Autor Thema: Neue Tor-Version: sicherer und anonymer  (Gelesen 65249 mal)

0 Mitglieder und 1 Gast betrachten dieses Thema.

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
ProxAllium 0.4.1.0 Beta
« Antwort #375 am: 11 Juli, 2018, 18:00 »
ProxAllium is a FOSS (Free and Open Source) GUI wrapper for Tor. I like to call it a "Tor Proxy Bundle" (like the Tor Browser Bundle).

MIT License

Whats new:>>

Same as v0.4 but with a fix for the "Automatically start with Windows" option, it was broken in the previous release as the working directory was not set and relative paths were resolved incorrectly leading to a "Cannot find Tor" error

https://proxallium.tuxfamily.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor 0.3.3.9
« Antwort #376 am: 17 Juli, 2018, 21:30 »
Release Notes

Changes in version 0.3.3.9

    Directory authority changes:
        The "Bifroest" bridge authority has been retired; the new bridge authority is "Serge", and it is operated by George from the Tor BSD Diversity project. Closes ticket 26771.

We also put out new oldstable releases for 0.2.9.16 and 0.3.2.11, and those releases include other backported fixes:
https://gitweb.torproject.org/tor.git/tree/ReleaseNotes?h=tor-0.2.9.16
https://gitweb.torproject.org/tor.git/tree/ReleaseNotes?h=tor-0.3.2.11

If for whatever reason you can't upgrade yet, you can also manually switch to advertising your bridge descriptor to the new bridge authority by using this torrc line:

AlternateBridgeAuthority Serge orport=9001 bridge 66.111.2.131:9030 BA44 A889 E64B 93FA A2B1 14E0 2C2A 279A 8555 C533

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 7.2018.08 Beta
« Antwort #377 am: 22 Juli, 2018, 19:00 »
Whats new:>>

Tor: Updated to 0.3.4.5-rc.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 7.2018.08 Final
« Antwort #378 am: 03 August, 2018, 06:00 »
Whats new:>>

• Tor : Updated to 0.3.4.5-rc.
Libevent 2.1.8-stable, OpenSSL 1.0.2o, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd
1.3.5.
• WASTE : Updated to 1.8.0 Release. Build 052. Internal heart-beat re-engineering.
Code Refactoring.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0a10
« Antwort #379 am: 20 August, 2018, 17:00 »
Changelog

All platforms:

Update Tor to 0.3.4.6-rc
Update Torbutton to 2.0.2
Bug 26960: Implement new about:tor start page
Bug 26961: Implement new user onboarding
Bug 26321: Move 'New Identity', 'New Circuit' to File, hamburger menus
Bug 26590: Use new svg.disabled pref in security slider
Bug 26655: Adjust color and size of onion button
Bug 26500: Reposition circuit display relay icon for RTL locales
Bug 26409: Remove spoofed locale implementation
Bug 26189: Remove content-policy.js
Bug 27129: Add locales ca, ga, id, is, nb
Translations update
Update Tor Launcher to 0.2.16.2
Bug 26985: Help button icons missing
Bug 25509: Improve the proxy help text
Bug 27129: Add locales ca, ga, id, is, nb
Translations update
Update NoScript to 10.1.8.16
Update meek to 0.31
Bug 26477: Make meek extension compatible with ESR 60
Bug 27082: Enable a limited UITour for user onboarding
Bug 26961: New user onboarding
Bug 14952: Enable HTTP2 and AltSvc
Bug 25735: Tor Browser stalls while loading Facebook login page
Bug 17252: Enable TLS session identifiers with first-party isolation
Bug 26353: Prevent speculative connects that violate first-party isolation
Bug 24056: Use en-US strings in HTML forms if locale is spoofed to english
Bug 26456: HTTP .onion sites inherit previous page's certificate information
Bug 26321: Move 'New Identity', 'New Circuit' to File, hamburger menus
Bug 26833: Backport Mozilla's bug 1473247
Bug 26628: Backport Mozilla's bug 1470156
Bug 26237: Clean up toolbar for ESR60-based Tor Browser
Bug 26519: Avoid Firefox icons in ESR60
Bug 26039: Load our preferences that modify extensions (fixup)
Bug 26515: Update Tor Browser blog post URLs
Bug 27129: Add locales ca, ga, id, is, nb
Bug 26216: Fix broken MAR file generation
Bug 26409: Remove spoofed locale implementation
Bug 26603: Remove obsolete HTTP pipelining preferences

Windows:

Bug 26514: Fix intermittent updater failures on Win64 (Error 19)
Bug 26874: Fix UNC path restrictions failure in Tor Browser 8.0a9
Bug 12968: Enable HEASLR in Windows x86_64 builds
Bug 9145: Fix broken hardware acceleration
Update tbb-windows-installer to 0.4
Bug 26355: Update tbb-windows-installer to check for Windows7+
Bug 26355: Require Windows7+ for updates to Tor Browser 8

Build System:

All:

Bug 26410: Stop using old MAR format in the alpha series
Bug 27020: RBM build fails with runc version 1.0.1
Bug 26949: Use GitHub repository for STIX
Bug 26773: Add --verbose to the ./mach build flag for firefox
Bug 26569: Redirect pre-8.0a9 alpha users to a separate update directory
Bug 26319: Don't package up Tor Browser in the `mach package` step

Windows:

Bug 27152: Use mozilla/fxc2.git for the fxc2 repository

[close]

Download hier: https://dist.torproject.org/torbrowser/8.0a10/

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 7.2018.09
« Antwort #380 am: 03 September, 2018, 13:30 »
Whats new:>>

Tor :

Updated to 0.3.4.7-rc.
Libevent 2.1.8-stable, OpenSSL 1.0.2o, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.5.

