Tech

Tor Browser 13.0 Obtain | TechSpot

[ad_1]

Tor is a community of digital tunnels that enables folks and teams to enhance their privateness and safety on the Web. It additionally permits software program builders to create new communication instruments with built-in privateness options.

How does the Tor Browser hold my web exercise nameless?

The Tor Browser makes use of the Tor community, which consists of greater than six thousand relays situated worldwide, to cover the customers’ location and on-line site visitors. This ensures anonymity and avoids your actions from being seen by others.

What’s Tor Browser?

The Tor Browser is the flagship product from the Tor Challenge. The net browser relies on a modified model of Mozilla Firefox ESR that features extras just like the Tor proxy, TorButton, TorLauncher, NoScript, and HTTPS In every single place extensions.

Who makes use of the Tor Browser?

With Tor Browser having made Tor extra accessible to on a regular basis web customers and activists, Tor was an instrumental instrument in the course of the Arab Spring starting in late 2010. It not solely protected folks’s id on-line but in addition allowed them to entry essential sources, social media, and web sites which had been blocked.

People use Tor to maintain web sites from monitoring them and their members of the family, or to hook up with information websites, instantaneous messaging companies, or the like when these are blocked by their native Web suppliers. Tor’s hidden companies let customers publish websites and different companies with no need to disclose the placement of the location. People additionally use Tor for socially delicate communication: chat rooms and internet boards for rape and abuse survivors, or folks with diseases.

Journalists use Tor to speak extra safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to permit their employees to hook up with their residence web site whereas they’re out of the country, with out notifying all people close by that they are working with that group.

Teams similar to Indymedia suggest Tor for safeguarding their members’ on-line privateness and safety. Activist teams just like the Digital Frontier Basis (EFF) suggest Tor as a mechanism for sustaining civil liberties on-line. Companies use Tor as a protected strategy to conduct aggressive evaluation, and to guard delicate procurement patterns from eavesdroppers. In addition they use it to switch conventional VPNs, which reveal the precise quantity and timing of communication. Which places have workers working late? Which places have workers consulting job-hunting web sites? Which analysis divisions are speaking with the corporate’s patent legal professionals?

A department of the U.S. Navy makes use of Tor for open supply intelligence gathering, and one among its groups used Tor whereas deployed within the Center East lately. Legislation enforcement makes use of Tor for visiting or surveilling websites with out leaving authorities IP addresses of their internet logs, and for safety throughout sting operations.

Is Tor higher than a VPN?

Tor just isn’t a VPN. Tor is a free browser much like Chrome or Firefox, however it contains options that encrypt your IP handle, making your shopping classes personal. A VPN (Digital Personal Community) is software program that may change your IP handle if you use any browser put in in your PC. To be taught extra about VPNs, you may learn this article.

What’s New

That is our first secure launch primarily based on Firefox ESR 115, incorporating a yr’s price of adjustments shipped upstream. As a part of this course of we have additionally accomplished our annual ESR transition audit, the place we evaluate Firefox’s changelog for points which will negatively have an effect on the privateness and safety of Tor Browser customers and disable any problematic patches the place crucial. Our last stories from this audit are actually out there within the tor-browser-spec repository on our Gitlab occasion.

Notably notable are the accessibility enhancements we have gained on account of the transition to Firefox ESR 115. Whereas eagle-eyed customers could discover small visible adjustments to the person interface (for instance, inner hyperlinks are actually underlined), Tor Browser 13.0 is our first launch to inherit the redesigned accessibility engine launched by Mozilla in Firefox 113. This modification guarantees to enhance efficiency considerably for individuals who use display screen readers and different assistive know-how.

Refreshed software icons

Earlier this yr we spent a while artworking the Mullvad Browser brand into the varied belongings wanted to help its launch – together with software, installer and doc icons that conform to every platform’s conventions. Whereas getting up to the mark with the present necessities for every platform, we recognized various gaps with Tor Browser too, and began engaged on new icons for Tor Browser in parallel.

For context, Tor Browser’s present icon (generally known as the “onion brand”) was chosen by neighborhood ballot over 4 years in the past to succeed the older purple and inexperienced globe in Tor Browser 8.5. Given the neighborhood’s involvement in its choice, its recognizability by netizens, and the easy proven fact that we nonetheless love the prevailing icon, we selected to deal with refining somewhat than changing it fully.

