrando. It is an alternative to the use of address space layout randomization (ASLR), which Tor had used previously. ASLR works by taking code and shifting the memory location in which it runs. Selfrando increases the granularity of code execution by taking each code function separately and then randomizing the memory address.

This can have a major impact on Tor security. If an attacker cannot predict the memory position in which parts of the code will be executing, then use of some sort of memory corruption bug which could allow them to run malware inside the Tor browser wont do them any good.

It remains to be seen whether these hardening efforts will pay off in the future for Tor, but they look encouraging.

Topics: Firefox, Tor, Tor Project, Web Browser

Read more from the original source:
Tor Browser Counterpunches With a Security Upgrade

Posted in Tor Browser | Comments Off on Tor Browser Counterpunches With a Security Upgrade

Page 34«..1020..33343536..4050..»