• WASTE :

Updated to 1.8.0 Release. Build 056. Code Refactoring.
Improve behavior inside networks with no uPnP.
‘Performs’ renamed to ‘Action Centre’, reflecting its task at start-up.
Enable /load in Action Centre to load multiple profiles at start-up.
Implement I2P compatibility.
Anti-Spoofing Technology to enable the safest chats.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0
« Antwort #381 am: 05 September, 2018, 18:00 »
Changelog

ALL PLATFORMS:

Update Firefox to 60.2.0esr
Update Tor to 0.3.3.9
Update OpenSSL to 1.0.2p
Update Libevent to 2.1.8
Update Torbutton to 2.0.6
Update HTTPS Everywhere to 2018.8.22
Update NoScript to 10.1.9.1
Update obfs4proxy to v0.0.7 (bug 25356)
Bug 27082: Enable a limited UITour for user onboarding
Bug 26961: New user onboarding
Bug 26962: New feature onboarding
Bug 27403: The onboarding bubble is not always displayed
Bug 27283: Fix first-party isolation for UI tour
Bug 27213: Update about:tbupdate to new (about:tor) layout
Bug 17252: Enable TLS session identifiers with first-party isolation
Bug 26353: Prevent speculative connects that violate first-party isolation
Bug 26670: Make canvas permission prompt respect first-party isolation
Bug 24056: Use en-US strings in HTML forms if locale is spoofed to english
Bug 26456: HTTP .onion sites inherit previous page's certificate information
Bug 26561: .onion images are not displayed
Bug 26321: Move 'New Identity', 'New Circuit' to File, hamburger menus
Bug 26833: Backport Mozilla's bug 1473247
Bug 26628: Backport Mozilla's bug 1470156
Bug 26237: Clean up toolbar for ESR60-based Tor Browser
Bug 26519: Avoid Firefox icons in ESR60
Bug 26039: Load our preferences that modify extensions (fixup)
Bug 26515: Update Tor Browser blog post URLs
Bug 26216: Fix broken MAR file generation
Bug 26409: Remove spoofed locale implementation
Bug 25543: Rebase Tor Browser patches for ESR60
Bug 23247: Show security state of .onions
Bug 26039: Load our preferences that modify extensions
Bug 17965: Isolate HPKP and HSTS to URL bar domain
Bug 21787: Spoof en-US for date picker
Bug 21607: Disable WebVR for now until it is properly audited
Bug 21549: Disable wasm for now until it is properly audited
Bug 26614: Disable Web Authentication API until it is properly audited
Bug 27281: Enable Reader View mode again
Bug 26114: Don't expose navigator.mozAddonManager to websites
Bug 21850: Update about:tbupdate handling for e10s
Bug 26048: Fix potentially confusing "restart to update" message
Bug 27221: Purge startup cache if Tor Browser version changed
Bug 26049: Reduce delay for showing update prompt to 1 hour
Bug 26365: Add potential AltSvc support
Bug 9145: Fix broken hardware acceleration on Windows and enable it
Bug 26045: Add new MAR signing keys
Bug 25215: Revert bug 18619 (we are not disabling IndexedDB any longer)
Bug 19910: Rip out optimistic data socks handshake variant (#3875)
Bug 22564: Hide Firefox Sync
Bug 25090: Disable updater telemetry
Bug 26127: Make sure Torbutton and Tor Launcher are not treated as legacy extensions
Bug 13575: Disable randomised Firefox HTTP cache decay user tests
Bug 22548: Firefox downgrades VP9 videos to VP8 for some users
Bug 24995: Include git hash in tor --version
Bug 27268+27257+27262+26603 : Preferences clean-up
Bug 26073: Migrate general.useragent.locale to intl.locale.requested
Bug 27129+20628: Make Tor Browser available in ca, ga, id, is, nb, da, he, sv, and zh-TW
Bug 12927: Include Hebrew translation into Tor Browser
Bug 21245: Add danish (da) translation

[close]

Download hier : https://dist.torproject.org/torbrowser/8.0/

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0.1
« Antwort #382 am: 20 September, 2018, 09:02 »
Changelog

Major features (onion services, UI change):

For a newly created onion service, the default version is now 3. Tor still supports existing version 2 services, but the operator now needs to set "HiddenServiceVersion 2" in order to create a new version 2 service. For existing services, Tor now learns the version by reading the key file. Closes ticket 27215.

Major features (relay, UI change):

Relays no longer run as exits by default. If the "ExitRelay" option is auto (or unset), and no exit policy is specified with ExitPolicy or ReducedExitPolicy, we now treat ExitRelay as 0. Previously in this case, we allowed exit traffic and logged a warning message. Closes ticket 21530. Patch by Neel Chauhan.
Tor now validates that the ContactInfo config option is valid UTF- 8 when parsing torrc. Closes ticket 27428.