One of many motivations behind work like that is our philosophy that privacy-preserving merchandise should not be purely utilitarian, however may spark pleasure. Nevertheless there are sensible advantages too: adhering to platform conventions gives higher consistency, discernible software and installer icons assist stop person error, and attracting new customers advantages everybody as a result of anonymity loves firm.

New homepage

For the previous yr we have been engaged on a big rewrite of Tor Browser’s back-end, which lately offered us with the chance to rebuild one of many few inner pages that hasn’t modified shortly: the homepage (typically referred to by its inner reference, “about:tor”). Tor Browser 13.0’s homepage now options the brand new software icons, a simplified design, and the flexibility to “onionize” your DuckDuckGo searches by switching to the DuckDuckGo onion website. Persevering with the work that started in Tor Browser 12.5 to enhance the browser’s accessibility, the redesigned homepage additionally affords higher help for customers of display screen readers and different assistive know-how too.

Current Tor Browser customers can rejoice that the “purple display screen of loss of life” – an notorious error state that the earlier homepage would often journey itself into – is lengthy gone. As a part of the back-end rewrite we have eliminated the automated Tor community connectivity examine that was a hold-over from the legacy tor-launcher, the place bootstrapping was dealt with by an extension that ran earlier than the browser interface appeared. On account of the tighter tor integration and in-browser bootstrapping expertise launched in Tor Browser 10.5, the outdated logic behind this examine would typically fail and current some customers with the purple display screen of loss of life, even when their connection was advantageous.

Actually, all the stories we have obtained of customers hitting this display screen with the default tor configuration since Tor Browser 10.5 have confirmed to be false positives, inflicting undue alarm. Though the examine is arguably nonetheless helpful for customers operating non-default configurations, neither of the principle environments which achieve this – Tails and Whonix – use about:tor as their default new-tab or residence pages. For everybody else, we have added a brand new banner to the redesigned homepage instead of the purple display screen of loss of life to examine that tor is related and dealing as anticipated.

Greater new home windows

The reason for the way and why Tor Browser works this fashion goes to get into the weeds a little bit, so be warned. Nevertheless the principle factor to remove is that new home windows ought to be larger by default and current themselves in a extra helpful panorama aspect-ratio for almost all of desktop customers in Tor Browser 13.0. Now, about these weeds…

Letterboxing was launched in Tor Browser 9.0 to permit customers to resize their browser window with out concern of being fingerprinted by rounding the interior content material window (generally known as the “viewport”) all the way down to multiples of 200 x 100 pixels. This system works by grouping the window sizes of most customers right into a collection of frequent “buckets”, defending particular person customers inside these buckets from being singled-out primarily based on their window or display screen dimension.

As a way to protect these protections when opening new home windows, Tor Browser overrides platform defaults and can as a substitute choose a dimension that conforms to our letterboxing steps as much as a most of 1000 x 1000 pixels. Nevertheless, whereas which will have been advantageous prior to now, a max width of 1000px is not appropriate for the trendy internet. For instance, on many more moderen web sites the primary responsive break level lies someplace within the vary of 1000 – 1200px, that means by default Tor Browser customers would obtain web site menus and layouts meant for pill and cellular units. Alternatively, on sure web sites, customers would obtain the desktop model however with the annoyance of a horizontal scroll bar as a substitute. This, naturally, would result in customers of those web sites needing to develop every new window manually earlier than it is usable.

In response we have bumped up the max dimension of latest home windows as much as 1400 x 900 pixels and amended the letterboxing steps to match. Because of the rise in width, Tor Browser for desktop ought to not set off responsive break factors on bigger screens and the overwhelming majority of our desktop customers will see a well-known panorama aspect-ratio extra in-keeping with fashionable browsers. This explicit dimension was chosen by crunching the numbers to supply larger actual property for brand new home windows with out rising the variety of buckets previous the purpose of their usefulness. As an added bonus, we additionally count on that Tor Browser customers is not going to really feel the necessity to manually change their window dimension as often as earlier than – thereby maintaining extra customers aligned to the default buckets.

