Jump to content

Search the Community

Showing results for tags 'tor'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 37 results

  1. Pirate Tor Browser Updated 2020 by Team-LiL Revamped look , links in folders in toolbar Night mode Connecting to Tor Network Pirate Tor Browser is a bundle package of the Updated Tor client , Updated FireFox Portable browser (with Updated foxyproxy addon) and some custom configs , all has been revamped and Updated , Self extracting archive custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. For those wanting to reach torrent webpages they cant reach on a normal browser try the updated pirate browser.. portable.. you might have seen the first version that the pirate bay shared in 2013 pirate browser 0.6b http://piratebrowser.com/ alternate download still working now its been updated and revamped.. better updated links added , updated and added some good extensions to hide yourself online , Pirate Tor Browser version 08 build 9.0.9 latest updates to date Pirate.Browser.0.6b - 10/08/2013 - ( First version made by pirate bay org no longer updated ) Better.Pirate.Browser.0.7.(56.0.2) - 27/10/2017 - ( No longer updated by Team-LiL due to Quantum update ) Pirate.Tor.Browser.0.8.(9.0.9) updated - 09/04/2020 - ( still being updated by Team-LiL ) whats in recent update 09/04/2020 * means updated updated version build * updated some browser extensions updated shortcut url's updated proxyfoxy patterns Team-LiL HomePage http://lilfellauk.wordpress.com/pirate-tor-browser/ DOWNLOAD version 0.8.(9.0.9)
  2. Pirate Tor Browser Updated 2020 by Team-LiL Revamped look , links in folders in toolbar Night mode Connecting to Tor Network Pirate Tor Browser is a bundle package of the Updated Tor client , Updated FireFox Portable browser (with Updated foxyproxy addon) and some custom configs , all has been revamped and Updated , Self extracting archive custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. For those wanting to reach torrent webpages they cant reach on a normal browser try the updated pirate browser.. portable.. you might have seen the first version that the pirate bay shared in 2013 pirate browser 0.6b http://piratebrowser.com/ alternate download still working now its been updated and revamped.. better updated links added , updated and added some good extensions to hide yourself online , Pirate Tor Browser version 08 build 9.0.5 latest updates to date Pirate.Browser.0.6b - 10/08/2013 - ( First version made by pirate bay org no longer updated ) Better.Pirate.Browser.0.7.(56.0.2) - 27/10/2017 - ( No longer updated by Team-LiL due to Quantum update ) Pirate.Tor.Browser.0.8.(9.0.5) - 11/02/2020 - ( still being updated by Team-LiL ) whats in recent update 11/02/2020 updated version build* updated some browser extensions* updated shortcut url's* Team-LiL HomePage http://lilfellauk.wordpress.com/pirate-tor-browser/ please update to newer version .
  3. Censorship of news on the internet by the government has long been a point of controversy. Indeed, we have had points in the past where the BBC's Vietnamese website got blocked. On other occasions, China has previously blocked BBC's services in the country, and Iran has dabbled in the same as well. In a bid to fight against censorship and restricted access, BBC announced today that it's launching a mirror of its international news website on the dark web. In a statement, the news site said: To access the website, you will need Tor, which is a web browser that allows you to access content on the dark web securely. The web address for the alternate website to the regular BBC News is bbcnewsv2vjtpsuy.onion. Unsurprisingly, the link cannot be opened in regular browsers because of the 'onion' suffix. The 'dark' version of BBC will have foreign language services like BBC Persian, BBC Russian, and BBC Arabic. UK-only content and services including BBC iPlayer will be unavailable due to broadcasting rights. As stated before, the dark web version will be the international variant of BBC, not the UK variant. Source: 1. BBC turns to the dark web in a bid to fight censorship (via Neowin) - main article 2. BBC News launches 'dark web' Tor mirror (via BBC) - reference to the main article
  4. The team behind the Tails Operating System have announced the availability of Tails 4.0, the first major released to be based on Debian 10. With the re-basing of the operating system, new software is included – two important software packages that were updated are the Linux kernel which adds support for new hardware, and the Tor Browser which was bumped to version 9.0 and stops websites identifying you based on the size of the browser windows using a technique called letterboxing. Other software packages that were updated include KeePassXC which has replaced KeePassX, OnionShare has been upgraded to 1.3.2 bringing usability improvements, the metadata cleaner tool, MAT, has been upgraded to 0.8.0 and loses its graphical interface and now appears in the right-click menu instead, Electrum has been upgraded to 3.3.8 and works in Tails again, Enigmail was updated to mitigate OpenPGP certificate flooding, and Audacity, GIMP, Inkscape, LibreOffice, git, and Tor all received upgrades too. Another major change is to the Tails Greeter. With this update, languages which have too little translations to be useful have been removed, the list of keyboard