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor (Expert Bundle) 0.3.4.8
« Antwort #383 am: 20 September, 2018, 17:00 »
Changelog

    New system requirements:
        Tor no longer tries to support old operating systems without mmap() or some local equivalent. Apparently, compilation on such systems has been broken for some time, without anybody noticing or complaining. Closes ticket 25398.
    Major features (directory authority, modularization):
        The directory authority subsystem has been modularized. The code is now located in src/or/dirauth/, and is compiled in by default. To disable the module, the configure option --disable-module-dirauth has been added. This module may be disabled by default in some future release. Closes ticket 25610.

    Major features (main loop, CPU usage):
        When Tor is disabled (via DisableNetwork or via hibernation), it no longer needs to run any per-second events. This change should make it easier for mobile applications to disable Tor while the device is sleeping, or Tor is not running. Closes ticket 26063.
        Tor no longer enables all of its periodic events by default. Previously, Tor would enable all possible main loop events, regardless of whether it needed them. Furthermore, many of these events are now disabled when Tor is hibernating or DisableNetwork is set. This is a big step towards reducing client CPU usage by reducing the amount of wake-ups the daemon does. Closes tickets 25376 and 25762.
        The bandwidth-limitation logic has been refactored so that bandwidth calculations are performed on-demand, rather than every TokenBucketRefillInterval milliseconds. This change should improve the granularity of our bandwidth calculations, and limit the number of times that the Tor process needs to wake up when it is idle. Closes ticket 25373.
        Move responsibility for many operations from a once-per-second callback to a callback that is only scheduled as needed. Moving this functionality has allowed us to disable the callback when Tor's network is disabled. Once enough items are removed from our once-per-second callback, we can eliminate it entirely to conserve CPU when idle. The functionality removed includes: closing connections, circuits, and channels (ticket 25932); consensus voting (25937); flushing log callbacks (25951); honoring delayed SIGNEWNYM requests (25949); rescanning the consensus cache (25931); saving the state file to disk (25948); warning relay operators about unreachable ports (25952); and keeping track of Tor's uptime (26009).
    Minor features (accounting):
        When Tor becomes dormant, it now uses a scheduled event to wake up at the right time. Previously, we would use the per-second timer to check whether to wake up, but we no longer have any per-second timers enabled when the network is disabled. Closes ticket 26064.
    Minor features (bug workaround):
        Compile correctly on systems that provide the C11 stdatomic.h header, but where C11 atomic functions don't actually compile. Closes ticket 26779; workaround for Debian issue 903709.
    Minor features (code quality):
        Add optional spell-checking for the Tor codebase, using the "misspell" program. To use this feature, run "make check-typos". Closes ticket 25024.
    Minor features (compatibility):
        Tell OpenSSL to maintain backward compatibility with previous RSA1024/DH1024 users in Tor. With OpenSSL 1.1.1-pre6, these ciphers are disabled by default. Closes ticket 27344.
        Tor now detects versions of OpenSSL 1.1.0 and later compiled with the no-deprecated option, and builds correctly with them. Closes tickets 19429, 19981, and 25353.
    Minor features (compilation):
        When compiling with --enable-openbsd-malloc or --enable-tcmalloc, tell the compiler not to include the system malloc implementation. Fixes bug 20424; bugfix on 0.2.0.20-rc.
        Don't try to use a pragma to temporarily disable the -Wunused-const-variable warning if the compiler doesn't support it. Fixes bug 26785; bugfix on 0.3.2.11.
        When building Tor, prefer to use Python 3 over Python 2, and more recent (contemplated) versions over older ones. Closes ticket 26372.
    Minor features (compression, zstd):
        When running with zstd, Tor now considers using advanced functions that the zstd maintainers have labeled as potentially unstable. To prevent breakage, Tor will only use this functionality when the runtime version of the zstd library matches the version with which Tor was compiled. Closes ticket 25162.
    Minor features (configuration):
        The "DownloadSchedule" options have been renamed to end with "DownloadInitialDelay". The old names are still allowed, but will produce a warning. Comma-separated lists are still permitted for these options, but all values after the first are ignored (as they have been since 0.2.9). Closes ticket 23354.
    Minor features (continuous integration):
        Log the compiler path and version during Appveyor builds. Implements ticket 27449.
        Show config.log and test-suite.log after failed Appveyor builds. Also upload the zipped full logs as a build artifact. Implements ticket 27430.
        Backport Travis rust distcheck to 0.3.3. Closes ticket 24629.
        Enable macOS builds in our Travis CI configuration. Closes ticket 24629.
        Install libcap-dev and libseccomp2-dev so these optional dependencies get tested on Travis CI. Closes ticket 26560.
        Only post Appveyor IRC notifications when the build fails. Implements ticket 27275.
        Run asciidoc during Travis CI. Implements ticket 27087.
        Use ccache in our Travis CI configuration. Closes ticket 26952.
        Add the necessary configuration files for continuous integration testing on Windows, via the Appveyor platform. Closes ticket 25549. Patches from Marcin Cieślak and Isis Lovecruft.
    Minor features (continuous integration, rust):
        Use cargo cache in our Travis CI configuration. Closes ticket 26952.
    Minor features (control port):
        Introduce GETINFO "current-time/{local,utc}" to return the local and UTC times respectively in ISO format. This helps a controller like Tor Browser detect a time-related error. Closes ticket 25511. Patch by Neel Chauhan.
        Introduce new fields to the CIRC_BW event. There are two new fields in each of the read and written directions. The DELIVERED fields report the total valid data on the circuit, as measured by the payload sizes of verified and error-checked relay command cells. The OVERHEAD fields report the total unused bytes in each of these cells. Closes ticket 25903.
    Minor features (controller):
        The control port now exposes the list of HTTPTunnelPorts and ExtOrPorts via GETINFO net/listeners/httptunnel and net/listeners/extor respectively. Closes ticket 26647.
    Minor features (directory authorities):
        Stop warning about incomplete bw lines before the first complete bw line has been found, so that additional header lines can be ignored. Fixes bug 25960; bugfix on 0.2.2.1-alpha
        Authorities no longer vote to make the subprotocol version "LinkAuth=1" a requirement: it is unsupportable with NSS, and hasn't been needed since Tor 0.3.0.1-alpha. Closes ticket 27286.
    Minor features (directory authority):
        Directory authorities now open their key-pinning files as O_SYNC, to limit their chances of accidentally writing partial lines. Closes ticket 23909.
    Minor features (directory authority, forward compatibility):
        Make the lines of the measured bandwidth file able to contain their entries in any order. Previously, the node_id entry needed to come first. Closes ticket 26004.
    Minor features (entry guards):
        Introduce a new torrc option NumPrimaryGuards for controlling the number of primary guards. Closes ticket 25843.
    Minor features (geoip):
        Update geoip and geoip6 to the August 7 2018 Maxmind GeoLite2 Country database. Closes ticket 27089.
    Minor features (performance):
        Avoid a needless call to malloc() when processing an incoming relay cell. Closes ticket 24914.
        Make our timing-wheel code run a tiny bit faster on 32-bit platforms, by preferring 32-bit math to 64-bit. Closes ticket 24688.
        Avoid a needless malloc()/free() pair every time we handle an ntor handshake. Closes ticket 25150.
    Minor features (Rust, portability):
        Rust cross-compilation is now supported. Closes ticket 25895.
    Minor features (testing):
        Add a unit test for voting_schedule_get_start_of_next_interval(). Closes ticket 26014, and helps make unit test coverage more deterministic.
        A new unittests module specifically for testing the functions in the (new-ish) bridges.c module has been created with new unittests, raising the code coverage percentages. Closes 25425.
        We now have improved testing for addressmap_get_virtual_address() function. This should improve our test coverage, and make our test coverage more deterministic. Closes ticket 25993.
    Minor features (timekeeping, circuit scheduling):
        When keeping track of how busy each circuit have been recently on a given connection, use coarse-grained monotonic timers rather than gettimeofday(). This change should marginally increase accuracy and performance. Implements part of ticket 25927.
    Minor features (unit tests):
        Test complete bandwidth measurements files, and test that incomplete bandwidth lines only give warnings when the end of the header has not been detected. Fixes bug 25947; bugfix on 0.2.2.1-alpha
    Minor bugfixes (bandwidth management):
        Consider ourselves "low on write bandwidth" if we have exhausted our write bandwidth some time in the last second. This was the documented behavior before, but the actual behavior was to change this value every TokenBucketRefillInterval. Fixes bug 25828; bugfix on 0.2.3.5-alpha.
    Minor bugfixes (C correctness):
        Add a missing lock acquisition in the shutdown code of the control subsystem. Fixes bug 25675; bugfix on 0.2.7.3-rc. Found by Coverity; this is CID 1433643.
    Minor bugfixes (code style):
        Fixed multiple includes of transports.h in src/or/connection.c Fixes bug 25261; bugfix on 0.2.5.1-alpha.
        Remove the unused variable n_possible from the function channel_get_for_extend(). Fixes bug 25645; bugfix on 0.2.4.4-alpha
    Minor bugfixes (compilation):
        Silence a spurious compiler warning on the GetAdaptersAddresses function pointer cast. This issue is already fixed by 26481 in 0.3.5 and later, by removing the lookup and cast. Fixes bug 27465; bugfix on 0.2.3.11-alpha.
        Stop calling SetProcessDEPPolicy() on 64-bit Windows. It is not supported, and always fails. Some compilers warn about the function pointer cast on 64-bit Windows. Fixes bug 27461; bugfix on 0.2.2.23-alpha.
        Fix a compilation warning on some versions of GCC when building code that calls routerinfo_get_my_routerinfo() twice, assuming that the second call will succeed if the first one did. Fixes bug 26269; bugfix on 0.2.8.2-alpha.
        Refrain from compiling unit testing related object files when --disable-unittests is set to configure script. Fixes bug 24891; bugfix on 0.2.5.1-alpha.
        The --enable-fatal-warnings flag now affects Rust code as well. Closes ticket 26245.
        Avoid a compiler warning when casting the return value of smartlist_len() to double with DEBUG_SMARTLIST enabled. Fixes bug 26283; bugfix on 0.2.4.10-alpha.
    Minor bugfixes (compilation, windows):
        Don't link or search for pthreads when building for Windows, even if we are using build environment (like mingw) that provides a pthreads library. Fixes bug 27081; bugfix on 0.1.0.1-rc.
    Minor bugfixes (continuous integration):
        Build with zstd on macOS. Fixes bug 27090; bugfix on 0.3.1.5-alpha.
        Skip a pair of unreliable key generation tests on Windows, until the underlying issue in bug 26076 is resolved. Fixes bug 26830 and bug 26853; bugfix on 0.2.7.3-rc and 0.3.2.1-alpha respectively.
    Minor bugfixes (control port):
        Respond with more human-readable error messages to GETINFO exit- policy/* requests. Also, let controller know if an error is transient (response code 551) or not (response code 552). Fixes bug 25852; bugfix on 0.2.8.1-alpha.
        Parse the "HSADDRESS=" parameter in HSPOST commands properly. Previously, it was misparsed and ignored. Fixes bug 26523; bugfix on 0.3.3.1-alpha. Patch by "akwizgran".
        Make CIRC_BW event reflect the total of all data sent on a circuit, including padding and dropped cells. Also fix a mis- counting bug when STREAM_BW events were enabled. Fixes bug 25400; bugfix on 0.2.5.2-alpha.
    Minor bugfixes (correctness, flow control):
        Upon receiving a stream-level SENDME cell, verify that our window has not grown too large. Fixes bug 26214; bugfix on svn r54 (pre-0.0.1)
    Minor bugfixes (directory authority):
        When voting for recommended versions, make sure that all of the versions are well-formed and parsable. Fixes bug 26485; bugfix on 0.1.1.6-alpha.
    Minor bugfixes (directory client):
        When unverified-consensus is verified, rename it to cached- consenus. Fixes bug 4187; bugfix on 0.2.0.3-alpha.
        Fixed launching a certificate fetch always during the scheduled periodic consensus fetch by fetching only in those cases when consensus are waiting for certs. Fixes bug 24740; bugfix on 0.2.9.1-alpha.
    Minor bugfixes (error reporting):
        Improve tolerance for directory authorities with skewed clocks. Previously, an authority with a clock more than 60 seconds ahead could cause a client with a correct clock to warn that the client's clock was behind. Now the clocks of a majority of directory authorities have to be ahead of the client before this warning will occur. Fixes bug 25756; bugfix on 0.2.2.25-alpha.
    Minor bugfixes (in-process restart):
        Always call tor_free_all() when leaving tor_run_main(). When we did not, restarting tor in-process would cause an assertion failure. Fixes bug 26948; bugfix on 0.3.3.1-alpha.
    Minor bugfixes (Linux seccomp2 sandbox):
        Fix a bug in our sandboxing rules for the openat() syscall. Previously, no openat() call would be permitted, which would break filesystem operations on recent glibc versions. Fixes bug 25440; bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.
    Minor bugfixes (logging):
        Improve the log message when connection initiators fail to authenticate direct connections to relays. Fixes bug 26927; bugfix on 0.3.0.1-alpha.
    Minor bugfixes (onion services):
        Silence a spurious compiler warning in rend_client_send_introduction(). Fixes bug 27463; bugfix on 0.1.1.2-alpha.
        Fix bug that causes services to not ever rotate their descriptors if they were getting SIGHUPed often. Fixes bug 26932; bugfix on 0.3.2.1-alpha.
        Recompute some consensus information after detecting a clock jump, or after transitioning from a non-live consensus to a live consensus. We do this to avoid having an outdated state, and miscalculating the index for next-generation onion services. Fixes bug 24977; bugfix on 0.3.2.1-alpha.
    Minor bugfixes (portability):
        Fix compilation of the unit tests on GNU/Hurd, which does not define PATH_MAX. Fixes bug 26873; bugfix on 0.3.3.1-alpha. Patch from "paulusASol".
        Work around two different bugs in the OS X 10.10 and later SDKs that would prevent us from successfully targeting earlier versions of OS X. Fixes bug 26876; bugfix on 0.3.3.1-alpha.
        Do not align mmap length, as it is not required by POSIX, and the getpagesize function is deprecated. Fixes bug 25399; bugfix on 0.1.1.23.
    Minor bugfixes (portability, FreeBSD):
        In have_enough_mem_for_dircache(), the variable DIRCACHE_MIN_MEM_MB does not stringify on FreeBSD, so we switch to tor_asprintf(). Fixes bug 20887; bugfix on 0.2.8.1-alpha. Patch by Neel Chauhan.
    Minor bugfixes (relay statistics):
        When a relay is collecting internal statistics about how many create cell requests it has seen of each type, accurately count the requests from relays that temporarily fall out of the consensus. (To be extra conservative, we were already ignoring requests from clients in our counts, and we continue ignoring them here.) Fixes bug 24910; bugfix on 0.2.4.17-rc.
    Minor bugfixes (rust):
        Backport test_rust.sh from master. Fixes bug 26497; bugfix on 0.3.1.5-alpha.
        Protover parsing was accepting the presence of whitespace in version strings, which the C implementation would choke on, e.g. "Desc=1\t,2". Fixes bug 27177; bugfix on 0.3.3.5-rc.
        Protover parsing was ignoring a 2nd hyphen and everything after it, accepting entries like "Link=1-5-foo". Fixes bug 27164; bugfix on 0.3.3.1-alpha.
        Stop setting $CARGO_HOME. cargo will use the user's $CARGO_HOME, or $HOME/.cargo by default. Fixes bug 26497; bugfix on 0.3.1.5-alpha.
        cd to ${abs_top_builddir}/src/rust before running cargo in src/test/test_rust.sh. This makes the working directory consistent between builds and tests. Fixes bug 26497; bugfix on 0.3.3.2-alpha.
    Minor bugfixes (single onion services, Tor2web):
        Log a protocol warning when single onion services or Tor2web clients fail to authenticate direct connections to relays. Fixes bug 26924; bugfix on 0.2.9.1-alpha.
    Minor bugfixes (test coverage tools):
        Update our "cov-diff" script to handle output from the latest version of gcov, and to remove extraneous timestamp information from its output. Fixes bugs 26101 and 26102; bugfix on 0.2.5.1-alpha.
    Minor bugfixes (testing):
        Disable core dumps in test_bt.sh, to avoid failures in "make distcheck". Fixes bug 26787; bugfix on 0.2.5.2-alpha.
        When testing workqueue event-cancellation, make sure that we actually cancel an event, and that cancel each event with equal probability. (It was previously possible, though extremely unlikely, for our event-canceling test not to cancel any events.) Fixes bug 26008; bugfix on 0.2.6.3-alpha.
        Repeat part of the test in test_client_pick_intro() a number of times, to give it consistent coverage. Fixes bug 25996; bugfix on 0.3.2.1-alpha.
        Remove randomness from the hs_common/responsible_hsdirs test, so that it always takes the same path through the function it tests. Fixes bug 25997; bugfix on 0.3.2.1-alpha.
        Change the behavior of the "channel/outbound" test so that it never causes a 10-second rollover for the EWMA circuitmux code. Previously, this behavior would happen randomly, and result in fluctuating test coverage. Fixes bug 25994; bugfix on 0.3.3.1-alpha.
        Use X509_new() to allocate certificates that will be freed later with X509_free(). Previously, some parts of the unit tests had used tor_malloc_zero(), which is incorrect, and which caused test failures on Windows when they were built with extra hardening. Fixes bugs 25943 and 25944; bugfix on 0.2.8.1-alpha. Patch by Marcin Cieślak.
        While running the circuit_timeout test, fix the PRNG to a deterministic AES stream, so that the test coverage from this test will itself be deterministic. Fixes bug 25995; bugfix on 0.2.2.2-alpha.
    Minor bugfixes (testing, bootstrap):
        When calculating bootstrap progress, check exit policies and the exit flag. Previously, Tor would only check the exit flag, which caused race conditions in small and fast networks like chutney. Fixes bug 27236; bugfix on 0.2.6.3-alpha.
    Minor bugfixes (testing, chutney):
        When running make test-network-all, use the mixed+hs-v2 network. (A previous fix to chutney removed v3 onion services from the mixed+hs-v23 network, so seeing "mixed+hs-v23" in tests is confusing.) Fixes bug 27345; bugfix on 0.3.2.1-alpha.
        Before running make test-network-all, delete old logs and test result files, to avoid spurious failures. Fixes bug 27295; bugfix on 0.2.7.3-rc.
    Minor bugfixes (testing, openssl compatibility):
        Our "tortls/cert_matches_key" unit test no longer relies on OpenSSL internals. Previously, it relied on unsupported OpenSSL behavior in a way that caused it to crash with OpenSSL 1.0.2p. Fixes bug 27226; bugfix on 0.2.5.1-alpha.
