New Release: Tor Browser 9.5a1
Tor Browser 9.5a1 is now available from the Tor Browser Alpha download page and also from our distribution directory.
Note: this is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.
This release features important security updates.
Tor Browser 9.5a1 is the first release in the 9.5 alpha series. It contains all the improvements and fixes from the 9.0 release as well as other new features: We enabled WASM on the standard security level, fixed circuit display for bridges without a fingerprint, and we re-enabled jemalloc for Windows users.
The full changelog since Tor Browser 9.0a8 is:
- All Platforms
- Windows + OS X + Linux
- Update Tor Launcher to 0.2.20.1
- Bug 32125: Fix circuit display for bridge without a fingerprint
- Bug 32076: Upgrade to goptlib v1.1.0
- Bug 32061: Bump snowflake version to b4f4b29a03
- Bug 32092: Fix Tor Browser Support link in preferences
- Bug 32111: Fixed issue parsing user-provided bridge strings
- Bug 31749: Fix security level panel spawning events
- Bug 31920: Fix Security Level panel when its toolbar button moves to overflow
- Bug 31748+31961: Fix 'Learn More' links in Security Level preferences and panel
- Translations update
- Android
- Build System
Comments
Please note that the comment area below has been archived.
Please fixhttps://trac…
Please fix
https://trac.torproject.org/projects/tor/ticket/28290
Thanks for your great work!…
Thanks for your great work!
What is the status of allowing/disallowing on a webpage the scripts from the linked domains individually?
Currently, when NoScript is not visible, to make a site work, one has to lower the total security for all scripts together (via "3 safety levels"). If I understand correctly, this allows all scripts, even the 3rd party trackers.
I remember earlier this year it was said in this blog that the individual-domain script controls were to return after the new Firefox ESR is ported into TorBrowser.
Is it still planned?
If not, is there a different recommended way to enable only the good scripts on a page, while keeping the trackers disabled?
Thanks.
Yes, it is still planned to…
Yes, it is still planned to have per-site security settings support, and this feature is on our roadmap for the next two months. This is the ticket:
https://trac.torproject.org/projects/tor/ticket/30570
Until this is available, I think the only way to do it is to add back noscript to the toolbar (which you can do by selecting Customize in the hamburger menu).
Snowflake's speed on windows…
Snowflake's speed on windows seems to be capped to just a dozen Kb per second, and restarted the browser many times, is this normal?
Yes, there is a known issue…
Yes, there is a known issue with the Windows version of Snowflake:
https://trac.torproject.org/projects/tor/ticket/31971
couldn`t load XPCOM.
couldn`t load XPCOM.
Do you have steps to…
Do you have steps to reproduce this issue?
Danger! TOR BROWSER version…
Danger! TOR BROWSER version 9.0 Android -9.* ALPHA Android.
A vulnerability in the Tor Browser (Android) - version 9.0 / 9.*.* (alpha)
The problem description concerns Tor Browser version 9.0 / 9.*.* (alpha) for Android operating system!
The reason for the vulnerability: - after clearing the cache online, cookies and other identification data remain in the browser.
Detailed description of the actions performed and the presence of the problem:
I do not make any changes to the settings, I do not use add-ons.
Using a clean browser
After clearing the cache from the browser menu, necessarily change the tor ID.
And under such conditions, the result is sad.
My action:
1) launch Tor Browser
2) on the main page about:tor in the "address input field" window, I register the site address
3) click, activate the link
4) the site page opens
5) enter login and password
6) click, for the authorization process.
7) the page is reloaded, authorization occurs
8) I make any actions necessary for me on the site under my login and password.
9) the site page is open, do not click (do not click) on the exit button - do not touch anything.
10) click, browser menu
11) I go to the browser settings menu, click: "clear private data"
12) browser reports: "personal data deleted"
13) close the browser menu
14) in the opened main browser window (about: tor) in the address input field, I register the address of the site where I just was.
15) click
16) the site page is loaded and opened
17) I see on the opened main page of the site that I am authorized and online!
18) I click for example: on the link to enter the personal account, and freely enter without entering the login and password, I can perform any actions without authorization.
THIS IS A SIGN THAT PERSONAL IDENTIFICATION DATA HAS BEEN STORED IN THE CACHE AFTER CLEANING!
I do not recommend using version 9.0 / 9.* - (alpha).
Yes, clearing data does not…
Yes, clearing data does not work as it is supposed to work, see: https://trac.torproject.org/projects/tor/ticket/27592 for a ticket to track the problem. Help is appreciated.
Hi Tor-Team, regarding…
Hi Tor-Team, regarding Letterboxing: The bad contrast on dark themed websites forced me to disable it completely for now (set privacy.resistFingerprinting.letterboxing to false).
It would be really great if one could set the background color of the Letterboxing borders (f.e.: privacy.resistFingerprinting.letterboxing.border_background_color: #000000).
Keep up the good work!
I totally agree with that…
I totally agree with that. We have https://trac.torproject.org/projects/tor/ticket/32220 to track the work and are hopefully able to release a bugfix release shortly with that issue addressed.
[10-24 12:26:26] Torbutton…
[10-24 12:26:26] Torbutton INFO: tor SOCKS: https://tb-manual.torproject.org/en-US via
about.ef2a7dd5-93bc-417f-a698-142c3116864f.mozilla:c770eab8f479cdb8b639dc87d9025163
[10-24 12:26:26] Torbutton INFO: New tab
[10-24 12:26:26] Torbutton NOTE: no SOCKS credentials found for current document.
[10-24 12:26:26] Torbutton INFO: tor SOCKS: https://tb-manual.torproject.org/en-US via
torproject.org:da45deac185a2fc6963c91aa623265ca
Hrm, looks like a race condition.
> Bug 21549: Enable WASM on…
> Bug 21549: Enable WASM on standard security level
And how does it go for HTTPS Everywhere when temporarily enabled by lowering the security level?
Lowering to standard is cool…
Lowering to standard is cool. :) We are not there yet for WASM on safer and safest levels for extensions, but close, see: https://trac.torproject.org/projects/tor/ticket/23719.
For testing only :) Seems it…
For testing only :) Seems it doesn't work until restart.
What have you tested exactly?
What have you tested exactly? Starting with a slider on a higher level and then lowering it + running some WASM code afterwards? What code did you try to run?
A bug? In this new version …
A bug? In this new version (9.0) is just disappeared the option to block or unblock cookies from all sites.What did happen with it? How I do that now?
You set the respective…
You set the respective preference (
network.cookie.cookieBehavior
) directly on yourabout:config
page now to the value you want to have.Making it harder for normal…
Making it harder for normal users to block cookies is a problem.
Here is the ticket and patch that caused this:
https://trac.torproject.org/projects/tor/ticket/26345
GK, would you please consider it?
Hi Phil303 Here is the link…
Hi Phil303
Here is the link to the relevant patch and issue in the bug tracker that caused the cookie button to disappear:
https://trac.torproject.org/projects/tor/ticket/26345
You guys need to change the…
You guys need to change the letterboxing bars to black or dark grey... Some of us have ELS or simply don't like being blinded ;)
Working on it: https://trac…
Working on it: https://trac.torproject.org/projects/tor/ticket/32220 :)
> Some of us have ELS or…
> Some of us have ELS or simply don't like being blinded ;)
https://blog.torproject.org/comment/284968#comment-284968
It was not possible to…
It was not possible to install this release (Tor 9.0 for Win64) because its file nssdbm3.dll was infected with the virus Win64:Evo-gen.. That is, the setup file downloaded from the Tor site is infected with this mentioned virus. Could you please check this?
I think that's very likely a…
I think that's very likely a false positive from whatever tool you are using.
Please return the option to…
Please return the option to enable/disable cookies and types of cookies. Even if temporarily, no site should be allowed to store files, (such as cookies, etc) in the user's machine without explicit permission of this user. I have read above a reply about that, which nevertheless which is completely an unpractical measure; I mean this should be available to the user's criterion, and easy as used to be in the earlier versions of Tor.
I don't think this should be…
I don't think this should be as easily available as before. Mozilla integrated that functionality tightly into their Tracking Protection UI which we don't want to have right now as it claims to be a privacy feature (among others). Thus, we removed the UI. However, as said above you still can set the respective preference directly.
??? Sorry I don't get this…
??? Sorry I don't get this justification. It was meant that now the Tor users don't have more right to this kind of privacy (block of cookies)?
Anyway I've tried the indicated manual alteration in "network.cookie.cookieBehavior". The default value seen there is set as "1" . ??? So, What value (0, 2,3, what?) should be set to recover the feature like was in the previous version of Tor?
