Tor is a community of digital tunnels that permits human beings and groups to improve their privateness and protection at the Internet. It additionally allows software program developers to create new verbal exchange tools with built-in privacy features.
How does the Tor Browser keep my net pastime nameless?
The Tor Browser uses the Tor community, which consists of greater than six thousand relays located global, to cover the customers' vicinity and on line site visitors. This ensures anonymity and avoids your sports from being seen by means of others.
What is Tor Browser?
The Tor Browser is the flagship product from the Tor Project. The net browser is based totally on a changed version of Mozilla Firefox ESR that consists of extras like the Tor proxy, TorButton, TorLauncher, NoScript, and HTTPS Everywhere extensions.
Who uses the Tor Browser?
With Tor Browser having made Tor more on hand to everyday internet customers and activists, Tor turned into an instrumental tool throughout the Arab Spring beginning in overdue 2010. It not best covered people's identification on line but also allowed them to get entry to vital sources, social media, and websites which were blocked.
Individuals use Tor to preserve websites from monitoring them and their own family contributors, or to hook up with information web sites, instant messaging offerings, or the like when those are blocked through their neighborhood Internet vendors. Tor's hidden services let users put up internet web sites and other services while not having to reveal the vicinity of the website online. Individuals also use Tor for socially sensitive conversation: chat rooms and net boards for rape and abuse survivors, or humans with illnesses.
Journalists use Tor to talk extra safely with whistleblowers and dissidents. Non-governmental groups (NGOs) use Tor to permit their people to connect to their home website whilst they're in another country, without notifying all and sundry close by that they're working with that business enterprise.
Groups such as Indymedia recommend Tor for shielding their individuals' online privateness and security. Activist groups like the Electronic Frontier Foundation (EFF) suggest Tor as a mechanism for maintaining civil liberties on-line. Corporations use Tor as a safe manner to behavior aggressive evaluation, and to defend touchy procurement styles from eavesdroppers. They also use it to replace traditional VPNs, which reveal the precise amount and timing of verbal exchange. Which locations have employees working past due? Which locations have personnel consulting activity-searching websites? Which studies divisions are communicating with the agency's patent legal professionals?
A department of the U.S. Navy makes use of Tor for open source intelligence collecting, and one in all its groups used Tor at the same time as deployed within the Middle East lately. Law enforcement makes use of Tor for visiting or surveilling internet web sites with out leaving authorities IP addresses in their web logs, and for security for the duration of sting operations.
Is Tor higher than a VPN?
Tor isn't a VPN. Tor is a loose browser just like Chrome or Firefox, but it consists of functions that encrypt your IP cope with, making your browsing sessions non-public. A VPN (Virtual Private Network) is software that may trade your IP cope with while you use any browser set up on your PC. To study more about VPNs, you can examine this text.
What's New
This is our first solid release primarily based on Firefox ESR a hundred and fifteen, incorporating a year's really worth of modifications shipped upstream. As part of this system we have additionally finished our annual ESR transition audit, where we evaluation Firefox's changelog for issues which can negatively affect the privateness and safety of Tor Browser customers and disable any elaborate patches in which important. Our final reports from this audit are actually available in the tor-browser-spec repository on our Gitlab instance.
Particularly top notch are the accessibility enhancements we have won due to the transition to Firefox ESR a hundred and fifteen. While eagle-eyed users may also note small visible changes to the person interface (as an example, internal links are now underlined), Tor Browser 13.Zero is our first release to inherit the redesigned accessibility engine brought by Mozilla in Firefox 113. This trade guarantees to enhance performance drastically for folks who use display screen readers and different assistive technology.
Refreshed software icons
Earlier this year we spent some time artworking the Mullvad Browser logo into the various belongings had to help its release – including utility, installer and file icons that comply with each platform's conventions. While getting up to the mark with the present day requirements for each platform, we identified some of gaps with Tor Browser too, and began running on new icons for Tor Browser in parallel.
For context, Tor Browser's present day icon (sometimes referred to as the "onion logo") changed into decided on through community poll over 4 years ago to succeed the older purple and inexperienced globe in Tor Browser 8.5. Given the community's involvement in its selection, its recognizability with the aid of netizens, and the simple truth that we nonetheless love the present icon, we chose to recognition on refining in preference to changing it absolutely.
One of the motivations behind work like that is our philosophy that privateness-retaining products should not be in simple terms utilitarian, however can also spark pleasure. However there are practical benefits too: adhering to platform conventions offers higher consistency, discernible utility and installer icons assist prevent consumer error, and attracting new users blessings everyone due to the fact anonymity loves employer.
New homepage
For the past year we've been operating on a considerable rewrite of Tor Browser's returned-cease, which these days provided us with the possibility to rebuild one of the few internal pages that hasn't changed in a while: the homepage (often referred to by using its internal reference, "approximately:tor"). Tor Browser 13.0's homepage now capabilities the new application icons, a simplified design, and the capacity to "onionize" your DuckDuckGo searches through switching to the DuckDuckGo onion site. Continuing the paintings that started in Tor Browser 12.Five to enhance the browser's accessibility, the redesigned homepage additionally gives better help for customers of screen readers and different assistive era too.
Existing Tor Browser customers can rejoice that the "pink display of dying" – an notorious mistakes kingdom that the previous homepage would every now and then trip itself into – is lengthy long gone. As part of the again-quit rewrite we've eliminated the automatic Tor community connectivity take a look at that was a maintain-over from the legacy tor-launcher, where bootstrapping changed into treated with the aid of an extension that ran before the browser interface regarded. As a result of the tighter tor integration and in-browser bootstrapping revel in introduced in Tor Browser 10.Five, the old logic at the back of this test might regularly fail and gift a few customers with the pink display of dying, although their connection became first-class.
In reality, all of the reports we've obtained of users hitting this display with the default tor configuration since Tor Browser 10.Five have confirmed to be false positives, inflicting undue alarm. Although the check is arguably nonetheless beneficial for users running non-default configurations, neither of the principle environments which do so – Tails and Whonix – use about:tor as their default new-tab or home pages. For all and sundry else, we've added a brand new banner to the redesigned homepage in area of the red display screen of demise to check that tor is hooked up and working as anticipated.
Bigger new home windows
The explanation for how and why Tor Browser works this way goes to get into the weeds a little, so be warned. However the primary factor to take away is that new home windows should be larger with the aid of default and gift themselves in a more useful landscape component-ratio for almost all of desktop customers in Tor Browser thirteen.Zero. Now, approximately those weeds...
Letterboxing changed into delivered in Tor Browser nine.Zero to permit users to resize their browser window without worry of being fingerprinted with the aid of rounding the internal content material window (every so often called the "viewport") down to multiples of two hundred x 100 pixels. This technique works through grouping the window sizes of maximum customers into a series of not unusual "buckets", defensive individual users within the ones buckets from being singled-out based totally on their window or display screen size.
In order to preserve those protections whilst opening new windows, Tor Browser overrides platform defaults and will instead pick a size that conforms to our letterboxing steps as much as a most of a thousand x 1000 pixels. However, while that can had been first-class inside the past, a max width of 1000px is no longer appropriate for the present day web. For example, on many more recent websites the primary responsive smash point lies someplace in the range of a thousand – 1200px, that means by means of default Tor Browser customers would get hold of website menus and layouts intended for pill and cell gadgets. Alternatively, on certain web sites, customers might obtain the desktop version however with the annoyance of a horizontal scroll bar as an alternative. This, obviously, could cause users of those websites needing to expand each new window manually earlier than it's usable.
In reaction we've bumped up the max length of latest windows as much as 1400 x 900 pixels and amended the letterboxing steps to suit. Thanks to the increase in width, Tor Browser for computer need to no longer trigger responsive smash points on large displays and the substantial majority of our computing device customers will see a familiar landscape thing-ratio extra in-maintaining with contemporary browsers. This precise length turned into selected by using crunching the numbers to offer extra actual estate for new windows with out growing the range of buckets beyond the factor of their usefulness. As an introduced bonus, we additionally expect that Tor Browser users will now not sense the need to manually alternate their window length as regularly as earlier than – thereby preserving extra customers aligned to the default buckets.
All Platforms
- Updated tor to 0.Four.8.7
- Updated OpenSSL to 3.Zero.Eleven
- Bug tor-browser-specssharpp40050: FF103 Audit
- Bug tor-browser-specssharpp40051: FF104 Audit
- Bug tor-browser-specssharpp40052: FF105 Audit
- Bug tor-browser-specssharpp40053: FF106 Audit
- Bug tor-browser-specssharpp40054: FF107 Audit
- Bug tor-browser-specssharpp40055: FF108 Audit
- Bug tor-browser-specssharpp40056: FF109 Audit
- Bug tor-browser-specssharpp40057: FF110 Audit
- Bug tor-browser-specssharpp40058: FF111 Audit
- Bug tor-browser-specssharpp40059: FF112 Audit
- Bug tor-browser-specssharpp40060: FF113 Audit
- Bug tor-browser-specssharpp40061: FF114 Audit
- Bug tor-browser-specssharpp40062: FF115 Audit
- Bug tor-browserssharpp26277: When "Safest" putting is enabled looking the use of duckduckgo ought to always use the Non-Javascript site for searches
- Bug tor-browserssharpp40577: Add "suggest url" in DDG onion's occur
- Bug tor-browserssharpp40938: Migrate ultimate torbutton capability to tor-browser
- Bug tor-browserssharpp41092: Enable tracking query parameters stripping
- Bug tor-browserssharpp41327: Disable UrlbarProviderInterventions
- Bug tor-browserssharpp41399: Update Mozilla's patch for Bug 1675054 to permit brotli encoding for HTTP onions as nicely
- Bug tor-browserssharpp41477: Review a few extensions.* preferences
- Bug tor-browserssharpp41496: Review 000-tor-browser.Js and 001-base-profile.Js for one hundred fifteen
- Bug tor-browserssharpp41576: ESR115: make certain no far off requires weather & addon guidelines
- Bug tor-browserssharpp41605: Remove unused property from torbutton (options-cell.Css)
- Bug tor-browserssharpp41675: Remove javascript.Alternatives.Large arraybuffers
- Bug tor-browserssharpp41727: WebRTC privacy-hardening settings
- Bug tor-browserssharpp41740: ESR115: trade devicePixelRatio spoof to 2 in alpha for checking out
- Bug tor-browserssharpp41752: Review changes completed through Bug 41565
- Bug tor-browserssharpp41796: Rebase Tor Browser to Firefox a hundred and fifteen
- Bug tor-browserssharpp41797: Lock RFP in launch builds
- Bug tor-browserssharpp41934: Websocket increases DOMException on http onions in 13.0a1
- Bug tor-browserssharpp41936: Review Mozilla 1770158: Use double-conversion library in place of dtoa for string-to-double conversion
- Bug tor-browserssharpp41937: Review Mozilla 1780014: Add particular telemetry for conservative and primary-strive handshakes
- Bug tor-browserssharpp41938: Review Mozilla 1769994: On structures with IPv6 preferred DNS decision clients will fail to attach while "localhost" is used as host for the WebSocket server
- Bug tor-browserssharpp41939: Review Mozilla 1728871: Support fetching information from Remote Setting
- Bug tor-browserssharpp41941: Review Mozilla 1775254: Improve Math.Pow accuracy for large exponents
- Bug tor-browserssharpp41943: Lock javascript.Alternatives.Spectre.Disable for isolated content to false
- Bug tor-browserssharpp41945: Review Mozilla 1783019: Add a cookie banner service to robotically take care of internet site cookie banners
- Bug tor-browserssharpp41946: Review Mozilla 1782579: Add a locale parameter to the textual content recognition API
- Bug tor-browserssharpp41947: Review Mozilla 1779005: Broken seeing that Firefox 102.Zero: no instant fallback to direct connection when proxy became unreachable whilst runtime
- Bug tor-browserssharpp41950: Review Mozilla 1788668: Add the possibility to check that the clipboard carries some pdfjs stuff
- Bug tor-browserssharpp41951: Review Mozilla 1790681: Enable separatePrivateDefault by default
- Bug tor-browserssharpp41959: Review Mozilla 1795944: Remove descriptionheightworkaround
- Bug tor-browserssharpp41960: Review Mozilla 1797896: Proxy surroundings variables should be top case / case insensitive
- Bug tor-browserssharpp41961: Review Mozilla 1798868: Hide cookie banner coping with UI through default
- Bug tor-browserssharpp41969: Review Mozilla 1746983: Re-enable pingsender2
- Bug tor-browserssharpp41970: Review Mozilla 17909270: WebRTC bypasses Network settings & proxy.OnRequest
- Bug tor-browserssharpp41984: Rename languageNotification.Ftl to base-browser.Ftl
- Bug tor-browserssharpp42013: Review Mozilla 1834374: Do no longer call EmptyClipboard() in nsBaseClipboard destructor
- Bug tor-browserssharpp42014: Review Mozilla 1832791: Implement a Remote Settings for the Quarantined Domains pref
- Bug tor-browserssharpp42015: Review Mozilla 1830890: Keep a history window of WebRTC stats for about:webrtc
- Bug tor-browserssharpp42019: Empty browser's clipboard on browser shutdown
- Bug tor-browserssharpp42026: Disable cookie banner carrier and UI.
- Bug tor-browserssharpp42029: Defense-in-depth: disable non-proxied UDP WebRTC
- Bug tor-browserssharpp42034: aboutTBUpdate.Dtd is duplicated
- Bug tor-browserssharpp42043: Disable gUM: media.Gadgets.Enumerate.Legacy.Enabled
- Bug tor-browserssharpp42061: Move the alpha update channel advent to a commit on its very own
- Bug tor-browserssharpp42084: Race circumstance with language options may make spoof english useless
- Bug tor-browserssharpp42085: NEWNYM sign lacking on Whonix
- Bug tor-browserssharpp42094: Disable media.Aboutwebrtc.Hist.Enabled as security in-depth
- Bug tor-browserssharpp42120: Use foursquare as domain front for snowflake
- Bug tor-browser-buildssharpp40887: Update Webtunnel model to 38eb5505
Windows macOS Linux
- Updated Firefox to 115.Three.1esr
- Bug tor-browserssharpp30556: Re-evaluate letterboxing measurement alternatives
- Bug tor-browserssharpp32328: Improve blunders restoration from the purple screen of death
- Bug tor-browserssharpp33282: Increase the max width of recent windows
- Bug tor-browserssharpp33955: Selecting "Copy image" from menu leaks the source URL to the clipboard. This statistics is regularly dereferenced by way of different packages.
- Bug tor-browserssharpp40175: Connections in reader mode aren't FPI
- Bug tor-browserssharpp40982: Cleanup maps in tor-circuit-display
- Bug tor-browserssharpp40983: Move no longer UI-associated torbutton.Js code to modules
- Bug tor-browserssharpp41165: Crash with debug assertions enabled
- Bug tor-browserssharpp41333: Modernize Tor Browser's new-tab page (about:tor)
- Bug tor-browserssharpp41423: about:tor semantic and accessibility troubles
- Bug tor-browserssharpp41528: Hard-coded English "based on Mozilla Firefox" appears in model in "About" dialog
- Bug tor-browserssharpp41581: ESR115: discern out extension pinning / unified Extensions
- Bug tor-browserssharpp41639: Fix the wordmark (identify and heritage) of the "About Tor Browser" window
- Bug tor-browserssharpp41642: Do no longer disguise new PBM in the hamburger menu if auto PBM isn't always enabled
- Bug tor-browserssharpp41651: Use moz-toggle in connection possibilities
- Bug tor-browserssharpp41691: "Firefox Suggest" text performing in UI
- Bug tor-browserssharpp41717: Bookmark toolbar visibility on new tabs is not venerated whilst new tab web page is not approximately:clean
- Bug tor-browserssharpp41739: Remove "Website look"
- Bug tor-browserssharpp41741: Refactor the area isolator and new circuit
- Bug tor-browserssharpp41765: TTP-02-006 WP1: Information leaks through custom homepage (Low)
- Bug tor-browserssharpp41766: TTP-02-001 WP1: XSS in TorConnect's captive portal (Info)
- Bug tor-browserssharpp41771: Decide what to do for firefoxview
- Bug tor-browserssharpp41774: Hide the brand new "Switching to a brand new tool" help menu item
- Bug tor-browserssharpp41791: Copying web page contents also puts the supply URL on the clipboard
- Bug tor-browserssharpp41812: Review format for XUL factors
- Bug tor-browserssharpp41813: Look out for hyperlinks lacking underlines in ESR a hundred and fifteen-primarily based alphas
- Bug tor-browserssharpp41821: Fix the proxy kind in the proxy modal of approximately:possibilities in 13.0
- Bug tor-browserssharpp41822: The default browser button came again on one hundred fifteen
- Bug tor-browserssharpp41833: Reload extensions on new identity
- Bug tor-browserssharpp41834: Hide "Can't Be Removed - analyze more" menu line for uninstallable accessories
- Bug tor-browserssharpp41842: Remove the antique removal logics from Torbutton
- Bug tor-browserssharpp41844: Stop the usage of the manage port immediately
- Bug tor-browserssharpp41845: Stop forcing (terrible) pref values for non-PBM users
- Bug tor-browserssharpp41852: Review the Tor Check Service UX
- Bug tor-browserssharpp41864: TOR CONTROL HOST and TOR SOCKS HOST do now not paintings as anticipated whilst the browser launches tor
- Bug tor-browserssharpp41865: Use --textual content-colour-deemphasized in preference to --panel-description-coloration
- Bug tor-browserssharpp41874: Visual & A11 regressions in upload-on badges
- Bug tor-browserssharpp41876: Remove Firefox View from title bar
- Bug tor-browserssharpp41877: NoScript appears to be blockading by way of default within the first 115-based totally testbuild
- Bug tor-browserssharpp41881: Developer gear/Network/New Request remembers requests
- Bug tor-browserssharpp41886: Downloads drop-down panel has new-line/line-spoil among each phrase inside the 'Be careful opening downloads' warning
- Bug tor-browserssharpp41904: The log textarea would not resize anymore
- Bug tor-browserssharpp41906: Hide approximately:preferencesssharppprivacy > DNS over HTTPS section
- Bug tor-browserssharpp41907: The bootstrap is interrupted without any errors if the process becomes ready while already bootstrapping
- Bug tor-browserssharpp41912: "Use Current Bridges" is proven for customers even if there are not any current bridges
- Bug tor-browserssharpp41922: Unify the bridge line parsers
- Bug tor-browserssharpp41923: The route normalization outcomes in warnings
- Bug tor-browserssharpp41924: Small refactors for TorProcess
- Bug tor-browserssharpp41925: Remove the torbutton startup observer
- Bug tor-browserssharpp41926: Refactor the manipulate port patron implementation
- Bug tor-browserssharpp41931: Regression: new window leaks outer window
- Bug tor-browserssharpp41935: Improve new window & letterboxing dimensions
- Bug tor-browserssharpp41940: Review Mozilla 1739348: When a filetype is ready to "always ask" and the consumer makes a store/open choice in the dialog, we should now not additionally open the downloads panel
- Bug tor-browserssharpp41949: Review Mozilla 1782578: Implement a context menu modal for textual content recognition
- Bug tor-browserssharpp41954: Inputs inside the request a bridge dialog are reduce-off in 13.0 alpha
- Bug tor-browserssharpp41957: Revert to Fx's default identification block style for inner pages
- Bug tor-browserssharpp41958: Console blunders while last tor browser with approximately:options open
- Bug tor-browserssharpp41964: emojiAnnotations not described in time in connection options
- Bug tor-browserssharpp41965: TorConnect blunders when opening browser gear
- Bug tor-browserssharpp41971: Update Tails URL in downloads caution
- Bug tor-browserssharpp41973: Custom wingpanels don't line up with their toolbar icons in 13.Zero alpha
- Bug tor-browserssharpp41974: De-emphasized textual content in custom components is not grey in thirteen.0 alpha
- Bug tor-browserssharpp41975: Downloads warning text too narrow in thirteen.0 alpha
- Bug tor-browserssharpp41976: Bottom padding on collapsed bridge cards has elevated in 13.0 alpha
- Bug tor-browserssharpp41977: Hide the "Learn more" link in bridge playing cards
- Bug tor-browserssharpp41980: Circuit show headline is misaligned in thirteen.0 alpha
- Bug tor-browserssharpp41981: Review Mozilla 1800675: Add about:choices access for cookie banner coping with
- Bug tor-browserssharpp41983: Review Mozilla 1770447: Create a reusable "help-hyperlink" widget
- Bug tor-browserssharpp41986: Fix the control port password managing
- Bug tor-browserssharpp41994: CSS (and different property) of some web sites blocked in 13.Zero alpha
- Bug tor-browserssharpp42022: Prevent extension serps from breaking the complete seek system
- Bug tor-browserssharpp42027: Create a Base Browser model of migrateUI
- Bug tor-browserssharpp42037: Disable approximately:firefoxview
- Bug tor-browserssharpp42041: TBB --allow-remote mixes up with undeniable Firefox
- Bug tor-browserssharpp42045: Circuit panel overflows with lengthy ipv6 addresses
- Bug tor-browserssharpp42046: Remove XUL layout hacks from base browser
- Bug tor-browserssharpp42047: Remove layout hacks from tor browser preferences
- Bug tor-browserssharpp42050: Bring again Save As... Dialog as default
- Bug tor-browserssharpp42073: Add simplified onion sample to the brand new homepage
- Bug tor-browserssharpp42075: Fix hyperlink spacing and underline on new homepage
- Bug tor-browserssharpp42079: TorConnect: deal with switching from Bootstrapped to Configuring nation
- Bug tor-browserssharpp42083: RemoteSecuritySettings.Init throws errors in console
- Bug tor-browserssharpp42091: Onion authorization spark off overflows
- Bug tor-browserssharpp42092: Onion services key table display problems.
- Bug tor-browserssharpp42098: Implement Windows installer icons
- Bug tor-browserssharpp42100: Connect Assist dropdown text no longer targeted
- Bug tor-browserssharpp42102: TorProcess says the SOCKS port is not valid although it is
- Bug tor-browserssharpp42109: Onion services keys table has empty column headers.
- Bug tor-browserssharpp42110: Add a utility module for shared UI strategies wanted for numerous tor browser additives
- Bug tor-browserssharpp42126: moat and connect help damaged for folks who can't reach area front
- Bug tor-browserssharpp42129: Disable the Tor restart prompt if shouldStartAndOwnTor is false
- Bug tor-browserssharpp42131: Tor Browser thirteen.1/2 does not track circuits created earlier than Tor Browser started out
- Bug tor-browserssharpp42132: The new control port dealing with in Tor Browser 13 breaks a Tails safety function
- Bug tor-browserssharpp42138: Disable apz.Overscroll.Enabled pref
- Bug tor-browserssharpp42155: Drop the unused code for the vintage bridge removal caution
- Bug tor-browserssharpp42159: Responsive Design Mode no longer working effectively
- Bug tor-browserssharpp42160: Allow specifying a TOR PROVIDER=none to configure simplest the proxy settings during the TorProviderBuilder initialization
- Bug tor-browserssharpp42166: New identity dialog lacking on hand call
- Bug tor-browserssharpp42167: Make the choice automobile-recognition more reliable
- Bug tor-browser-buildssharpp40821: The replace info URL is wrong in alphas
- Bug tor-browser-buildssharpp40893: Update (Noto) fonts for 13.0
- Bug tor-browser-buildssharpp40924: Customize MOZ APP REMOTINGNAME as opposed to passing --call and --magnificence
- Bug tor-browser-buildssharpp40938: Copy the new tor-browser.Ftl record to the precise listing
Windows Android
- Bug tor-browser-buildssharpp40930: Upate zlib to 1.Three after thirteen.0a3
Windows
- Bug tor-browserssharpp40737: Revert backout of Mozilla's restore for malicious program 1724777
- Bug tor-browserssharpp41658: Create new installer icons for Windows
- Bug tor-browserssharpp41798: Stop building private browsing.Exe on Windows
- Bug tor-browserssharpp41806: Prevent Private Browsing start menu item to be added robotically
- Bug tor-browserssharpp41942: Review Mozilla 1682520: Use the WER runtime exception module to capture early crashes
- Bug tor-browserssharpp41944: Review Mozilla 1774083: Add Surrogate COM Server to handle native Windows notifications while Firefox is closed.
- Bug tor-browserssharpp42008: Review Mozilla 1808146: Copying pictures from Pixiv and pasting them in sure packages is broken
- Bug tor-browserssharpp42010: Review Mozilla 1810641: Enable overscroll on Windows on all channels
- Bug tor-browserssharpp42087: Implement Windows application icons
- Bug tor-browser-buildssharpp40954: Implement Windows installer icons
macOS
- Bug tor-browserssharpp41948: Review Mozilla 1782981: Hide the text reputation context menu if the macOS version would not help APIs
- Bug tor-browserssharpp41955: Update macOS extent window history
- Bug tor-browserssharpp41982: Review Mozilla 1762392: Add Cocoa platform help for paste files
- Bug tor-browserssharpp42057: Disable Platform textual content-recognition capability
- Bug tor-browserssharpp42078: Implement MacOS software icons
- Bug tor-browserssharpp42147: Add browser.HelperApps.DeleteTempFileOnExit to our profile
Linux
- Bug tor-browserssharpp41509: After update, KDE Plasma identifies Tor Browser Nightly window organization as "firefox-nightly"
- Bug tor-browserssharpp41884: Linux: set browser.Tabs.Searchclipboardfor.Middleclick to false
- Bug tor-browserssharpp42088: Implement Linux software icons
- Bug tor-browser-buildssharpp40576: Fontconfig caution: cast off 'blank' configuration
Android
- Updated GeckoView to 115.Three.1esr
- Bug tor-browserssharpp41878: firefox-cellular: refactor tor bootstrap off deleted onboarding path
- Bug tor-browserssharpp41882: Update DuckDuckGo icons
- Bug tor-browserssharpp41911: Firefox-Android tor bootstrap connect button css broken
- Bug tor-browserssharpp41928: Backport Android-precise security fixes from Firefox 116 to ESR 102.14 / a hundred and fifteen.1 - primarily based Tor Browser
- Bug tor-browserssharpp41972: Disable Firefox onboarding in thirteen.Zero
- Bug tor-browserssharpp41990: Review Mozilla 1811531: Add 'website online' question parameter to Pocket sponsored testimonies request
- Bug tor-browserssharpp41991: Review Mozilla 1812518: Allow a custom View for third birthday party downloads
- Bug tor-browserssharpp41993: Review Mozilla 1810761: Add API for saving a PDF
- Bug tor-browserssharpp41996: App includes com.Google.Android.Gms.Permission.AD ID permission
- Bug tor-browserssharpp41997: com.Alter.Sdk.Adjust library enables AD ID permission despite the fact that we are not the use of it
- Bug tor-browserssharpp41999: TB13.0a2 android: center textual content on connect button
- Bug tor-browserssharpp42001: Hide 'Open links in external app' settings choice and pressure defaults
- Bug tor-browserssharpp42002: Review Mozilla 1809305: Allow person to replicate an photograph to the clipboard
- Bug tor-browserssharpp42003: Review Mozilla 1819431: Reimplement default browser notification with Nimbus Messaging equal
- Bug tor-browserssharpp42004: Review Mozilla 1818015: Use a custom tab or the view we use for Sync onboarding for the Privacy button
- Bug tor-browserssharpp42005: Review Mozilla 1816932: Add Maps to app links common sub domains
- Bug tor-browserssharpp42006: Review Mozilla 1817726: Allow sharing present day tab URL from Android's Recents (App Overview) display screen.
- Bug tor-browserssharpp42007: Review Mozilla 1805450: Allow customers to put up web site help requests in Fenix
- Bug tor-browserssharpp42012: Review Mozilla 1810629: upload an Android shortcut to move directly to the login and passwords page
- Bug tor-browserssharpp42016: Review Mozilla 1832069: Implement Google Play Referrer Library to fetch referrer URL
- Bug tor-browserssharpp42018: Rebase Firefox for Android to 115.2.1
- Bug tor-browserssharpp42023: Remove FF what's new from Android
- Bug tor-browserssharpp42038: TBA Alpha - inscriptions Tor Browser Alpha and FireFox Browser simultaneously at the start display
- Bug tor-browserssharpp42074: YEC 2023 Takeover for Android Stable
- Bug tor-browserssharpp42076: Theme is seen in alternatives, but shouldn't be
- Bug tor-browserssharpp42089: Disable the Cookie Banner Reduction web page assist requests (Mozilla 1805450)
- Bug tor-browserssharpp42114: Disable Allow sharing cutting-edge tab URL from Android's Recents display in non-public surfing mode
- Bug tor-browserssharpp42115: Enhanced Tracking Protection can still be enabled
- Bug tor-browserssharpp42122: playstore console crashes: java.Lang.NoSuchMethodError
- Bug tor-browserssharpp42133: Remove "Total Cookie Protection" popup
- Bug tor-browserssharpp42134: Remove Android icon shortcuts
- Bug tor-browserssharpp42156: Screenshot allowing nonetheless blocks homescreen (android)
- Bug tor-browserssharpp42157: Fix Help button URL
- Bug tor-browserssharpp42165: Remove "Add to shortcuts" and "Remove from shortcuts" buttons
- Bug tor-browserssharpp42158: Remove "Customize Homepage" button
- Bug tor-browser-buildssharpp40740: Tor Browser for Android's snowflake ClientTransportPlugin appears to be obsolete
- Bug tor-browser-buildssharpp40919: Fix nimbus-fml reproducibility of 13.0a2-build1
- Bug tor-browser-buildssharpp40941: Remove PT manner alternatives on Android
Keep Reading