    Minor bugfixes (v3 onion services):
        Stop sending ed25519 link specifiers in v3 onion service introduce cells and descriptors, when the rendezvous or introduction point doesn't support ed25519 link authentication. Fixes bug 26627; bugfix on 0.3.2.4-alpha.
    Minor bugfixes (vanguards):
        Allow the last hop in a vanguard circuit to be the same as our first, to prevent the adversary from influencing guard node choice by choice of last hop. Also prevent the creation of A - B - A paths, or A - A paths, which are forbidden by relays. Fixes bug 25870; bugfix on 0.3.3.1-alpha.
    Minor bugfixes (Windows, compilation):
        Silence a compilation warning on MSVC 2017 and clang-cl. Fixes bug 27185; bugfix on 0.2.2.2-alpha.
    Code simplification and refactoring:
        Remove duplicate code in parse_{c,s}method_line and bootstrap their functionalities into a single function. Fixes bug 6236; bugfix on 0.2.3.6-alpha.
        We remove the PortForwsrding and PortForwardingHelper options, related functions, and the port_forwarding tests. These options were used by the now-deprecated Vidalia to help ordinary users become Tor relays or bridges. Closes ticket 25409. Patch by Neel Chauhan.
        In order to make the OR and dir checking function in router.c less confusing we renamed some functions and consider_testing_reachability() has been split into router_should_check_reachability() and router_do_reachability_checks(). Also we improved the documentation in some functions. Closes ticket 18918.
        Initial work to isolate Libevent usage to a handful of modules in our codebase, to simplify our call structure, and so that we can more easily change event loops in the future if needed. Closes ticket 23750.
        Introduce a function to call getsockname() and return tor_addr_t, to save a little complexity throughout the codebase. Closes ticket 18105.
        Make hsdir_index in node_t a hsdir_index_t rather than a pointer as hsdir_index is always present. Also, we move hsdir_index_t into or.h. Closes ticket 23094. Patch by Neel Chauhan.
        Merge functions used for describing nodes and suppress the functions that do not allocate memory for the output buffer string. NODE_DESC_BUF_LEN constant and format_node_description() function cannot be used externally from router.c module anymore. Closes ticket 25432. Patch by valentecaio.
        Our main loop has been simplified so that all important operations happen inside events. Previously, some operations had to happen outside the event loop, to prevent infinite sequences of event activations. Closes ticket 25374.
        Put a SHA1 public key digest in hs_service_intro_point_t, and use it in register_intro_circ() and service_intro_point_new(). This prevents the digest from being re-calculated each time. Closes ticket 23107. Patch by Neel Chauhan.
        Refactor token-bucket implementations to use a common backend. Closes ticket 25766.
        Remove extern declaration of stats_n_seconds_working variable from main, protecting its accesses with get_uptime() and reset_uptime() functions. Closes ticket 25081, patch by “valentecaio”.
        Remove our previous logic for "cached gettimeofday()" -- our coarse monotonic timers are fast enough for this purpose, and far less error-prone. Implements part of ticket 25927.
        Remove the return value for fascist_firewall_choose_address_base(), and sister functions such as fascist_firewall_choose_address_node() and fascist_firewall_choose_address_rs(). Also, while we're here, initialize the ap argument as leaving it uninitialized can pose a security hazard. Closes ticket 24734. Patch by Neel Chauhan.
        Rename two fields of connection_t struct. timestamp_lastwritten is renamed to timestamp_last_write_allowed and timestamp_lastread is renamed to timestamp_last_read_allowed. Closes ticket 24714, patch by "valentecaio".
        Since Tor requires C99, remove our old workaround code for libc implementations where free(NULL) doesn't work. Closes ticket 24484.
        Use our standard rate-limiting code to deal with excessive libevent failures, rather than the hand-rolled logic we had before. Closes ticket 26016.
        We remove the return value of node_get_prim_orport() and node_get_prim_dirport(), and introduce node_get_prim_orport() in node_ipv6_or_preferred() and node_ipv6_dir_preferred() in order to check for a null address. Closes ticket 23873. Patch by Neel Chauhan.
        We switch to should_record_bridge_info() in geoip_note_client_seen() and options_need_geoip_info() instead of accessing the configuration values directly. Fixes bug 25290; bugfix on 0.2.1.6-alpha. Patch by Neel Chauhan.
    Deprecated features:
        As we are not recommending 0.2.5 anymore, we require relays that once had an ed25519 key associated with their RSA key to always have that key, instead of allowing them to drop back to a version that didn't support ed25519. This means they need to use a new RSA key if the want to downgrade to an older version of tor without ed25519. Closes ticket 20522.
    Removed features:
        Directory authorities will no longer support voting according to any consensus method before consensus method 25. This keeps authorities compatible with all authorities running 0.2.9.8 and later, and does not break any clients or relays. Implements ticket 24378 and proposal 290.
        The PortForwarding and PortForwardingHelper features have been removed. The reasoning is, given that implementations of NAT traversal protocols within common consumer grade routers are frequently buggy, and that the target audience for a NAT punching feature is a perhaps less-technically-inclined relay operator, when the helper fails to setup traversal the problems are usually deep, ugly, and very router specific, making them horrendously impossible for technical support to reliable assist with, and thus resulting in frustration all around. Unfortunately, relay operators who would like to run relays behind NATs will need to become more familiar with the port forwarding configurations on their local router. Closes 25409.
        The TestingEnableTbEmptyEvent option has been removed. It was used in testing simulations to measure how often connection buckets were emptied, in order to improve our scheduling, but it has not been actively used in years. Closes ticket 25760.
        The old "round-robin" circuit multiplexer (circuitmux) implementation has been removed, along with a fairly large set of code that existed to support it. It has not been the default circuitmux since we introduced the "EWMA" circuitmux in 0.2.4.x, but it still required an unreasonable amount of memory and CPU. Closes ticket 25268.


