After 8 months of development presented a significant release of a specialized browser Tor Browser 13.5, in which the development of functionality based on ESR-vehicle Firefox 115 is continued. The browser is concentrated on ensuring anonymity, safety, and privacy, all traffic is redirected only through the Tor network. It is impossible to contact directly through the standard network connection of the current system, which does not allow the real IP address of the user (in case of hacking a browser, attacking can access the system parameters of the network, so products such as Whonix should be used to completely block possible leaks). Assemblies Tor Browser prepared for Linux, Android, Windows, and MacOS.
To provide additional protection in Tor Browser, the “HTTPS Only” setting is included, which allows the use of traffic encryption on all sites where it is possible. To reduce the threat of attacks using JavaScript and blocking plugins in the kit, an addition is supplied to NoScript. To combat blocking and traffic inspecting, fteproxy and OBFS4PROXY. Alternative transports are offered to organize an encrypted communication channel, blocking any traffic except HTTP.
To protect against tracking the user and the allocation of features specific for a specific visitor, the API WebGL, WebGL2, WebAudio, Social, SpeechSynthesis, Touch, AudioContext, MediaStream, Canvas, SharedWorker, WebAudio, Permissions, MediaDevices.enumerateDevices, and Screen.orientation, as well as the means of sending telemetry, Pocket, Reader View, HTTP Alternate-Services, MOZTCPSocket, “Link REL=PRECONNECT”, modified LIBMDNS.
In the new version:
- The “Letterboxing” mechanism is modernized, which adds to the indentation around the contents of the web pages to prevent information on information on the size of the screen and open window. The appearance of a gray frame around the contents was perceived by some users as a problem with the site drawing or error