All Platforms

  • Up to date tor to 0.4.8.7
  • Up to date OpenSSL to three.0.11
  • Bug tor-browser-spec#40050: FF103 Audit
  • Bug tor-browser-spec#40051: FF104 Audit
  • Bug tor-browser-spec#40052: FF105 Audit
  • Bug tor-browser-spec#40053: FF106 Audit
  • Bug tor-browser-spec#40054: FF107 Audit
  • Bug tor-browser-spec#40055: FF108 Audit
  • Bug tor-browser-spec#40056: FF109 Audit
  • Bug tor-browser-spec#40057: FF110 Audit
  • Bug tor-browser-spec#40058: FF111 Audit
  • Bug tor-browser-spec#40059: FF112 Audit
  • Bug tor-browser-spec#40060: FF113 Audit
  • Bug tor-browser-spec#40061: FF114 Audit
  • Bug tor-browser-spec#40062: FF115 Audit
  • Bug tor-browser#26277: When “Most secure” setting is enabled looking out utilizing duckduckgo ought to at all times use the Non-Javascript website for searches
  • Bug tor-browser#40577: Add “counsel url” in DDG onion’s manifest
  • Bug tor-browser#40938: Migrate remaining torbutton performance to tor-browser
  • Bug tor-browser#41092: Allow monitoring question parameters stripping
  • Bug tor-browser#41327: Disable UrlbarProviderInterventions
  • Bug tor-browser#41399: Replace Mozilla’s patch for Bug 1675054 to allow brotli encoding for HTTP onions as properly
  • Bug tor-browser#41477: Evaluate some extensions.* preferences
  • Bug tor-browser#41496: Evaluate 000-tor-browser.js and 001-base-profile.js for 115
  • Bug tor-browser#41576: ESR115: guarantee no distant requires climate & addon solutions
  • Bug tor-browser#41605: Take away unused belongings from torbutton (preferences-mobile.css)
  • Bug tor-browser#41675: Take away javascript.choices.large_arraybuffers
  • Bug tor-browser#41727: WebRTC privacy-hardening settings
  • Bug tor-browser#41740: ESR115: change devicePixelRatio spoof to 2 in alpha for testing
  • Bug tor-browser#41752: Evaluate adjustments completed by Bug 41565
  • Bug tor-browser#41796: Rebase Tor Browser to Firefox 115
  • Bug tor-browser#41797: Lock RFP in launch builds
  • Bug tor-browser#41934: Websocket raises DOMException on http onions in 13.0a1
  • Bug tor-browser#41936: Evaluate Mozilla 1770158: Use double-conversion library as a substitute of dtoa for string-to-double conversion
  • Bug tor-browser#41937: Evaluate Mozilla 1780014: Add particular telemetry for conservative and first-try handshakes
  • Bug tor-browser#41938: Evaluate Mozilla 1769994: On methods with IPv6 most well-liked DNS decision shoppers will fail to attach when “localhost” is used as host for the WebSocket server
  • Bug tor-browser#41939: Evaluate Mozilla 1728871: Help fetching information from Distant Setting
  • Bug tor-browser#41941: Evaluate Mozilla 1775254: Enhance Math.pow accuracy for giant exponents
  • Bug tor-browser#41943: Lock javascript.choices.spectre.disable_for_isolated_content to false
  • Bug tor-browser#41945: Evaluate Mozilla 1783019: Add a cookie banner service to mechanically deal with web site cookie banners
  • Bug tor-browser#41946: Evaluate Mozilla 1782579: Add a locale parameter to the textual content recognition API
  • Bug tor-browser#41947: Evaluate Mozilla 1779005: Damaged since Firefox 102.0: no instantaneous fallback to direct connection when proxy grew to become unreachable whereas runtime
  • Bug tor-browser#41950: Evaluate Mozilla 1788668: Add the chance to examine that the clipboard incorporates some pdfjs stuff
  • Bug tor-browser#41951: Evaluate Mozilla 1790681: Allow separatePrivateDefault by default
  • Bug tor-browser#41959: Evaluate Mozilla 1795944: Take away descriptionheightworkaround
  • Bug tor-browser#41960: Evaluate Mozilla 1797896: Proxy surroundings variables ought to be higher case / case insensitive
  • Bug tor-browser#41961: Evaluate Mozilla 1798868: Cover cookie banner dealing with UI by default
  • Bug tor-browser#41969: Evaluate Mozilla 1746983: Re-enable pingsender2
  • Bug tor-browser#41970: Evaluate Mozilla 17909270: WebRTC bypasses Community settings & proxy.onRequest
  • Bug tor-browser#41984: Rename languageNotification.ftl to base-browser.ftl
  • Bug tor-browser#42013: Evaluate Mozilla 1834374: Don’t name EmptyClipboard() in nsBaseClipboard destructor
  • Bug tor-browser#42014: Evaluate Mozilla 1832791: Implement a Distant Settings for the Quarantined Domains pref
  • Bug tor-browser#42015: Evaluate Mozilla 1830890: Maintain a historical past window of WebRTC stats for about:webrtc
  • Bug tor-browser#42019: Empty browser’s clipboard on browser shutdown
  • Bug tor-browser#42026: Disable cookie banner service and UI.
  • Bug tor-browser#42029: Protection-in-depth: disable non-proxied UDP WebRTC
  • Bug tor-browser#42034: aboutTBUpdate.dtd is duplicated
  • Bug tor-browser#42043: Disable gUM: media.units.enumerate.legacy.enabled
  • Bug tor-browser#42061: Transfer the alpha replace channel creation to a commit by itself
  • Bug tor-browser#42084: Race situation with language preferences could make spoof_english ineffective
  • Bug tor-browser#42085: NEWNYM sign lacking on Whonix
  • Bug tor-browser#42094: Disable media.aboutwebrtc.hist.enabled as safety in-depth
  • Bug tor-browser#42120: Use foursquare as area entrance for snowflake
  • Bug tor-browser-build#40887: Replace Webtunnel model to 38eb5505

Home windows + macOS + Linux

  • Up to date Firefox to 115.3.1esr
  • Bug tor-browser#30556: Re-evaluate letterboxing dimension decisions
  • Bug tor-browser#32328: Enhance error restoration from the purple display screen of loss of life
  • Bug tor-browser#33282: Enhance the max width of latest home windows
  • Bug tor-browser#33955: Deciding on “Copy picture” from menu leaks the supply URL to the clipboard. This information is usually dereferenced by different functions.
  • Bug tor-browser#40175: Connections in reader mode will not be FPI
  • Bug tor-browser#40982: Cleanup maps in tor-circuit-display
  • Bug tor-browser#40983: Transfer not UI-related torbutton.js code to modules
  • Bug tor-browser#41165: Crash with debug assertions enabled
  • Bug tor-browser#41333: Modernize Tor Browser’s new-tab web page (about:tor)
  • Bug tor-browser#41423: about:tor semantic and accessibility issues
  • Bug tor-browser#41528: Onerous-coded English “primarily based on Mozilla Firefox” seems in model in “About” dialog
  • Bug tor-browser#41581: ESR115: work out extension pinning / unified Extensions
  • Bug tor-browser#41639: Repair the wordmark (title and background) of the “About Tor Browser” window
  • Bug tor-browser#41642: Don’t cover new PBM within the hamburger menu if auto PBM just isn’t enabled
  • Bug tor-browser#41651: Use moz-toggle in connection preferences
  • Bug tor-browser#41691: “Firefox Recommend” textual content showing in UI
  • Bug tor-browser#41717: Bookmark toolbar visibility on new tabs just isn’t honored when new tab web page just isn’t about:clean
  • Bug tor-browser#41739: Take away “Web site look”
  • Bug tor-browser#41741: Refactor the area isolator and new circuit
  • Bug tor-browser#41765: TTP-02-006 WP1: Info leaks through customized homepage (Low)
  • Bug tor-browser#41766: TTP-02-001 WP1: XSS in TorConnect’s captive portal (Information)
  • Bug tor-browser#41771: Determine what to do for firefoxview
  • Bug tor-browser#41774: Cover the brand new “Switching to a brand new gadget” assist menu merchandise
  • Bug tor-browser#41791: Copying web page contents additionally places the supply URL on the clipboard
  • Bug tor-browser#41812: Evaluate format for XUL parts
  • Bug tor-browser#41813: Look out for hyperlinks lacking underlines in ESR 115-based alphas
  • Bug tor-browser#41821: Repair the proxy kind within the proxy modal of about:preferences in 13.0
  • Bug tor-browser#41822: The default browser button got here again on 115
  • Bug tor-browser#41833: Reload extensions on new id
  • Bug tor-browser#41834: Cover “Cannot Be Eliminated – be taught extra” menu line for uninstallable add-ons
  • Bug tor-browser#41842: Take away the outdated elimination logics from Torbutton
  • Bug tor-browser#41844: Cease utilizing the management port immediately
  • Bug tor-browser#41845: Cease forcing (dangerous) pref values for non-PBM customers
  • Bug tor-browser#41852: Evaluate the Tor Verify Service UX
  • Bug tor-browser#41864: TOR_CONTROL_HOST and TOR_SOCKS_HOST don’t work as anticipated when the browser launches tor
  • Bug tor-browser#41865: Use –text-color-deemphasized somewhat than –panel-description-color
  • Bug tor-browser#41874: Visible & A11 regressions in add-on badges
  • Bug tor-browser#41876: Take away Firefox View from title bar
  • Bug tor-browser#41877: NoScript appears to be blocking by default within the first 115-based testbuild
  • Bug tor-browser#41881: Developer instruments/Community/New Request remembers requests
  • Bug tor-browser#41886: Downloads drop-down panel has new-line/line-break between each phrase within the ‘Watch out opening downloads’ warning
  • Bug tor-browser#41904: The log textarea would not resize anymore
  • Bug tor-browser#41906: Cover about:preferences#privateness > DNS over HTTPS part
  • Bug tor-browser#41907: The bootstrap is interrupted with none errors if the method turns into prepared when already bootstrapping
  • Bug tor-browser#41912: “Use Present Bridges” is proven for customers even when there are no present bridges
  • Bug tor-browser#41922: Unify the bridge line parsers
  • Bug tor-browser#41923: The trail normalization leads to warnings
  • Bug tor-browser#41924: Small refactors for TorProcess
  • Bug tor-browser#41925: Take away the torbutton startup observer
  • Bug tor-browser#41926: Refactor the management port consumer implementation
  • Bug tor-browser#41931: Regression: new window leaks outer window
  • Bug tor-browser#41935: Enhance new window & letterboxing dimensions