[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.5a2
« Antwort #384 am: 26 September, 2018, 19:00 »
Changelog

All platforms

    Update Tor to 0.3.5.2-alpha
    Update Torbutton to 2.1
        Bug 27097: Tor News signup banner
        Bug 27663: Add New Identity menuitem again
        Bug 27175: Add pref to allow users to persist custom noscript settings
        Bug 27760: Use new NoScript API for IPC and fix about:blank issue
        Bug 26624: Only block OBJECT on highest slider level
        Bug 26555: Don't show IP address for meek or snowflake
        Bug 27478: Torbutton icons for dark theme
        Bug 27506+14520: Move status version to upper left corner for RTL locales
        Bug 27558: Update the link to "Your Guard note may not change" text
        Bug 21263: Remove outdated information from the README
        Translations update
    Update Tor Launcher to 0.2.16.5
        Bug 27469: Adapt Moat URLs
        Translations update
        Clean-up
    Update NoScript to 10.1.9.6
    Bug 27763: Restrict Torbutton signing exemption to mobile
    Bug 26146: Spoof HTTP User-Agent header for desktop platforms
    Bug 27543: QR code is broken on web.whatsapp.com
    Bug 27264: Bookmark items are not visible on the boomark toolbar
    Bug 27535: Enable TLS 1.3 draft version
    Bug 27623: Use MOZILLA_OFFICIAL for our builds
    Backport of Mozilla bug 1490585, 1475775, and 1489744

