Autor Thema: Neue Tor-Version: sicherer und anonymer  (Gelesen 65246 mal)

0 Mitglieder und 5 Gäste betrachten dieses Thema.

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 6.2018.02
« Antwort #345 am: 29 Januar, 2018, 06:00 »
Whats new:>>

• WASTE: Updated to 1.8 Beta Build 39. Bugfixes.
WASTE has now been re-engineered for high-performance transfers. Both over IPv4 and over Tor.
WASTE can now saturate a 20MBit connection in IPv4 mode. It also values Tor Onion addresses over IPv4 addresses.
• MicroSip: Updated 3.16.x. Conferencing is now enabled in MicroSip for Video Calls.
• Tor: Updated to 0.3.2.9.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 6.2018.03
« Antwort #346 am: 09 Februar, 2018, 06:00 »
Whats new:>>

WASTE : Updated to 1.8 RC1 Build 40. Bugfixes.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0 Alpha 2
« Antwort #347 am: 23 Februar, 2018, 19:00 »
Changelog

Update Tor to 0.3.3.2-alpha

Update Torbutton to 1.9.9:

Bug 24159: Version check does not deal with platform specific checks
Bug 25016: Remove 2017 donation banner
Translations update

Update Tor Launcher to 0.2.15:

Bug 25089: Special characters are not escaped in proxy password
Translations update
Update HTTPS Everywhere to 2018.1.29
Update NoScript to 5.1.8.4
Update meek to 0.29
Bug 25215: Revert bug 18619 (we are not disabling IndexedDB any longer)
Bug 19910: Rip out optimistic data socks handshake variant (#3875)
Bug 22659: Changes to `intl.accept.languages` get overwritten after restart
Bug 25000: Add [System+Principal] to the NoScript whitelist
Bug 15599: Disable Range requests used by pdfjs as they are not isolated
Bug 22614: Make e10s/non-e10s Tor Browsers indistinguishable
Bug 13575: Disable randomised Firefox HTTP cache decay user tests
Bug 25020: Add a tbb_version.json file
Bug 24995: Include git hash in tor --version

Windows:

Bug 25266: PT config should include full names of executable files

Build System:

Bug 25111: Don't compile Yasm on our own anymore for Windows Tor Browser

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
OnionShare 1.3
« Antwort #348 am: 27 Februar, 2018, 19:00 »
Securely and anonymously share files and folders using the official Tor servers with the help of this streamlined and very useful app.

License : GPLv3

Changelog

Major UI redesign, introducing many UX improvements
Client-side web interface redesigned
New feature: Support for meek_lite pluggable transports (Amazon and Azure) - not yet ready for Windows or Mac, sorry
New feature: Support for custom obfs4 and meek_lite bridges (again, meek_lite not available on Windows/Mac yet)
New feature: ability to cancel share before it starts
Bug fix: the UpdateChecker no longer blocks the UI when checking
Bug fix: simultaneous downloads (broken in 1.2)
Update Tor to 0.2.3.9
Improved support for BSD
Updated French and Danish translations
Minor build script and build documentation fixes
Add flake8 tests

[close]

https://onionshare.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor 0.3.3.2 Alpha
« Antwort #349 am: 03 März, 2018, 09:00 »
Changelog

Major features (denial-of-service mitigation):

Give relays some defenses against the recent network overload. We start with three defenses (default parameters in parentheses). First: if a single client address makes too many concurrent connections (>100), hang up on further connections. Second: if a single client address makes circuits too quickly (more than 3 per second, with an allowed burst of 90) while also having too many connections open (3), refuse new create cells for the next while (1-2 hours). Third: if a client asks to establish a rendezvous point to you directly, ignore the request. These defenses can be manually controlled by new torrc options, but relays will also take guidance from consensus parameters, so there's no need to configure anything manually. Implements ticket 24902.

Major bugfixes (netflow padding):

Stop adding unneeded channel padding right after we finish flushing to a connection that has been trying to flush for many seconds. Instead, treat all partial or complete flushes as activity on the channel, which will defer the time until we need to add padding. This fix should resolve confusing and scary log messages like "Channel padding timeout scheduled 221453ms in the past." Fixes bug 22212; bugfix on 0.3.1.1-alpha.

Major bugfixes (protocol versions):

Add Link protocol version 5 to the supported protocols list. Fixes bug 25070; bugfix on 0.3.1.1-alpha.

Major bugfixes (scheduler, consensus):

The scheduler subsystem was failing to promptly notice changes in consensus parameters, making it harder to switch schedulers network-wide. Fixes bug 24975; bugfix on 0.3.2.1-alpha.

Minor features (denial-of-service avoidance):

Make our OOM handler aware of the geoip client history cache so it doesn't fill up the memory. This check is important for IPv6 and our DoS mitigation subsystem. Closes ticket 25122.

Minor features (directory authority):

When directory authorities are unable to add signatures to a pending consensus, log the reason why. Closes ticket 24849.
Minor features (geoip):

Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2 Country database.

Minor features (logging, diagnostic):

When logging a failure to create an onion service's descriptor, also log what the problem with the descriptor was. Diagnostic for ticket 24972.

Minor bugfix (channel connection):

Use the actual observed address of an incoming relay connection, not the canonical address of the relay from its descriptor, when making decisions about how to handle the incoming connection. Fixes bug 24952; bugfix on 0.2.4.11-alpha. Patch by "ffmancera".

Minor bugfix (directory authority):

Directory authorities, when refusing a descriptor from a rejected relay, now explicitly tell the relay (in its logs) to set a valid ContactInfo address and contact the bad-relays@ mailing list. Fixes bug 25170; bugfix on 0.2.9.1.

Minor bugfixes (all versions of Tor):

Use the "misspell" tool to detect and fix typos throughout the source code. Fixes bug 23650; bugfix on various versions of Tor. Patch from Deepesh Pathak.

Minor bugfixes (circuit, cannibalization):

Don't cannibalize preemptively-built circuits if we no longer recognize their first hop. This situation can happen if our Guard relay went off the consensus after the circuit was created. Fixes bug 24469; bugfix on 0.0.6.

Minor bugfixes (correctness):

Remove a nonworking, unnecessary check to see whether a circuit hop's identity digest was set when the circuit failed. Fixes bug 24927; bugfix on 0.2.4.4-alpha.

Minor bugfixes (logging):

Don't treat inability to store a cached consensus object as a bug: it can happen normally when we are out of disk space. Fixes bug 24859; bugfix on 0.3.1.1-alpha.
Fix a (mostly harmless) race condition when invoking LOG_PROTOCOL_WARN message from a subthread while the torrc options are changing. Fixes bug 23954; bugfix on 0.1.1.9-alpha.

Minor bugfixes (onion services):

Remove a BUG() statement when a client fetches an onion descriptor that has a lower revision counter than the one in its cache. This can happen in normal circumstances due to HSDir desync. Fixes bug 24976; bugfix on 0.3.2.1-alpha.
If we are configured to offer a single onion service, don't log long-term established one hop rendezvous points in the heartbeat. Fixes bug 25116; bugfix on 0.2.9.6-rc.

Minor bugfixes (performance):

Avoid calling protocol_list_supports_protocol() from inside tight loops when running with cached routerinfo_t objects. Instead, summarize the relevant protocols as flags in the routerinfo_t, as we do for routerstatus_t objects. This change simplifies our code a little, and saves a large amount of short-term memory allocation operations. Fixes bug 25008; bugfix on 0.2.9.4-alpha.

Minor bugfixes (Rust FFI):

Fix a minor memory leak which would happen whenever the C code would call the Rust implementation of protover_get_supported_protocols(). This was due to the C version returning a static string, whereas the Rust version newly allocated a CString to pass accross the FFI boundary. Consequently, the C code was not expecting to need to free() what it was given. Fixes bug 25127; bugfix on 0.3.2.1-alpha.

Minor bugfixes (scheduler, KIST):

Avoid adding the same channel twice in the KIST scheduler pending list, which would waste CPU cycles. Fixes bug 24700; bugfix on 0.3.2.1-alpha.

Minor bugfixes (unit test, monotonic time):

Increase a constant (1msec to 10msec) in the monotonic time test that makes sure the nsec/usec/msec times read are synchronized. This change was needed to accommodate slow systems like armel or when the clock_gettime() is not a VDSO on the running kernel. Fixes bug 25113; bugfix on 0.2.9.1.

Minor bugfixes (v3 onion services):

Look at the "HSRend" protocol version, not the "HSDir" protocol version, when deciding whether a consensus entry can support the v3 onion service protocol as a rendezvous point. Fixes bug 25105; bugfix on 0.3.2.1-alpha.

Code simplification and refactoring:

Remove the unused nodelist_recompute_all_hsdir_indices(). Closes ticket 25108.
Remove a series of counters used to track circuit extend attempts and connection status but that in reality we aren't using for anything other than stats logged by a SIGUSR1 signal. Closes ticket 25163.

Documentation (man page):

The HiddenServiceVersion torrc option accepts only one number: either version 2 or 3. Closes ticket 25026; bugfix on 0.3.2.2-alpha.

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor 0.3.2.10
« Antwort #350 am: 05 März, 2018, 21:30 »
Changelog

Changes in version 0.3.2.10

    Major bugfixes (denial-of-service, directory authority, backport from 0.3.3.3-alpha):
        Fix a protocol-list handling bug that could be used to remotely crash directory authorities with a null-pointer exception. Fixes bug 25074; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001 and CVE-2018-0490.
    Major bugfixes (scheduler, KIST, denial-of-service, backport from 0.3.3.2-alpha):
        Avoid adding the same channel twice in the KIST scheduler pending list, which could lead to remote denial-of-service use-after-free attacks against relays. Fixes bug 24700; bugfix on 0.3.2.1-alpha.

 

    Major features (denial-of-service mitigation, backport from 0.3.3.2-alpha):
        Give relays some defenses against the recent network overload. We start with three defenses (default parameters in parentheses). First: if a single client address makes too many concurrent connections (>100), hang up on further connections. Second: if a single client address makes circuits too quickly (more than 3 per second, with an allowed burst of 90) while also having too many connections open (3), refuse new create cells for the next while (1-2 hours). Third: if a client asks to establish a rendezvous point to you directly, ignore the request. These defenses can be manually controlled by new torrc options, but relays will also take guidance from consensus parameters, so there's no need to configure anything manually. Implements ticket 24902.
    Major bugfixes (onion services, retry behavior, backport from 0.3.3.1-alpha):
        Fix an "off by 2" error in counting rendezvous failures on the onion service side. While we thought we would stop the rendezvous attempt after one failed circuit, we were actually making three circuit attempts before giving up. Now switch to a default of 2, and allow the consensus parameter "hs_service_max_rdv_failures" to override. Fixes bug 24895; bugfix on 0.0.6.
        New-style (v3) onion services now obey the "max rendezvous circuit attempts" logic. Previously they would make as many rendezvous circuit attempts as they could fit in the MAX_REND_TIMEOUT second window before giving up. Fixes bug 24894; bugfix on 0.3.2.1-alpha.
    Major bugfixes (protocol versions, backport from 0.3.3.2-alpha):
        Add Link protocol version 5 to the supported protocols list. Fixes bug 25070; bugfix on 0.3.1.1-alpha.
    Major bugfixes (relay, backport from 0.3.3.1-alpha):
        Fix a set of false positives where relays would consider connections to other relays as being client-only connections (and thus e.g. deserving different link padding schemes) if those relays fell out of the consensus briefly. Now we look only at the initial handshake and whether the connection authenticated as a relay. Fixes bug 24898; bugfix on 0.3.1.1-alpha.
    Major bugfixes (scheduler, consensus, backport from 0.3.3.2-alpha):
        The scheduler subsystem was failing to promptly notice changes in consensus parameters, making it harder to switch schedulers network-wide. Fixes bug 24975; bugfix on 0.3.2.1-alpha.
    Minor features (denial-of-service avoidance, backport from 0.3.3.2-alpha):
        Make our OOM handler aware of the geoip client history cache so it doesn't fill up the memory. This check is important for IPv6 and our DoS mitigation subsystem. Closes ticket 25122.
    Minor features (compatibility, OpenSSL, backport from 0.3.3.3-alpha):
        Tor will now support TLS1.3 once OpenSSL 1.1.1 is released. Previous versions of Tor would not have worked with OpenSSL 1.1.1, since they neither disabled TLS 1.3 nor enabled any of the ciphersuites it requires. Now we enable the TLS 1.3 ciphersuites. Closes ticket 24978.
    Minor features (geoip):
        Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2 Country database.
    Minor features (logging, diagnostic, backport from 0.3.3.2-alpha):
        When logging a failure to check a hidden service's certificate, also log what the problem with the certificate was. Diagnostic for ticket 24972.
    Minor bugfix (channel connection, backport from 0.3.3.2-alpha):
        Use the actual observed address of an incoming relay connection, not the canonical address of the relay from its descriptor, when making decisions about how to handle the incoming connection. Fixes bug 24952; bugfix on 0.2.4.11-alpha. Patch by "ffmancera".
    Minor bugfixes (denial-of-service, backport from 0.3.3.3-alpha):
        Fix a possible crash on malformed consensus. If a consensus had contained an unparseable protocol line, it could have made clients and relays crash with a null-pointer exception. To exploit this issue, however, an attacker would need to be able to subvert the directory authority system. Fixes bug 25251; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-004.
    Minor bugfix (directory authority, backport from 0.3.3.2-alpha):
        Directory authorities, when refusing a descriptor from a rejected relay, now explicitly tell the relay (in its logs) to set a valid ContactInfo address and contact the bad-relays@ mailing list. Fixes bug 25170; bugfix on 0.2.9.1.
    Minor bugfixes (build, rust, backport from 0.3.3.1-alpha):
        When building with Rust on OSX, link against libresolv, to work around the issue at https://github.com/rust-lang/rust/issues/46797. Fixes bug 24652; bugfix on 0.3.1.1-alpha.
    Minor bugfixes (onion services, backport from 0.3.3.2-alpha):
        Remove a BUG() statement when a client fetches an onion descriptor that has a lower revision counter than the one in its cache. This can happen in normal circumstances due to HSDir desync. Fixes bug 24976; bugfix on 0.3.2.1-alpha.
    Minor bugfixes (logging, backport from 0.3.3.2-alpha):
        Don't treat inability to store a cached consensus object as a bug: it can happen normally when we are out of disk space. Fixes bug 24859; bugfix on 0.3.1.1-alpha.
    Minor bugfixes (performance, fragile-hardening, backport from 0.3.3.1-alpha):
        Improve the performance of our consensus-diff application code when Tor is built with the --enable-fragile-hardening option set. Fixes bug 24826; bugfix on 0.3.1.1-alpha.
    Minor bugfixes (OSX, backport from 0.3.3.1-alpha):
        Don't exit the Tor process if setrlimit() fails to change the file limit (which can happen sometimes on some versions of OSX). Fixes bug 21074; bugfix on 0.0.9pre5.
    Minor bugfixes (spec conformance, backport from 0.3.3.3-alpha):
        Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on 0.2.9.4-alpha.
        Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249; bugfix on 0.2.9.4-alpha.
    Minor bugfixes (testing, backport from 0.3.3.1-alpha):
        Fix a memory leak in the scheduler/loop_kist unit test. Fixes bug 25005; bugfix on 0.3.2.7-rc.
    Minor bugfixes (v3 onion services, backport from 0.3.3.2-alpha):
        Look at the "HSRend" protocol version, not the "HSDir" protocol version, when deciding whether a consensus entry can support the v3 onion service protocol as a rendezvous point. Fixes bug 25105; bugfix on 0.3.2.1-alpha.
    Code simplification and refactoring (backport from 0.3.3.3-alpha):
        Update the "rust dependencies" submodule to be a project-level repository, rather than a user repository. Closes ticket 25323.
    Documentation (backport from 0.3.3.1-alpha):
        Document that operators who run more than one relay or bridge are expected to set MyFamily and ContactInfo correctly. Closes ticket 24526.

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBeltPrivacy 6.2018.04 Beta
« Antwort #351 am: 12 März, 2018, 12:31 »
Changelog

We celebrate the release version of WASTE 1.8 by listing its comprehensive set of changes:

Seamless IPv4 / Onion compatibility. WASTE can co-exist within a mixed network. Designed to work hand-in-glove with Tor onion addresses. You can now host a WASTE network within the Tor address space. In Tor mode, WASTE
has a built in bias towards using Onion addresses.
Upgraded File Transfer. Now supports more comprehensive resume ability and transfer ETA’s for both the sender and receiver. It can handle more files.
Balloon Tip Transfer Notifications. This prevents the UI being interrupted by large file count transfer requests.
Transfer speeds > 20 mbit in IPv4 mode. It is advisable to avoid using Tor for
heavy file transfers.
Networking upgrade. All new Socks4a compliant networking layer. Better UI indication of connection semantics.
Non-signal bandwidth usage is now reduced to < 3 kbps.
Prevents users from making mistakes when adding addresses. Such as trying to connect to a local address over Tor. Or an onion address over IPv4.
Designed to keep the network map it builds for up to 3 years before giving up and reverting to initial conditions.
Sharing Public Keys with individual users. Users no longer have to send keys
outside WASTE or broadcast them. Users can now send keys to those who
they wish to establish a more private network with.
That new private network
can then be partitioned away from the NULLNET, by simply changing the network password, building a new 100% private network, easily.
Flexible length key sizes. Defaults to 3096 bit RSA.
FireFox Profiles: We noticed a bug in the previous version that prevented complete
integration. This has now been fixed.
Tor: Updated to tor-0.3.2.10.