  • Bug tor-browser#41940: Evaluate Mozilla 1739348: When a filetype is ready to “at all times ask” and the person makes a save/open selection within the dialog, we should always not additionally open the downloads panel
  • Bug tor-browser#41949: Evaluate Mozilla 1782578: Implement a context menu modal for textual content recognition
  • Bug tor-browser#41954: Inputs within the request a bridge dialog are cut-off in 13.0 alpha
  • Bug tor-browser#41957: Revert to Fx’s default id block type for inner pages
  • Bug tor-browser#41958: Console error when closing tor browser with about:preferences open
  • Bug tor-browser#41964: emojiAnnotations not outlined in time in connection preferences
  • Bug tor-browser#41965: TorConnect error when opening browser instruments
  • Bug tor-browser#41971: Replace Tails URL in downloads warning
  • Bug tor-browser#41973: Customized wingpanels do not line up with their toolbar icons in 13.0 alpha
  • Bug tor-browser#41974: De-emphasized textual content in customized parts is not grey in 13.0 alpha
  • Bug tor-browser#41975: Downloads warning textual content too slender in 13.0 alpha
  • Bug tor-browser#41976: Backside padding on collapsed bridge playing cards has elevated in 13.0 alpha
  • Bug tor-browser#41977: Cover the “Study extra” hyperlink in bridge playing cards
  • Bug tor-browser#41980: Circuit show headline is misaligned in 13.0 alpha
  • Bug tor-browser#41981: Evaluate Mozilla 1800675: Add about:preferences entry for cookie banner dealing with
  • Bug tor-browser#41983: Evaluate Mozilla 1770447: Create a reusable “support-link” widget
  • Bug tor-browser#41986: Repair the management port password dealing with
  • Bug tor-browser#41994: CSS (and different belongings) of some web sites blocked in 13.0 alpha
  • Bug tor-browser#42022: Forestall extension engines like google from breaking the entire search system
  • Bug tor-browser#42027: Create a Base Browser model of migrateUI
  • Bug tor-browser#42037: Disable about:firefoxview
  • Bug tor-browser#42041: TBB –allow-remote mixes up with plain Firefox
  • Bug tor-browser#42045: Circuit panel overflows with lengthy ipv6 addresses
  • Bug tor-browser#42046: Take away XUL format hacks from base browser
  • Bug tor-browser#42047: Take away format hacks from tor browser preferences
  • Bug tor-browser#42050: Deliver again Save As… dialog as default
  • Bug tor-browser#42073: Add simplified onion sample to the brand new homepage
  • Bug tor-browser#42075: Repair hyperlink spacing and underline on new homepage
  • Bug tor-browser#42079: TorConnect: deal with switching from Bootstrapped to Configuring state
  • Bug tor-browser#42083: RemoteSecuritySettings.init throws error in console
  • Bug tor-browser#42091: Onion authorization immediate overflows
  • Bug tor-browser#42092: Onion companies key desk show issues.
  • Bug tor-browser#42098: Implement Home windows installer icons
  • Bug tor-browser#42100: Join Help dropdown textual content not centered
  • Bug tor-browser#42102: TorProcess says the SOCKS port just isn’t legitimate though it’s
  • Bug tor-browser#42109: Onion companies keys desk has empty column headers.
  • Bug tor-browser#42110: Add a utility module for shared UI strategies wanted for a number of tor browser parts
  • Bug tor-browser#42126: moat and join help damaged for individuals who cannot attain area entrance
  • Bug tor-browser#42129: Disable the Tor restart immediate if shouldStartAndOwnTor is fake
  • Bug tor-browser#42131: Tor Browser 13.0a5 doesn’t monitor circuits created earlier than Tor Browser began
  • Bug tor-browser#42132: The brand new management port dealing with in Tor Browser 13 breaks a Tails safety characteristic
  • Bug tor-browser#42138: Disable apz.overscroll.enabled pref
  • Bug tor-browser#42155: Drop the unused code for the outdated bridge elimination warning
  • Bug tor-browser#42159: Responsive Design Mode not working appropriately
  • Bug tor-browser#42160: Enable specifying a TOR_PROVIDER=none to configure solely the proxy settings in the course of the TorProviderBuilder initialization
  • Bug tor-browser#42166: New id dialog lacking accessible title
  • Bug tor-browser#42167: Make the desire auto-focus extra dependable
  • Bug tor-browser-build#40821: The replace particulars URL is flawed in alphas
  • Bug tor-browser-build#40893: Replace (Noto) fonts for 13.0
  • Bug tor-browser-build#40924: Customise MOZ_APP_REMOTINGNAME as a substitute of passing –name and –class
  • Bug tor-browser-build#40938: Copy the brand new tor-browser.ftl file to the suitable listing