Windows:

    Bug 26381: about:tor page does not load on first start on Windows

Linux:

    Bug 27546: Fix vertical scrollbar behavior in Tor Browser 8 with Gtk3
    Bug 27552: Use bundled dir on CentOS/RHEL 6
    Bug 26556: Fix broken Tor Browser icon path on Linux

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0.2
« Antwort #385 am: 03 Oktober, 2018, 11:00 »
Release Notes

Tor Browser 8.0.2 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox. We picked up the necessary patches, but because we needed to start building before Mozilla was ready with a first candidate build, we did not bump the Firefox version to 60.2.2esr. Thus, users are fine with Tor Browser 8.0.2 even though the Firefox version is 60.2.1esr.
Known Issues

We already collected a number of unresolved bugs since Tor Browser 7.5.6 and tagged them with our tbb-8.0-issues keyword to keep them on our radar. The most important current issues are:

    WebGL is broken right now.
    Accessibility support is broken on Windows. We are considering options to address this issue right now.
    Tor Browser 8 is not starting anymore on some older Ubuntu/Mint Linux systems. We still have issues to reproduce this bug but hope we can fix it in the next release.
    Tor Browser 8 is not starting anymore on CentOS 6. We have a fix in our 8.5a2 release to give it a bit of testing. Users affected by this bug may resort to that alpha version for now. We plan to backport the patch in the next stable release.
    NoScript is not saving per-site permissions anymore. We have a potential patch for this bug in our 8.5a2 release as well and plan to backport it, too, in the next stable release in case no issues with it are found.
    While preparing the 8.0.2 release we encountered intermittent reproducibility failures for Linux (64bit) bundles.

The full changelog since Tor Browser 8.0.1 is:

    All platforms
        Update Firefox to 60.2.1esr
        Backport fix for Mozilla bug 1493900 and 1493903
    OS X
        Backport fix for Mozilla bug 1489785 for macOS 10.14 compatibility

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Pirate Browser 0.8 (8.0.2)
« Antwort #386 am: 03 Oktober, 2018, 13:00 »
PirateBrowser is a bundle package of the Tor client and FireFox Portable browser and custom configs that allow you to circumvent censorship.

PirateBrowser is a bundle package of the Tor client (Vidalia) and FireFox Portable browser (with foxyproxy addon) and some custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens.

Freeware

https://lilfellauk.wordpress.com/pirate-tor-browser/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 8.2018.10
« Antwort #387 am: 04 Oktober, 2018, 20:00 »
Whats new:>>

• A new major version is released revealing more capable and stable components in
the suite.
• Tor : Updated to 0.3.4.8. Tor 0.3.4.8 running with Libevent 2.1.8-stable, OpenSSL
1.0.2p, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.5.

• WASTE : Updated to 1.8.0 Release. Build 057. Anti-Spoofing Technology matured.
File Transfers speed increase.
File transfer bugs found/fixed. More reliable Share Transfers and Send Transfers.ats.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.5a3
« Antwort #388 am: 06 Oktober, 2018, 19:00 »
Release Notes

Tor Browser 8.5a3 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox. We picked up the necessary patches, but because we needed to start building before Mozilla was ready with a first candidate build, we did not bump the Firefox version to 60.2.2esr. Thus, users are fine with Tor Browser 8.5a3 even though the Firefox version is 60.2.1esr.

Furthermore, this release fixes Windows startup crashes and makes Tor Browser more compatible with the new macOS 10.14.
Known Issues

We already collected a number of unresolved bugs since Tor Browser 7.5.6 and tagged them with our tbb-8.0-issues keyword to keep them on our radar. The most important current issues are:

    WebGL is broken right now.
    Accessibility support is broken on Windows. We are considering options to address this issue right now.
    Tor Browser 8 is not starting anymore on some older Ubuntu/Mint Linux systems. We still have issues to reproduce this bug but hope we can fix it in the next release.

The full changelog since Tor Browser 8.5a2 is:

    All platforms
        Update Firefox to 60.2.1esr
        Backport fix for Mozilla bug 1493900 and 1493903
    Windows
        Bug 27865: Tor Browser 8.5a2 is crashing on Windows
    OS X
        Backport fix for Mozilla bug 1489785 for macOS 10.14 compatibility

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBeltPrivacy 8.2018.11 Beta
« Antwort #389 am: 17 Oktober, 2018, 09:08 »
Whats new:>>

WASTE:
Updated to 1.8.0 Release. Build 058. Increased Transfer Speed. WASTE can now saturate a 70 mega-bit connection.
Bugfixes on 8.2018.10. WASTE transfers are properly initialized with the partner address, to set up a temporary high-speed-region for transfers

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )