Tor Browser come exciting changes!

If you are using Tor Browser on MacOS or Linux, you should upgrade to 7.0.9 version. The software, based on Firefox, can "accidentally" leak the real public your IP via malicious file:// URLs.

"The messages of our sandboxed-tor-browser users and users are not affected," says the Tor Project.Tor Browser

After the above news, let's move on to more enjoyable news:

Next up we'll see Tor Browser's biggest update to date, which is said to add additional layers ς

Tor Browser developers currently have the alpha version that promises optimization in the anonymous network for the first time in the last 10 years!

The change log of Tor Browser provides a very good overview of the upcoming modifications. Some of these are intended to address newly identified security weaknesses in the protocol, such as the loophole mentioned at the beginning.

With enough malicious nodes, an opponent could begin mapping paths and thereby reduce anonymity. The upcoming update will make this type of attack much harder, if not impossible.

"It's not a revolution, it's more an evolution," said Professor Alan Woodward, a computer scientist at the University of Surrey.

“It has some interesting new features, mainly related to customer authenticity () and the extensibility of something that can help with onion security.”

In a blog post published on Thursday, Tor's developers promise additional innovations.

"As the current code is further stabilized, we plan to add features such as offline service keys, advanced client authorization, control port interface, enhanced security algorithms, secure naming systems, statistics, latency routing, blockchain support, V logic and AI. We plan to do it slowly, as there is a lot to do. ”

Tor Network and Tor Browser
Tor (abbreviation of The onion router) is a system that allows its users to anonymity on the Internet.

The Tor client software routes web traffic through a global voluntary network of servers to hide a user's location or traffic usage from anyone conducting online or web traffic analysis.

Using Tor makes it difficult to trace the user's online activity, including visits to a web site, online posts, instant messaging programs and other online communication tools, and is intended to protect the individual's freedom, privacy and user ability to conduct confidential work without registering its online activities.

"Onion routing" refers to the stratified nature of the encryption service: the original data is encrypted and re-encrypted multiple times, then sent through successive Tor nodes, each decrypting an encryption layer before transferring the data to the next node, and finally to their destination.

This reduces the likelihood of deciphering or understanding the original data during transfer. Tor is free client software and its use is free of charge.

Information from WikiPedia

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).