Home windows + Android

  • Bug tor-browser-build#40930: Upate zlib to 1.3 after 13.0a3

Home windows

  • Bug tor-browser#40737: Revert backout of Mozilla’s repair for bug 1724777
  • Bug tor-browser#41658: Create new installer icons for Home windows
  • Bug tor-browser#41798: Cease constructing private_browsing.exe on Home windows
  • Bug tor-browser#41806: Forestall Personal Shopping begin menu merchandise to be added mechanically
  • Bug tor-browser#41942: Evaluate Mozilla 1682520: Use the WER runtime exception module to catch early crashes
  • Bug tor-browser#41944: Evaluate Mozilla 1774083: Add Surrogate COM Server to deal with native Home windows notifications when Firefox is closed.
  • Bug tor-browser#42008: Evaluate Mozilla 1808146: Copying photographs from Pixiv and pasting them in sure packages is damaged
  • Bug tor-browser#42010: Evaluate Mozilla 1810641: Allow overscroll on Home windows on all channels
  • Bug tor-browser#42087: Implement Home windows software icons
  • Bug tor-browser-build#40954: Implement Home windows installer icons

macOS

  • Bug tor-browser#41948: Evaluate Mozilla 1782981: Cover the textual content recognition context menu if the macOS model would not help APIs
  • Bug tor-browser#41955: Replace macOS quantity window background
  • Bug tor-browser#41982: Evaluate Mozilla 1762392: Add Cocoa platform help for paste information
  • Bug tor-browser#42057: Disable Platform text-recognition performance
  • Bug tor-browser#42078: Implement MacOS software icons
  • Bug tor-browser#42147: Add browser.helperApps.deleteTempFileOnExit to our profile

Linux

  • Bug tor-browser#41509: After replace, KDE Plasma identifies Tor Browser Nightly window group as “firefox-nightly”
  • Bug tor-browser#41884: Linux: set browser.tabs.searchclipboardfor.middleclick to false
  • Bug tor-browser#42088: Implement Linux software icons
  • Bug tor-browser-build#40576: Fontconfig warning: take away ‘clean’ configuration

Android

  • Up to date GeckoView to 115.3.1esr
  • Bug tor-browser#41878: firefox-mobile: refactor tor bootstrap off deleted onboarding path
  • Bug tor-browser#41882: Replace DuckDuckGo icons
  • Bug tor-browser#41911: Firefox-Android tor bootstrap join button css damaged
  • Bug tor-browser#41928: Backport Android-specific safety fixes from Firefox 116 to ESR 102.14 / 115.1 – primarily based Tor Browser
  • Bug tor-browser#41972: Disable Firefox onboarding in 13.0
  • Bug tor-browser#41990: Evaluate Mozilla 1811531: Add ‘website’ question parameter to Pocket sponsored tales request
  • Bug tor-browser#41991: Evaluate Mozilla 1812518: Enable a customized View for third social gathering downloads
  • Bug tor-browser#41993: Evaluate Mozilla 1810761: Add API for saving a PDF
  • Bug tor-browser#41996: App contains com.google.android.gms.permission.AD_ID permission
  • Bug tor-browser#41997: com.alter.sdk.Alter library permits AD_ID permission though we aren’t utilizing it
  • Bug tor-browser#41999: TB13.0a2 android: middle textual content on join button
  • Bug tor-browser#42001: Cover ‘Open hyperlinks in exterior app’ settings choice and drive defaults
  • Bug tor-browser#42002: Evaluate Mozilla 1809305: Enable person to repeat a picture to the clipboard
  • Bug tor-browser#42003: Evaluate Mozilla 1819431: Reimplement default browser notification with Nimbus Messaging equal
  • Bug tor-browser#42004: Evaluate Mozilla 1818015: Use a customized tab or the view we use for Sync onboarding for the Privateness button
  • Bug tor-browser#42005: Evaluate Mozilla 1816932: Add Maps to app hyperlinks frequent sub domains
  • Bug tor-browser#42006: Evaluate Mozilla 1817726: Enable sharing present tab URL from Android’s Recents (App Overview) display screen.
  • Bug tor-browser#42007: Evaluate Mozilla 1805450: Enable customers to submit website help requests in Fenix
  • Bug tor-browser#42012: Evaluate Mozilla 1810629: add an Android shortcut to go straight to the login and passwords web page
  • Bug tor-browser#42016: Evaluate Mozilla 1832069: Implement Google Play Referrer Library to fetch referrer URL
  • Bug tor-browser#42018: Rebase Firefox for Android to 115.2.1
  • Bug tor-browser#42023: Take away FF what’s new from Android
  • Bug tor-browser#42038: TBA Alpha – inscriptions Tor Browser Alpha and FireFox Browser concurrently on the beginning display screen
  • Bug tor-browser#42074: YEC 2023 Takeover for Android Steady
  • Bug tor-browser#42076: Theme is seen in choices, however should not be
  • Bug tor-browser#42089: Disable the Cookie Banner Discount website help requests (Mozilla 1805450)
  • Bug tor-browser#42114: Disable Enable sharing present tab URL from Android’s Recents display screen in personal shopping mode
  • Bug tor-browser#42115: Enhanced Monitoring Safety can nonetheless be enabled
  • Bug tor-browser#42122: playstore console crashes: java.lang.NoSuchMethodError
  • Bug tor-browser#42133: Take away “Complete Cookie Safety” popup
  • Bug tor-browser#42134: Take away Android icon shortcuts
  • Bug tor-browser#42156: Screenshot permitting nonetheless blocks homescreen (android)
  • Bug tor-browser#42157: Repair Assist button URL
  • Bug tor-browser#42165: Take away “Add to shortcuts” and “Take away from shortcuts” buttons
  • Bug tor-browser#42158: Take away “Customise Homepage” button
  • Bug tor-browser-build#40740: Tor Browser for Android’s snowflake ClientTransportPlugin appears to be old-fashioned
  • Bug tor-browser-build#40919: Repair nimbus-fml reproducibility of 13.0a2-build1
  • Bug tor-browser-build#40941: Take away PT course of choices on Android

[ad_2]

Source

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button