We did not remove the…
We did not remove the options to adjust your cookie settings to a value you like nor won't we. The issue is that those cookie settings UI got integrated into the Tracking Protection UI we don't want right now. More importantly, it is highly misleading and by users clicking on different options they might be distinguishable without intending so.
For the value you want have a look at http://kb.mozillazine.org/Network.cookie.cookieBehavior. There four different values are shown and I hope what you have in mind is one of them. If not, then you'd need to search a bit harder as I think there are more values possible nowadays.
I downloaded "torbrowser…
I downloaded "torbrowser-install-9.0_en-US.exe" 32bit several times and verified it.
when I'm trying to install, it just gives me the options of Arabic and Farsi to choose!
Please fix this.
Where are you seeing only…
Where are you seeing only those options? When starting the installer? What is your locale on your Windows machine? Does it work for you if you test an older installer, say, the one from Tor Browser 8.5.5 (see: https://archive.torproject.org/tor-package-archive/torbrowser/8.5.5/ for older bundles).
not OP but getting a similar…
not OP but getting a similar thing, when starting the 32 bit installer it gives two language options one of which is my system locale and the other is an unofficial language spoken by some people in this region. checking past versions, the change seems to have happened around version 8.0 (7.5.6 installer shows 6 languages including English). I haven't noticed this before because I only use the 64 bit installers and they always show a long list of languages to choose from unlike 32 bit installers
Could you pin down the first…
Could you pin down the first Tor Browser version where this happened? Older installers are at: https://archive.torproject.org/tor-package-archive/torbrowser/. If the result is a major version, like 8.0 it would be helpful to track the issue further down in the alpha versions belonging to that stable one. In the 8.0 case this would be 8.0a1-8.0a10. Thanks. I am filing a ticket meanwhile.
https://trac.torproject.org…
https://trac.torproject.org/projects/tor/ticket/32286 it is.
[10-25 07:50:12] Torbutton…
[10-25 07:50:12] Torbutton INFO: tor SOCKS: https://mitmdetection.services.mozilla.com/ via
--unknown--:3c6a3286392291d7459b9e131ebc8f73
Any steps to reproduce this…
Any steps to reproduce this issue?
https://mitm-software.badssl…
https://mitm-software.badssl.com/
Media resource blob:https:/…
Media resource blob:https://www.xxx.com/111 could not be decoded, error: Error Code: NS_ERROR_DOM_MEDIA_FATAL_ERR (0x806e0005)
Details: RefPtr mozilla::MediaSourceTrackDemuxer::DoSeek(const mozilla::media::TimeUnit &): manager is detached.
Any steps to reproduce this…
Any steps to reproduce this issue?
NetworkHelper…
NetworkHelper.getReasonsForWeakness threw an exception: STATE_IS_BROKEN without a known reason. Full state was: 1 2 ThreadSafeDevToolsUtils.js:90:13
reportException resource://devtools/shared/ThreadSafeDevToolsUtils.js:90
getReasonsForWeakness resource://devtools/shared/webconsole/network-helper.js:795
parseSecurityInfo resource://devtools/shared/webconsole/network-helper.js:620
_getSecurityInfo resource://devtools/server/actors/network-monitor/network-response-listener.js:329
makeInfallible resource://devtools/shared/ThreadSafeDevToolsUtils.js:111
onStartRequest resource://devtools/server/actors/network-monitor/network-response-listener.js:226
Any steps to reproduce this…
Any steps to reproduce this issue?
https://badssl.com/dashboard/
https://badssl.com/dashboard/
Handler function threw an…
Handler function threw an exception: [Exception... "Component returned failure code: 0x80040111 (NS_ERROR_NOT_AVAILABLE) [nsICacheInfoChannel.isRacing]" nsresult: "0x80040111 (NS_ERROR_NOT_AVAILABLE)" location: "JS frame :: resource://devtools/server/actors/network-monitor/network-response-listener.js :: NetworkResponseListener.prototype._getSecurityInfo< :: line 334" data: no]
Stack: NetworkResponseListener.prototype._getSecurityInfo<@resource://devtools/server/actors/network-monitor/network-response-listener.js:334:26
exports.makeInfallible/<@resource://devtools/shared/ThreadSafeDevToolsUtils.js:111:22
onStartRequest@resource://devtools/server/actors/network-monitor/network-response-listener.js:226:10
Line: 334, column: 0 ThreadSafeDevToolsUtils.js:90:13
reportException resource://devtools/shared/ThreadSafeDevToolsUtils.js:90
makeInfallible resource://devtools/shared/ThreadSafeDevToolsUtils.js:117
onStartRequest resource://devtools/server/actors/network-monitor/network-response-listener.js:226
Any steps to reproduce this…
Any steps to reproduce this issue?
https://very.badssl.com/
https://very.badssl.com/
Some site hung the browser…
Some site hung the browser with
[10-25 10:18:10] Torbutton INFO: controlPort >> 650 STREAM 7389 NEW 0 cflares35lvdlczhy3r6qbza5jjxbcplzvdveabhf7bsp7y4nzmn67yd.onion:443 SOURCE_ADDR=127.0.0.1:65499 PURPOSE=USER
7389 alt-svc requests? madness..
CRAP! IT IS STILL RAPING MY…
CRAP! IT IS STILL RAPING MY PC EVEN WITH ALL TABS CLOSED! 238741 TIMES!!!
[10-30 08:44:55] Torbutton INFO: controlPort >> 650 STREAM 238741 NEW 0 cflares35lvdlczhy3r6qbza5jjxbcplzvdveabhf7bsp7y4nzmn67yd.onion:443 SOURCE_ADDR=127.0.0.1:56101 PURPOSE=USER
[10-30 08:44:55] Torbutton INFO: controlPort >> 650 STREAM 238741 SENTCONNECT 168 cflares35lvdlczhy3r6qbza5jjxbcplzvdveabhf7bsp7y4nzmn67yd.onion:443
[10-30 08:44:55] Torbutton INFO: controlPort >> 650 STREAM 238706 CLOSED 156 cflareusni3s7vwhq2f7gc4opsik7aa4t2ajedhzr42ez6uajaywh3qd.onion:443 REASON=DONE
[10-26 11:23:49] Torbutton…
[10-26 11:23:49] Torbutton INFO: controlPort >> 650 STREAM 138 FAILED 36 sync-messages.invalid:443 REASON=END REMOTE_REASON=RESOLVEFAILED
[10-26 11:23:49] Torbutton INFO: controlPort >> 650 STREAM 138 CLOSED 36 sync-messages.invalid:443 REASON=END REMOTE_REASON=RESOLVEFAILED
NoScript is going mad :(
With the new version of Tor…
With the new version of Tor Browser there is a white border around webpages which is super annoying. I understand it is kind of a anti-fingerprinting feature. Can I change the color of those borders to grey or black?
Why does allowing of canvas…
Why does allowing of canvas change the hash of WebGL fingerprint?
love it
love it
How about starting Tor…
How about starting Tor fullscreen, since it has now antifingerprinting for fullscreen?
No, the default window size…
No, the default window size is still recommended. See gk's reply in the 9.0 post.
When will the problem with…
When will the problem with images not loading on some websites be fixed?
After the automatic update,…
After the automatic update, it deleted a dll file and has stopped working completely.
Which .dll file got deleted?…
Which .dll file got deleted? What error message are you getting now after the update got applied and you restarted?
What is "it"? A virus…
What is "it"? A virus scanner? The result could be a false positive as others posted.
Content Security Policy: The…
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“script-src”). tor-browser_build.html
[10-28 02:14:33] Torbutton INFO: tor SOCKS: https://noscript-csp.invalid/__NoScript_Probe__/ via
f4amtbsowhix7rrf.onion:aaa290530f4117506dfce554a05c79fa
heh
I'am so extremly disapointed…
I'am so extremly disapointed about the latest tor-browser releases:
Without the posibility to allow 'third-party-cookies' you cannot log into several websites like any disqus based forums.
That makes tor-browser totally useless! Who the hell has decided this bunk?!
It is like removing the wheels from a car in order to make driving more secure!
I hope I will find an older version somewhere which allows the user at last to make some decisions on himself...
So, first of all: we did not…
So, first of all: we did not touch any of the per-site cookie settings. You should probably use those anyway as you very likely do not want to allow third party cookies on any website just because you need to log in to some.
But even if you think that's okay and are fine with third-party cookies generally then you still have the option to allow those. You need to adjust the respective preference,
network.cookie.cookieBehavior
inabout:config
to the value you want to have. http://kb.mozillazine.org/Network.cookie.cookieBehavior has possible values and0
seems to be the one you are looking for.Finally, if you already had third party cookies enabled the update did not touch anything in that regard.
"I am fine" --> "and am…
"I am fine" --> "and am fine"
And to help clarify, per-site cookie settings are in Preferences --> Privacy & Security --> Cookies and Site Data --> Manage Permissions button.
Will the future per-site…
Will the future per-site security levels make it possible to allow third-party cookies (or "per-site cookie settings") on a specific first-party website only? The other person asked about Disqus for example.
We have this ticket about…
I think it is not currently planned.
But we also have this ticket about third-party cookies:
https://trac.torproject.org/projects/tor/ticket/21905
https://upload.wikimedia.org…
https://upload.wikimedia.org/wikipedia/commons/transcoded/2/22/Volcano_…
doesn't work on Safest
Works for me on my Linux box…
Works for me on my Linux box after allowing the click-to-play by NoScript. Do you have steps to reproduce?
black screen on my win 7.
black screen on my win 7.
maybe, because of: Loading…
maybe, because of:
Loading failed for the with source “chrome://global/content/TopLevelVideoDocument.js”. Volcano_Lava_Sample.webm.360p.vp9.webm:1:1
(not opening tickets for real regressions is rude)
It works for me. What OS are…
It works for me. What OS are you using, and does it work on other security levels?
is that a joke or what? …
is that a joke or what?
"doesn't work on Safest"
"black screen on my win 7"
doesn't work on any security level
It's not a joke, we need…
It's not a joke, we need clear information about an issue in order to investigate it without wasting too much time looking into the wrong direction. For example the first comment talked about "Safest" but now it doesn't seem related to the security level anymore.
Anyway, I opened a ticket to track this issue:
https://trac.torproject.org/projects/tor/ticket/32530#ticket
Is this a new issue with Tor Browser 9.0, or did this happen with older versions of Tor Browser too?
new issue
new issue
If you visit this page:http:…
If you visit this page:
http://dmlinking.net/~pe1rxq/video.html
Is the line
video/webm; codecs="vp9"
in green?yeah
yeah
reproduced that on a clean…
reproduced that on a clean new 9.5a2 Win 7 32-bit, console error appeared on safer levels.
So on the standard level the…
So on the standard level the video still does not work, but in this case you don't have the console error?
yes
yes
Rename New Identity broom,…
Rename New Identity broom, please, because it has a name conflict with Identity Indicator in Firefox < 70: https://blog.mozilla.org/security/2019/10/15/improved-security-and-priv…
According to that post, the…
According to that post, the panel is titled "Site Information". The post's author uses the word "identity" simply to describe some things in the panel. Moreover, the panel is clearly about the site's credentials and not the user. I don't think renaming is necessary.
Hallo Leute Nachdem ich…
Hallo Leute
Nachdem ich euren neuen tor browser auf mein Handy samsung s2 neu installiert habe funktioniert er nicht mehr!
Der Tor browser bleibt mit der Meldung:Tor Programm wird gestartet...
Abgeschlossen
stehen.
Was ist passiert?
Vier mal neu installiert und geht nicht. ...
What Android version…
What Android version/operating system are you running on it? I wonder whether your issue is another instance of https://trac.torproject.org/projects/tor/ticket/32331.
Android 4.1.2
Android 4.1.2
Do you see any log messages…
Do you see any log messages if you swipe on your screen from the right to the left? There should be status messages visible about what Tor is trying to do.
Oh, and I've filed a ticket…
Oh, and I've filed a ticket in our bug tracker https://trac.torproject.org/projects/tor/ticket/32348.
Since the new version (9x)…
Since the new version (9x) my
about:config
settings like (proxy.type, remote_dns) get reset every browser re-start.Please tell me how to make them stick. What is resetting them to defaults?
undefined is not a valid URL…
undefined is not a valid URL. background.js:321
onBeforeRequest moz-extension://[uuid]/background-scripts/background.js:321
apply self-hosted:4417
applySafeWithoutClone resource://gre/modules/ExtensionCommon.jsm:588
fire resource://gre/modules/ExtensionChild.jsm:1171
receiveMessage resource://gre/modules/ExtensionChild.jsm:1175
_callHandlers resource://gre/modules/MessageChannel.jsm:914
_callHandlers resource://gre/modules/MessageChannel.jsm:913
promise resource://gre/modules/MessageChannel.jsm:992
_handleMessage resource://gre/modules/MessageChannel.jsm:989
_handleMessage self-hosted:1005
receiveMessage resource://gre/modules/MessageChannel.jsm:225
forEach self-hosted:266
receiveMessage resource://gre/modules/MessageChannel.jsm:218
untested NoScript jumped in...
FUCKING NOSCRIPT!https:/…
FUCKING NOSCRIPT!
https://forums.informaction.com/viewtopic.php?f=10&t=25779
please fix torbirdy in…
please fix torbirdy in thurderbird 68 - thanks
I verified my download of…
I verified my download of TBB using checksum & signing key. Both passed.
I searched the sha256 sum on DDG and got a mismatch, so I'm concerned I could have a MITM TBB,key ect.
ME =
sha256sum tor-browser-linux64-9.0_en-US.tar.xz
670d5c53d989f70eaffd7052f911c5d36b70b17af6cc5691fd8a5d5acc5c5229 tor-browser-linux64-9.0_en-US.tar.xz
What I see on DDG =
sha256sum tor-browser-linux64-9.0_en-US.tar.xz
072d2a349f7b6dbf465a4600e6e2b68a030aebc4e36a289fa4f4c2933040f161
ps
I dislike the removal of cookie enable/disable option
no access to noscript,https everywhere buttons
I know customization is a threat to fingerprinting but daaamn. cookies on always unless we about:config? that sucks and makes tracking easier imo.
670d5c53d989f70eaffd7052f911…
670d5c53d989f70eaffd7052f911c5d36b70b17af6cc5691fd8a5d5acc5c5229 is correct. https://dist.torproject.org/torbrowser/9.0/sha256sums-signed-build.txt (verify the signature, too, if you are concerned). Where did you find the link on DDG?
Regarding cookies, only first party cookies are allowed, third-party cookies are denied. If you are concerned about first-party cookies then restarting the browser or using New Identity will clear them.
> I searched the sha256 sum…
> I searched the sha256 sum on DDG and got a mismatch
That's because DDG's instant answer (by typing your SHA command in its search box) takes the hash of the *text string* you typed. You could tell it to find the sha256sum of the nonexistent tor version "alice42-9.9.9" and it will return a hash because it calculates based on the text characters.
On your machine, at a terminal/command prompt, this will calculate the sha256 of the text string of your value and return the 072... hash that DDG returned:
$ echo -n 'tor-browser-linux64-9.0_en-US.tar.xz' | sha256sum -t
In contrast, this will look for the file with that name in your working directory and calculate the sha256 of the *contents* of the file, which is what you actually want:
$ sha256sum tor-browser-linux64-9.0_en-US.tar.xz
NetworkHelper…
NetworkHelper.getReasonsForWeakness threw an exception: STATE_IS_BROKEN without a known reason. Full state was: 1 ThreadSafeDevToolsUtils.js:90:13
reportException resource://devtools/shared/ThreadSafeDevToolsUtils.js:90
getReasonsForWeakness resource://devtools/shared/webconsole/network-helper.js:795
parseSecurityInfo resource://devtools/shared/webconsole/network-helper.js:620
_getSecurityInfo resource://devtools/server/actors/network-monitor/network-response-listener.js:329
makeInfallible resource://devtools/shared/ThreadSafeDevToolsUtils.js:111
onStartRequest resource://devtools/server/actors/network-monitor/network-response-listener.js:226
Could you guys add a button…
Could you guys add a button to about:tor for checking Tor (opens check.torproject.org in a new tab) like Tails has it on their website when you're using Tails?
That page used to be Tor…
That page used to be Tor Browser's new-window homepage as about:tor is today. I don't think there is a reason for it anymore (except for new users) because the browser is not opened until after tor connects, and the browser is configured to make all connections through tor. Once it's open, new installs show introduction slides, and users can check the proxy preferences and drop-down circuit display. Users could bookmark that page or change Preferences to set that page as the browser's homepage and customize the toolbar to drag the Home button into view. If a virus infects the machine and changes the files, you have bigger problems unrelated to Tor.
addons.update-checker …
addons.update-checker WARN Request failed: https://www.eff.org/files/https-everywhere-updates.json - TypeError: secInfo.succeededCertChain is null
I can't reproduce this issue.
I can't reproduce this issue.
intermittent, of course.
intermittent, of course.