[close]

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 7.5.1
« Antwort #352 am: 13 März, 2018, 09:14 »
Changelog

All platforms:

Update Firefox to 52.7.0esr
Update Tor to 0.3.2.10

Update Torbutton to 1.9.8.6:

Bug 24159: Version check does not deal with platform specific checks
Bug 25016: Remove 2017 donation banner
Translations update

Update Tor Launcher to 0.2.14.4:

Bug 25089: Special characters are not escaped in proxy password
Translations update
Update NoScript to 5.1.8.4
Bug 25356: Update obfs4proxy to v0.0.7
Bug 25000: Add [System+Principal] to the NoScript whitelist

Windows:

* Bug 25112: Disable sandboxing on 64-bit Windows <= Vista

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 7.5.2
« Antwort #353 am: 17 März, 2018, 18:00 »
Whats new:>>

All platforms

    Update Firefox to 52.7.2esr

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser Bundle 7.5.3
« Antwort #354 am: 26 März, 2018, 18:00 »
Whats new:>>

* All platforms

   * Update Firefox to 52.7.3esr
   * Update HTTPS Everywhere to 2018.3.13
   * Bug 25339: Adapt build system for Python 3.6 based build procedure

Download hier: https://dist.torproject.org/torbrowser/7.5.3/

https://www.torproject.org/


Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Pirate Browser 0.8 (7.5.3)
« Antwort #355 am: 28 März, 2018, 13:49 »
PirateBrowser is a bundle package of the Tor client and FireFox Portable browser and custom configs that allow you to circumvent censorship.

PirateBrowser is a bundle package of the Tor client (Vidalia) and FireFox Portable browser (with foxyproxy addon) and some custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens.

Freeware

https://lilfellauk.wordpress.com/pirate-tor-browser/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0a5
« Antwort #356 am: 29 März, 2018, 20:00 »
Changelog

All platforms

    Update Firefox to 52.7.3esr
    Update HTTPS Everywhere to 2018.3.13
    Bug 23439: Exempt .onion domains from mixed content warnings

OS X

    Update Snowflake
        Bug 21312+25579+25449: Fix crashes and memory/file descriptor leaks in go-webrtc

Linux

    Update Snowflake
        Bug 21312+25579+25449: Fix crashes and memory/file descriptor leaks in go-webrtc

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 7.2018.04
« Antwort #357 am: 30 März, 2018, 20:00 »
Changelog

• WASTE: Updated to 1.8.0 Release. Build 044.
We celebrate the release version of WASTE 1.8 by listing its comprehensive set of changes. These changes form the difference from version 1.7 build 442.
◦ Seamless IPv4 / Onion compatibility. WASTE can co-exist within a mixed network. Designed to work hand-in-glove with Tor onion addresses. You can now host a WASTE network within the Tor address space only. IPv4 addresses still work in Tor mode. In Tor mode, WASTE has a built-in bias towards using Onion addresses.
◦ uPnP Module: WASTE now talks uPnP to local routers, saving users the head-ache of port-forwarding.
◦ Autostart: you can now auto-start, either in-view or minimized.
◦ Upgraded File Transfer. Now supports more comprehensive resume ability and transfer ETA’s for both the sender and receiver. It can handle more files.
◦ Balloon Tip Transfer Notifications. This prevents the UI being interrupted by large file count transfer requests.
◦ Transfer speeds > 20 mbit in IPv4 mode. It is advisable to avoid using Tor for heavy file transfers. This may be enforced in future versions.
◦ Networking upgrade. All new Socks4a compliant networking layer. Better UI indication of connection semiotics.
◦ Non-signal bandwidth usage is now reduced to < 3 kbps.
◦ Prevents users from making mistakes when adding addresses. Such as trying to connect to a local address over Tor. Or an onion address over IPv4.
◦ Designed to keep the network map it builds for about 20 years !!! At which point it gives up and reverts to initial conditions. Note. If you switch between IPv4 and Tor modes the network is reinitialized.
◦ Sharing Public Keys with individual users. Users no longer have to send keys outside WASTE or broadcast them. Users can now privately send keys to those who they wish to establish a more private network with. That new private network can then be partitioned away from the NULLNET, by simply changing the network password, building a new 100% private network, easily.
◦ Flexible key sizes. Defaults to 3096 bit RSA PKI.
• FireFox Profiles: We noticed a bug in the previous version that prevented complete integration. This has now been fixed.
• Tor: Updated to tor-0.3.2.10.

[close]

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
OnionFruit Connect 3.3
« Antwort #358 am: 06 April, 2018, 10:00 »
OnionFruit Connect permits you to continue using your browser of choice to connect to the TOR network.

Having the ability to use a browser that you are already comfortable with makes using TOR more of a seamless process. OnionFruit Connect will initiate the TOR service and then configures your proxy settings allowing your apps to be routed through TOR's tunnel. You will be notified know you're protected confirming that all your internet traffic is being passed through the TOR tunnel safely encrypted. This process ensures that every single site you visit gets routed through multiple servers to help mask your actions making them difficult to track.

Freeware

https://dfnet.ml/onionfruit/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor 0.3.3.5 RC
« Antwort #359 am: 19 April, 2018, 21:00 »
Changelog

Major bugfixes (security, protover, voting):

Revise Rust implementation of protover to use a more memory- efficient voting algorithm and corresponding data structures, thus avoiding a potential memory-based DoS attack where specially crafted protocol strings would expand to fill available memory. Fixes bug 24031; bugfix on 0.3.3.1-alpha.

Major bugfixes (performance, load balancing):

Directory authorities no longer vote in favor of the Guard flag for relays without directory support. Starting in Tor 0.3.0.1-alpha, clients have been avoiding using such relays in the Guard position, leading to increasingly broken load balancing for the 5%-or-so of Guards that don't advertise directory support. Fixes bug 22310; bugfix on 0.3.0.6.

Minor feature (continuous integration):

Update the Travis CI configuration to use the stable Rust channel, now that we have decided to require that. Closes ticket 25714.

Minor features (config options):

Change the way the default value for MaxMemInQueues is calculated. We now use 40% of the hardware RAM if the system has 8 GB RAM or more. Otherwise we use the former value of 75%. Closes ticket 24782.

Minor features (geoip):

Update geoip and geoip6 to the April 3 2018 Maxmind GeoLite2 Country database. Closes ticket 25718.

Minor bugfixes (client):

When using a listed relay as a bridge, and also using microdescriptors, and considering that relay as a non-bridge in a circuit, treat its microdescriptor as a valid source of information about that relay. This change should prevent a non- fatal assertion error. Fixes bug 25691; bugfix on 0.3.3.4-alpha.

Minor bugfixes (controller):

Restore the correct operation of the RESOLVE command, which had been broken since we added the ability to enable/disable DNS on specific listener ports. Fixes bug 25617; bugfix on 0.2.9.3-alpha.

Minor bugfixes (distribution, compilation, rust):

Build correctly when the rust dependencies submodule is loaded, but the TOR_RUST_DEPENDENCIES environment variable is not set. Fixes bug 25679; bugfix on 0.3.3.1-alpha.
Actually include all of our Rust source in our source distributions. (Previously, a few of the files were accidentally omitted.) Fixes bug 25732; bugfix on 0.3.3.2-alpha.

Minor bugfixes (documentation):

Document that the PerConnBW{Rate,Burst} options will fall back to their corresponding consensus parameters only if those parameters are set. Previously we had claimed that these values would always be set in the consensus. Fixes bug 25296; bugfix on 0.2.2.7-alpha.
Revert a misformatting issue in the ExitPolicy documentation. Fixes bug 25582; bugfix on 0.3.3.1-alpha.

Minor bugfixes (exit node DNS retries):

Re-attempt timed-out DNS queries 3 times before failure, since our timeout is 5 seconds for them, but clients wait 10-15. Also allow slightly more timeouts per resolver when an exit has multiple resolvers configured. Fixes bug 21394; bugfix on 0.3.1.9.

Minor bugfixes (onion services):

Re-instate counting the client HSDir fetch circuits against the MaxClientCircuitsPending rate limit. Fixes bug 24989; bugfix on 0.3.3.1-alpha.
Remove underscores from the _HSLayer{2,3}Nodes options. This expert-user configuration can now be enabled as HSLayer{2,3}Nodes. Fixes bug 25581; bugfix on 0.3.3.1-alpha

Code simplification and refactoring:

Move the list of default directory authorities to its own file. Closes ticket 24854. Patch by "beastr0".

Documentation (manpage, denial of service):

Provide more detail about the denial-of-service options, by listing each mitigation and explaining how they relate. Closes ticket 25248.

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )