Tor Browser 11.0 Comes Based on Firefox 91, Interface Improvements and More

Recently the launch of a significant version of the specialized browser "Tor Browser 11.0", which has been transitioned to the ESR branch of Firefox 91 and some major changes have been made to the browser.

For those who are unfamiliar with the browser, I can tell you that this one focuses on providing anonymity, security and privacy, all traffic is redirected only through the Tor network.

It is impossible to contact directly through the standard network connection of the current system, which does not allow tracking of the user's real IP address (In the case of a browser hack, attackers can gain access to network system parameters, so products like, since Whonix must be used to completely block possible leaks).

For additional protection, the Tor browser includes the HTTPS Everywhere plugin, which allows the use of traffic encryption on all sites whenever possible. To reduce the threat of JavaScript attacks and block plugins by default, a NoScript plugin is included. To combat traffic blocking and inspection, fteproxy and obfs4proxy are used.

In order to organize an encrypted communication channel in environments that block any traffic other than HTTP, alternative transports are proposed that, for example, allow to avoid attempts to block Tor in China.

What's new in Tor Browser 11.0?

In this new version of the browser that is presented as we already mentioned at the beginning transitioned to Firefox 91 ESR codebase and new stable branch for 0.4.6.8.

For the part of the changes that stand out, for example, we can find that in user interface reflects significant design changes introduced in Firefox 89, because in the first instance icons have been updated, the style of various elements has been unified, the color palette has been redesigned, the tab bar layout has been changed, the menu has been restructured, the "..." menu has been integrated into the address bar, it has been removed, the design of information panels and modal dialogs with warnings, confirmations and requests has been modified.

Of the interface changes specific to Tor Browser, note the modernization of the Tor login screen, the display of the selected node strings, the interface for selecting the security level and the pages with errors when processing onion connections. The "about: torconnect" page was modified.

Besides it a new TorSettings module has been implemented, in which the functionality is responsible for changing the specific configuration of the Tor Browser in the configurator (about: preferences # tor).

It is also highlighted that support for old onion services based on the second version of the protocol was removed, which was declared obsolete a year and a half ago. When trying to open the old 16 character .onion address, the error "Invalid site address" will now be displayed.

The second version of the protocol was developed about 16 years ago, and due to the use of outdated algorithms, it cannot be considered safe under modern conditions. Two and a half years ago, in version 0.3.2.9, the third version of the protocol was offered to users, which is notable for the transition to 56 character addresses, as well as providing more reliable protection against data leaks through directory servers, an extensible modular structure, and the use of SHA3, ed25519 and curve25519 algorithms instead of SHA1 , DH and RSA-1024.

Finally if you are interested in knowing more about it about this new version of the browser, you can check the details In the following link.

Get Tor

For those who are interested in being able to obtain this new version, they should know that the builds of the Tor browser are ready for Linux, Windows and macOS, while the formation of the new version for Android is delayed.

They can get the installation packages from the link below.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.