After 8 months of development presented a significant release of a specialized browser tor Browser 11.5 , in which the development of functionality based on ESR-testing Firefox 91. The browser is focused on ensuring anonymity, safety and privacy, all traffic It is redirected only through the Tor network. It is impossible to contact directly through the standard network connection of the current system, which does not allow the real IP of the user (in case of hacking a browser, attackers can access the network system parameters, therefore, products such as Whonix should be used to completely block possible leaks). Assemblies Tor Browser prepared for linux, windows and macos.
To provide additional protection to the TOR Browser, an addition to HTTPS EVERYWHERE, which allows you to use traffic encryption on all sites where it is possible. To reduce the threat of attacks using JavaScript and blocking the default plugins in the kit, an addition noscript is supplied. To combat blocking and traffic inspecting, fteproxy and OBFS4PROXY .
For the organization of a encrypted communication channel, surrounding any traffic, except HTTP, alternative transports are offered, which, for example, allow you to get around attempts to block Tor in China. Для защиты от отслеживания перемещения пользователя и от выделения специфичных для конкретного посетителя особенностей отключены или ограничены API WebGL, WebGL2, WebAudio, Social, SpeechSynthesis, Touch, AudioContext, HTMLMediaElement, Mediastream, Canvas, SharedWorker, WebAudio, Permissions, MediaDevices.enumerateDevices и screen. Orientation, as well as the means of sending telemetry, Pocket, Reader View, Http Alternative-Services, MoztCpSocket, Link Rel = Preconnect, modified Libmdns.
In the new version:
- Added Connection Assist to automate the adjustment of bypassing access to the Tor network. Previously, in case of traffic censorship, the user had to manually receive and activate the bridge nodes in the settings. In the new version, a circuit bypass is configured automatically, without manually changing settings – in the case of problems with the connection, the features of blocking in different countries are taken into account and the optimal way to circumvent them is selected. Depending on the location of the user, a set of settings prepared for his country is loaded, a working alternative transport is selected and the connection is organized through bridge nodes .
to download List of bridge nodes tools are used instrumentation moat using the technique “ Domain Fronting “, the essence of which is in the HTTPS circulation indicating the SNI of the Fictive host and the actual transfer of the name of the requested host in the HTTP HOST HOST-SOST inside the TLS session (for example, you can use delivery networks Content for bypassing locks).