Tor Browser come exciting changes!

If you are using Tor Browser on MacOS or Linux, you should upgrade to 7.0.9 version. Firefox-based software can "accidentally" leak your real public IP address through malicious files: // URLs.

"The messages of our sandboxed-tor-browser users and users are not affected," says the Tor Project.Tor Browser

After the above news, let's move on to more enjoyable news:

Next time we will see the biggest one of the Tor Browser released to date, which is said to add additional layers of security

Tor Browser developers currently have the promised alpha version on the anonymization network for the first time in 10 years!

The change log of Tor Browser provides a very good overview of the upcoming changes. Some of these are aimed at addressing newly identified security flaws in the protocol, such as the security gap we mentioned at the beginning.

With enough malicious nodes, an opponent could begin mapping paths and thereby reduce anonymity. The upcoming update will make this type of attack much harder, if not impossible.

"It's not a revolution, it's more an evolution," said Professor Alan Woodward, a computer scientist at the University of Surrey.

"It has some interesting new features, mainly related to client authenticity and scalability, which can help onion security."

In a blog post published on Thursday, Tor's developers promise additional innovations.

"As the current code is further stabilized, we plan to add features such as offline service keys, advanced client authorization, control port interface, enhanced security algorithms, secure naming systems, statistics, latency routing, blockchain support, V logic and AI. We plan to do it slowly, as there is a lot to do. ”

Tor Network and Tor Browser
Tor (abbreviation of The onion router) is a system that allows its users to anonymity on the Internet.

Tor client software launches online traffic through a global, voluntary network of servers to hide a user's location or use of traffic from anyone who conducts online web traffic analysis or analysis.

Using Tor makes it difficult to track a user's online activity, including website visits, web posts, instant messaging and other online media, and is intended to protect the individual freedom, privacy and ability of the user to conduct confidential work without recording his / her online activities.

“Onion routing” refers to its layered nature ς s: the original data is encrypted and re-encrypted multiple times, then sent through successive Tor nodes, each of which decrypts a "layer" of encryption before passing the data on to the next node and finally to its destination.

This reduces the likelihood of deciphering or understanding the original data during transfer. Tor is free client software and its use is free of charge.

Information from WikiPedia

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).