layouts has been simplified, the options chosen in the Formats settings are now applied because they weren’t before, and finally, it’s now possible to open help pages in other languages than English, when available. The final thing worth mentioning about this update pertains to performance and usability improvements. Tails 4.0 starts 20% faster, requires 250MB less RAM, has a smaller download footprint, adds support for Thunderbolt devices, the on-screen keyboard is easier to use, and USB tethering from iPhone is now supported. Unfortunately, users on previous version will have to perform a manual update to Tails 4.0 but it shouldn’t take too long to do, you can find out more information on the Tails install guide. Source: Tails OS is now based on Debian 10 and ships major Tor Browser update (via Neowin)
  5. The Tor Project has raised $86,000 for a Bug Bash Fund that will be used to pay developers to quickly fix critical bugs such as vulnerabilities or privacy issues that leak personal information about a Tor user. Last month, the Tor Project announced that any donations made to the organization in August 2019 would be added to a Bug Bash Fund that would be used to pay for developers to fix critical bugs that come up. The types of issues that the Tor Project considers critical includes vulnerabilities, privacy issues such as when the browser may leak an IP address, issues with signing certificates for Tor addons, or to evaluate and upgrade the Tor browser to new Firefox ESR releases. To rapidly fix these issues, Tor must pay developers to analyze the issue, fix the code, and implement it in the Tor browser. As part of this donation drive, the Tor Project was able to raise $86K that will be used to pay for these costs and quickly fix issues that pop up. For anyone who contributed money to the Bug Smash Fund, the Tor Project stated that you can track how that money is being used as they will tag any bug tickets that utilize this money with the "BugSmashFund" tag. Source
  6. Tor Could Help Power a Super Private Browsing Mode in Firefox Mozilla positions privacy at the core of its Firefox browser, and the company wants to continue investments in this area on the long term. In the report covering the research grants for the first half of the year, Mozilla discusses the privacy and security improvements that it wants to make happen in Firefox. One of the priorities, Mozilla says, is to “integrate more of TOR in Firefox,” as the company wants to enhance privacy with what it calls a Super Private Browsing (SPB) for users. Mozilla already has a program to bring Tor features to Firefox. Called Tor Uplift, this effort helped implement fingerprinting protection in the browser, and as per GHacks, Mozilla could further enhance it for the creation of the aforementioned SPB mode too. Tor Browser itself also runs on the Firefox ESR version, providing users with privacy options that aren’t available, or at least not yet, in Mozilla’s browser.The challengesBut as Mozilla itself puts it, implementing more of Tor in Firefox browser isn’t necessarily an easy project, and the purpose of the research grant is to help deal with the challenges such an idea could bring. “Enabling a large number of additional users to make use of the Tor network requires solving for inefficiencies currently present in Tor so as to make the protocol optimal to deploy at scale. Academic research is just getting started with regards to investigating alternative protocol architectures and route selection protocols, such as Tor-over-QUIC, employing DTLS, and Walking Onions,” Mozilla says. Needless to say, this is something that Mozilla is only considering in the long-term and not a feature that is currently under development. The research grants offered by the company are specifically supposed to help pursue such ideas, albeit it goes without saying that not every little project comes to fruition. Source
  7. A joint operation conducted by law enforcement agencies in the United States and Europe allowed seizing the xDedic marketplace. Law enforcement agencies in the US and Europe announced the seizure of the popular xDedic marketplace, an underground market offering for sale access to compromised systems and personally identifiable information. The black marketplace has been active since 2014, it was first analyzed by experts at Kaspersky Lab in 2016. At the time, the domain (xdedic[.]biz) went offline following a report from Kaspersky Labs that detailed in its Corporate News section, the scope, and method of operations of the illicit marketplace. The website quickly reappeared in the Tor network. In 2016 the service was offering up to 70,000 hacked servers as little as $6 USD, and with 416 registered sellers in 173 countries, the platform was operating a highly successful global business model. The researchers confirmed that the xDedic marketplace is run by a Russian-speaking group. Law authorities in the United States, Belgium and Ukraine, in collaboration with the Europol, seized xDedic on January 24. Buyers were able to search accesses to compromised systems by multiple criteria, including price, geographic location, and operating system. The xDedic administrators maintained servers worldwide, they allowed payment in Bitcoin to protect users’ anonymity. Compromised systems belong to any industries, including local, state, and federal government infrastructure, hospitals, emergency services, major metropolitan transit authorities, accounting and law firms, pension funds, and universities. According to the investigators, the website facilitated more than $68 million in fraud. Source
  8. Tor Browser adds better HTML5 support, removes SHA-1 Tor browser 6.0 The Tor Project released today version 6.0 of its famous privacy-first Web browser, which is now based on the Firefox 45-ESR release, and features better HTML5 support and updated security features to safeguard encrypted traffic and its updates mechanism. There are a lot of people that hate the recent Australis-based Firefox versions, among which 45-ESR is one, mainly due to its revamped GUI that most users considered non-Firefoxey or too-Chromey. Nevertheless, the Web can get really lonely if the browser you're on doesn't fully support the modern technologies on which most websites are being built today. This update doesn't necessarily mean new features only, but throwing out the old as well, a picture perfect image of what the latest Tor Browser stable version is. Better HTML5 support means less Flash Being based on Firefox 45-ESR, Tor Browser 6.0 automatically brings in top-of-the-line HTML5 support, which should make it much easier now to leave your Flash plugin turned off on the majority of sites you're visiting. Since Flash can give away details like your IP, you should be staying away from Flash altogether if you value Tor more for its privacy features rather than for its ability to throw a different IP at you every time you boot it up. Secondly, Firefox 45-ESR also features support for the Push API for dynamic notifications, but also better support for the latest JavaScript standard, such as ES6 classes. The Tor team also brought in an important fix for Mac OS X, where the Tor Browser from now on will be using code-signing in order to avoid getting blocked by OS X's GateKeeper security app. Tor Browser 6.0 says good bye to SHA-1 The biggest changes, or at least in our eyes, are the modifications made to the browser's encryption layer. Since the Tor Browser works on top of an encryption-first protocol, support for modern cryptography must be up to par with such a reputation. As such, Tor Browser 6.0 has removed support for SHA-1 certificates, something that its bigger brothers such as Firefox, Chrome, and Edge have announced this past winter. These browsers are a little bit tardy, mainly due to their huge userbases and will be taking the first steps to remove SHA-1 at the end of June this year, and then a permanent step at the start of 2017. Furthermore, the latest Tor Browser version also comes with a better update mechanism, which now checks both the update package's signature and hash before running the update file. The team also fixed a simple yet serious DLL hijacking issue, and applied some quick fixes here and there to patch some urgent bugs, but the Project promised to deliver complete fixes for these issues in later versions. Tor partially fixes issues with its default search engine provider Last but not least, the Tor Project also clarified the situation of its default search engine, Disconnect, which is now displaying search results via DuckDuckGo's API, instead of Google. The Tor team explains that until Disconnect clarifies its situation with Google, the Tor Project has specifically asked the Disconnect team to supply them with DuckDuckGo search results instead of Bing, which they described as "basically unacceptable quality-wise." The Tor Browser 6.0 is available for download for the Linux, Mac, and Windows operating systems via Softpedia, but if you already have it installed, you should also be able to upgrade via its built-in updater. A full Tor Browser 6.0 changelog is also available. Article source
  9. Company launches new Cloudflare Onion Service. Only Tor Browser 8 and Tor Browser for Android users will see less or no CAPTCHAs. Cloudflare launched today a new service named the "Cloudflare Onion Service" that can distinguish between bots and legitimate Tor traffic. The main advantage of this new service is that Tor users will see far less, or even no CAPTCHAs when accessing a Cloudflare-protected website via the Tor Browser. The new Cloudflare Onion Service needed the Tor team to make "a small tweak in the Tor binary," hence it will only work with recent versions of the Tro Browser --the Tor Browser 8.0 and the new Tor Browser for Android, both launched earlier this month. Tor users who are dead tired of seeing an endless stream of Google reCAPTCHAs when accessing a Cloudflare-protected site are advised to update to one of these two versions. The new Cloudflare Onion Service is also free for all Cloudflare customers and can be enabled by switching on the "Opportunistic Encryption" option under the Crypto tab of the Cloudflare dashboard. Tor users have been complaining about seeing too many CAPTCHAs when accessing a Cloudflare-protect site for years now. In February 2016, Tor Project administrators went as far as to accuse Cloudflare of "sabotaging Tor traffic" by forcing Tor users to solve CAPTCHA fields ten times or more, in some cases. Cloudflare responded to accusations a month later, claiming the company was only showing CAPTCHAs because 94 percent of all Tor traffic was either automated bots or originating from malicious actors. Source
  10. Radpop

    Brave browser 0.24.0

    Brave browser 0.24.0 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.24.0dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.24.0dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.24.0: Fixed back and forward navigation buttons animating when scrolling on macOS. (#14785) Fixed back navigation button animating when attempting to scroll up while the page is already at the top on macOS. (#14829) Disabled swipe navigation when content is horizontally scrollable. (#14871) Fixed notifications not being displayed on certain websites. (#15124)) Fixed about:blank tabs being opened when Brave configured to start with home page address. (#15125) Fixed opening local files creates about:blank tabs. (#15134) Fixed opening tabs when there is no windows opened creates about:blank tabs on macOS. (#15162) Fixed opening local files via drag and drop creates about:blank tabs. (#15203) Upgraded to Tor 0.3.4 series. (#15179) Upgraded to muon 8.1.6. (#15101) Upgraded to Chromium 69.0.3497.100. (#15102) Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  11. Radpop

    Brave browser 0.23.107

    Brave browser 0.23.107 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.23.107dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.23.107dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.23.107: Upgraded to muon 8.0.10 Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  12. A team of Belgian researchers discovered privacy issues in how browsers, ad-blocking, and anti-tracking implementations handle third-party cookie requests. A team of Belgian researchers from KU Leuven analyzed third-party cookie policies of seven major web browsers, 31 ad-blockers and 14 anti-tracking extensions and discovered major and minor issues in all of them. Major issues include Microsoft Edge's unwillingness to honor its own "block only third-party cookies" setting, bypasses for Firefox's Tracking Protection feature, and use of the integrated PDF viewer in Chrome and other Chromium-based browsers for invisible tracking. Cookie requests can be sorted into two main groups: first-party requests that come from the address listed in the address bar of the browser and third-party requests that come from all other sites. Advertisement displayed by websites makes use of cookies usually and some of these cookies are used for tracking purposes. Internet users can configure their browsers to block any third-party cookie requests to limit cookie-based tracking. Some browsers, for instance Opera or Firefox, include ad-blockers or anti-tracking functionality that is used in addition to that. Anti-tracking mechanisms have flaws The research paper, "Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies", detailed information about each web browser, tests to find out if a browser is vulnerable to exploits, and bug reports are linked on the research project's website. The researchers created a test framework that they used to verify whether "all imposed cookie- and request-policies are correctly applied". They discovered that "most mechanisms could be circumvented"; all ad-blocking and anti-tracking browser extensions had at least one bypass flaw. In this paper, we show that in the current state, built-in anti-tracking protection mechanisms as well as virtually every popular browser extension that relies on blocking third-party requests to either prevent user tracking or disable intrusive advertisements, can be bypassed by at least one technique The researchers evaluated tracking protection functionality and a new cookie feature called same-site cookies that was introduced recently to defend against cross-site attacks. Results for all tested browsers are shown in the table below. The researchers tested the default configuration of Chrome, Opera, Firefox, Safari, Edge, Cliqz, and Tor Browser, and configurations with third-party cookie blocking disabled, and if available, tracking protection functionality enabled. Tor Browser is the only browser on the list that blocks third-party cookies by default. All browsers did not block cookies for certain redirects regardless of whether third-party cookies were blocked or tracking protection was enabled. Chrome, Opera and other Chromium-based browsers that use the built-in PDF viewer have a major issue in regards to cookies. Furthermore, a design flaw in Chromium-based browsers enabled a bypass for both the built-in third party cookie blocking option and tracking protection provided by extensions. Through JavaScript embedded in PDFs, which are rendered by a browser extension, cookie-bearing POST requests can be sent to other domains, regardless of the imposed policies. Browser extensions for ad-blocking or anti-tracking had weaknesses as well according to the researchers. The list of extensions reads like the who is who of the privacy and content blocking world. It includes uMatrix and uBlock Origin, Adblock Plus, Ghostery, Privacy Badger, Disconnect, or AdBlock for Chrome. The researchers discovered ways to circumvent the protections and reported several bugs to the developers. Some, Raymond Hill who is the lead developer of uBlock Origin and uMatrix, fixed the issues quickly. At least one issue reported to browser makers has been fixed already. "Requests to fetch the favicon are not interceptable by Firefox extensions" has been fixed by Mozilla. Other reported issues are still in the process of being fixed, and a third kind won't be fixed at all. You can run individual tests designed for tested web browsers with the exception of Microsoft Edge on the project website to find out if your browser is having the same issues. Closing Words With more and more technologies being added to browsers, it is clear that the complexity has increased significantly. The research should be an eye opener for web browser makers and things will hopefully get better in the near future. One has to ask whether some browser makers test certain features at all; Microsoft Edge not honoring the built-in setting to block third-party cookies is especially embarrassing in this regard. (via Deskmodder) Now You: Do you use extensions or settings to protect your privacy better? Source
  13. A new version of the Waterfox web browser for Google's Android operating system has been released that improves privacy significantly. A new version of the Waterfox web browser for Google's Android operating system has been released. The developer of Waterfox released a first public version of Waterfox for Android in 2017. The new version is available on Google Play and soon also on the alternative marketplace for Android applications F-Droid. The developer of Waterfox, Alex Kontos, released the new Android version of the web browser with big privacy improvements that should appeal to Android users who are interested in privacy. The new version is based on Tor and features all the privacy improvements that Tor developers added to the base Firefox version the project is based on. Waterfox for Android The developer promises that Waterfox for Android does not restrict users in regards to extensions that they can run in the browser, and that it does not collect or transfer Telemetry data to Mozilla, the Waterfox project, or installation trackers. The browser comes without Google Play Services integration. Pocket, a read-it-later and recommendation service that Mozilla integrated in Firefox has been removed, and all telemetry and data collecting of Firefox has been disabled next to that. Tracking Protection has been enabled by default, patches from Tor integrated to limit fingerprinting, and as many app permissions as possible has been removed without compromising core functionality. Thanks to Tor, Waterfox users don't have to worry about third-party cookies as those are blocked by default. You may enable them under Settings > Privacy if you wish so however. Waterfox works pretty much as you'd expect a browser to work. Fire it up and you are greeted with a list of top sites, bookmarks and history that you can tap on to load automatically. Only two top sites come with default installations and they both point to the Waterfox project. You can use the address bar to load any website; if you have used a copy of Firefox for Android in the past you will notice the resemblance with Mozilla's browser. Sync is integrated in the browser but the browser seems to crash when you select the option to sync browsing data under History on the new tab page. Waterfox does not restrict add-ons that you can install in the browser (provided that they are compatible with that particular version). Select Menu > Tools > Add-ons to display installed extensions and to open the official Firefox add-ons repository to download and install browser extensions in the mobile browser. Web compatibility should be good in general but you may run into sites optimized for Google Chrome and other Chromium browsers that may refuse to work in Waterfox for Android, or may not work as good as in Chrome. Closing Words The new version of Waterfox for Android feels quite snappy. I only had limited time to take the mobile browser for a test drive but what I saw was promising. I installed some browser add-ons in the mobile browser and visited popular sites such as YouTube, Amazon, or eBay to make sure they worked well in the browser (which they did). Sorry for the lack of screenshots but Waterfox for Android prevents the screenshot function of Android (just like Tor does). If you have played around with Waterfox for Android already let me know about your experience by leaving a comment below. Source PS: Almost a week ago, the developer hinted about this: “Currently testing the next Waterfox for Android version. Is based on Tor (including all its privacy focused patches) and will be built without Google Play Services! #fdroid here we come! #opensource #privacy” Now: “Waterfox for Android has finally been updated ?! The app has been pushed to the Play Store and should be available for all in a couple of hours. Will keep you all updated when roll-out is complete!”
  14. Radpop

    Brave browser 0.23.79

    Brave browser 0.23.79 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.23.79dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.23.79dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.23.79: Fixed crash when tabs are discarded. (#14955) Improved fingerprinting protection. (#14889) Upgraded to muon 8.0.7. (#14974) Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  15. Radpop

    Brave browser 0.23.77

    Brave browser 0.23.77 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.23.77dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.23.77dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.23.77: Fixed local file reading security issue, credit to Vladimir Metnew. (#14936) Disabled FTP in Brave. (#14712) Disabled non-chrome-extension origins from navigating to chrome-extension. (#14772) Fixed crash when visiting certain URLs. (#14893) Fixed JavaScript errors in developer tools on each page load. (#14890) Fixed LastPass Vault not displaying passwords. (#11624) Fixed Brave becoming unresponsive when the delete button under downloads is clicked. (#14805) Fixed external protocol prompt not being displayed on "about:" pages. (#14679) Upgraded to muon 8.0.6. (#14911) Upgraded to Chromium 68.0.3440.84. (#14910) Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  16. Radpop

    Brave browser 0.23.73

    Brave browser 0.23.73 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.23.73dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.23.73dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.23.73: Fixed extension popups appearing transparent on first click after Brave restart. (#13633) Fixed Tor process not terminating when Brave crashes on macOS. (#14636) Fixed Tor crash when opening a link summary embedded in a tweet on Twitter. (#14392) Fixed file access bug. (#14642) Fixed minimum browsing activity message in Payments being retained even after minimum criteria has been met. (#14767) Fixed "Save As" dialog still appearing after disabling "Always ask me where to save files" (#14625) Fixed URLs ending with .pdf causes Brave to ignore Content-Type and fails to load the document. (#10554) Changed crossOrigin policy to anonymous when fetching favicons (#14742) Optimized startup time by removing referral promo check at initial startup. (#14615) Upgraded to muon to 8.0.3. (#14885) Upgraded to Chromium 68.0.3440.75. (#14886) Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  17. Radpop

    Brave browser 0.23.39

    Brave browser 0.23.39 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.23.39dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.23.39dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.23.39: Added keyboard shortcut for Tor Private Tab. (#14504) Fixed potential Tor bypass by file:// URLs. (#14664) Fixed potential Tor bypass while loading Favicons. (#14641) Fixed CSS and font resources being shown in blocked scripts list in shields. (#14582) Fixed bookmark scrolling when populated beyond initial display boundry. (#14606) Fixed Tor control socket error when network is disconnected. (#14630) Fixed being able to load bookmarks in Tor Tab before Tor finishes loading. (#14680) Fixed search icons in URL bar should be a local resource. (#14653) Fixed right click context menu not working after switching tabs. (#14643) Optimized startup time by removing UGP promo check at initial startup. (#14616) Upgraded localization files. (#14580) Upgraded to Tor 0.3.3.8. (#14695) Upgraded to muon 7.1.6. (#14719) Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  18. Radpop

    Brave browser 0.23.31

    Brave browser 0.23.31 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.23.31dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.23.31dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.23.31: Fixed Twitch streams not playing (#14475) Fixed IndexedDB not working in web worker (#12463) Tor only loads when needed (lazy loading) (#14617) Fixed webcompat issues with riot.im (#10685) Upgraded to Chromium 67.0.3396.103 (#14618) Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  19. Two privacy-focused organizations have accused today German police of carrying out raids at their offices and members' private homes on some pretty shoddy reasoning that makes no sense and hints at the police's abuse of power. The first of these organizations is Zwiebelfreunde, a non-profit group based in Dresden that runs Tor relay servers and supports privacy and anonymity projects by providing legal and financial help. One of the ways it helps these projects includes collecting donations from European users into its bank account and then relaying the raised money to overseas projects. Police search Zwiebelfreunde HQ, members home Today, members of the Zwiebelfreunde project revealed that German police had raided their Dresden office and the homes of three members located in the cities of Augsburg, Jena, and Berlin. The raids took place on June 20, and police told Zwiebelfreunde members they were in relation to the RiseUp project, a provider of anonymous XMPP and email services. Officers told members that they were looking for information on the owner of a RiseUp email address. Officers said the owner of that email address registered a site (named Krawalltouristen - translated as Ruckus Tourist) on which it organized protests against the far-right Alternative for Germany (AfD) party convention in Augsburg, and called for physical violence against the group. Naturally, police were looking for the man behind those threats. A pretty glaring flaw in the police's logic But the Zwiebelfreunde group claims police went about it the wrong way. Instead of going after the RiseUp project, they went after their organization instead. "We have nothing to do with Riseup’s infrastructure," said the Zwiebelfreunde group today in a blog post. "During the raids, the police forces clearly gave the impression that they knew we had nothing to do with either Riseup or the 'ruckus tourist' blog." Members of the Chaos Computer Club (CCC), a famous German organization whose members are mostly security researchers and hardware hackers, put the things in perspective as for why the searches were so ludicrous. Police also seized data relating to Tails project Yet, despite the flaw in logic that even police officers were aware, the home searches continued. According to Zwiebelfreunde, police seized electronic equipment from members, such as smartphones, laptops, PCs, GnuPG Smartcards/Yubikeys, hard drives, etc. Zwiebelfreunde says police overreached when they seized this equipment as most of it was the property of members and their family, and not the organization. Furthermore, police also overreached and broke their own search warrant when they confiscated legal and financial documents. "Apart from encrypted media, they had the legal right to seize documents related to our Riseup bank account starting from January 2018," the group said. "Despite our protests, they additionally seized all printed documents relating to our own and partner projects since the inception of the association in 2011," Zwiebelfreunde said, revealing that police collected data outside their initial scope. "If you have ever donated to Torservers, or Tails or Riseup via a European bank transaction, your data is very likely now in the hands of the German police," Zwiebelfreunde members said. This includes IBAN account number, name of the account holder, donation amount and date. Zwiebelfreunde says it tried to get back the documents and equipment that were collected illegally but German police refused to return the seized items. German police also refused all inquiries for additional comment from German media. "This is a textbook example of how easy the fundamental rights of completely innocent citizens and their families can be violated as a result of artificially constructed evidence chains, no matter how ridiculous. To be drawn into this as a witness on the basis of such patently unsustainable reasoning is questionable to say the least. The recent introduction of draconian Bavarian laws governing police authority has clearly led to a culture where those responsible no longer feel bound by any sense of proportionality of their actions," says Frank Rieger, speaker for the Chaos Computer Clubs (CCC). Police take revenge on CCC But things didn't end here. In a blog post today, the CCC claims that soon after their members provided logistical support for Zwiebelfreunde members, German police decided "on their own accord" to extend the search to CCC premises. According to the CCC, police searched its OpenLab in Augsburg, where they found hackers and computer experts working on electronic boards, surrounded by equipment and chemical substances needed to create such custom boards. The CCC explains what happened on that day: After interpreting the contents of a whiteboard as a bomb making manual, the officers then went on to accuse random people present at the hackerspace of plotting a bombing attack. Three people were arrested on the spot and the hackerspace was subsequently searched without a court order and without any witnesses. The police seized objects from OpenLab and used force to open locked cabinets holding member data and bank records. It has to be assumed that this information was copied and that the rights of members and supporters of both associations were violated. German media reported the three CCC members who were arrested were later released on the same day without being charged. "Just like with the initial suspicion with regard to the board members of Zwiebelfreunde, the subsequent suspicions with regard to explosives are incompetent, malicious or both," the CCC says. "The suspicion of 'preparation of a explosive attack' is a grave and direct threat to the operation of a hackerspace - family-friendly OpenLab is open to visitors almost every day. "If the mere possession of basic chemical knowledge is a cause for suspicion then pretty soon teenagers will have to hide their chemistry books from nosy cops. Source
  20. Radpop

    Brave browser 0.23.19

    Brave browser 0.23.19 Brave is a free and open-source web browser based on the Chromium web browser and its Blink engine. Brave blocks ads and trackers by default so you browse faster and safer. Brave even has HTTPS upgrades, which means more of your connections are encrypted, protecting your identity, browsing, payments and more. Brave has built-in support for torrent downloading and streaming and Tor support for private browsing. Download: win64: https://github.com/brave/browser-laptop/releases/download/v0.23.19dev/BraveSetup-x64.exe win32: https://github.com/brave/browser-laptop/releases/download/v0.23.19dev/BraveSetup-ia32.exe Homepage: https://brave.com Download page: https://brave.com/download/ Changes for 0.23.19: Added Tor support for Private Browsing. (#1185) Added new icons and styling refinements into the toolbar UI. (#13981) Added EasyPrivacy tracking list and ad-block performance improvements. (#14476) Added progress indicator when recovering wallet under Brave Payments. (#11790) Added confirmation modal when removing publishers from the Brave Payments table. (#11164) Added keyboard shortcut for toggling Bookmarks Toolbar. (#12594) Added transition animation when tabs change size. (#7001) Fixed videos not being played under Facebook. (#14358) Fixed Google Docs never loading files with Brave Shields enabled. (#11778) Fixed homograph attack using "/@". (#13214) Fixed webkitRelativePath may expose OS username. (#10666) Fixed verification icon not being displayed for verified YouTube publishers under Brave Payments. (#14351) Fixed download bar cannot be closed when an active download is in progress. (#11923) Fixed context menu search items not using DuckDuckGo if private tab search engine is set as DuckDuckGo. (#14530) Fixed tabs not loading content when opening specific links using "CMD/CTRL + Click". (#14405) Fixed several crashes on launch for some users who have Brave Payments enabled. (#14370) Fixed contribution statement values differ from actual contribution amount. (#14319) Fixed Widevine notification appearing under normal tabs when visiting Netflix in a private tab. (#14227) Fixed several issues with copy and paste. (#14197) Fixed clickable area for "What do these policies mean?" under the security preferences. (#14059) Fixed clickable area for "Terms of Services" under Brave Payments. (#12137) Fixed referer blocking based on eTLD+1 instead of full origin. (#13779) Fixed pinned and unpinned publishers not being aligned properly under Brave Payments. (#13024) Fixed YouTube ad-containers not being removed from the page when ads have been blocked. (#12845) Fixed adding decimal value to pinned publishers under Brave Payments causes publishers to unpin. (#12001) Fixed pinning publishers should automatically toggle "include" to enabled. (#11905) Fixed being unable to give devices an optional name when syncing a new device. (#11653) Fixed returning to the "recover" modal when recovering fails. (#11422) Fixed Brave Payments history dates are not sorted in descending order. (#11300) Fixed access denied error when installing Brave through RPM repository. (#10894) Fixed private tab in its own window causes window to become unresponsive on relaunch. (#10768) Fixed URL border radius issue when viewing torrent URLs. (#10692) Fixed missing translations for bookmark list. (#10105) Fixed bookmarking top tiles not displaying favicon. (#9568) Fixed Flash enable switch not being greyed out when Flash isn't installed. (#7634) Fixed changing languages via preferences should always display the restart notification. (#6750) Replaced Fanboy's Swedish regional Adblock filter with Frellwit's filter. (#13092) Improved Swedish localization by updating several strings. (#11298) Changelog: https://github.com/brave/browser-laptop/blob/master/CHANGELOG.md
  21. The Tor Project has announced that it’s winding down its privacy-focused Tor Messenger chat program, nearly three years after its beta debut. Tor, an acronym of “The Onion Router,” is better known for its privacy-focused browser that directs traffic through a volunteer-run network of relays to prevent any untoward eavesdropping on users’ online activity. Indeed, the Tor Browser is often used by activists, whistleblowers, and anyone wishing to remain anonymous, and major companies — such as Facebook — have embraced Tor over the years. The people behind the anonymity network started working on Tor Messenger in early 2014, launched it in alpha a year later, before rolling out the beta version in October 2015, where it has remained since — though there have been more than 10 separate beta releases. How it worked Tor Messenger worked in conjunction with many of the popular networks and instant messaging (IM) protocols, including ones from Facebook, Google, Twitter, Jabber (XMPP), and Yahoo. This was important, because people are far more inclined to use a service that is compatible with networks they most frequently use to communicate with friends. It also adopted off-the-record (OTR) messaging by default, and messages could only be sent to other clients with OTR enabled. It didn’t offer completely privacy, however — although the sender’s IP address was concealed, some metadata could still be logged by the server, including contacts and details around when and how often two people communicated. In terms of why Tor Messenger is being sunsetted, well, there are a number of reasons. Arguably the most important of the reasons is that uptake wasn’t quite where Tor wanted it to be at to justify working on it, while it also realized that it wasn’t the perfect private messaging client due to its metadata problem. “The adoption of Tor Messenger was low and the real need is for metadata-free alternatives,” Tor Messenger developer Sukhbir Singh wrote in a blog post. However, the impetus for pulling the plug was that Tor Messenger was built upon Instantbird, an open-source messaging client developed in the Mozilla community and led by Florian Quèze. He announced last year that he was stopping work on Instantbird. Put simply, the culling of Instantbird hastened Tor Messenger’s demise. “Even after all the releases, Tor Messenger was still in beta and we had never completed an external audit (there were two internal audits by Tor developers),” added Singh. “We were also ignoring user requests for features and bug reports due to the limited resources we could allocate to the project. Given these circumstances, we decided it’s best to discontinue rather than ship an incomplete product.” You can actually still use Tor Messenger if you’ve previously installed it; however, as of last month, it is no longer being maintained and Tor recommends that you don’t use it. Source
  22. Pirate Tor Browser Pirate Tor Browser is a bundle package of the Updated Tor client Vidalia, Updated FireFox Portable browser (with Updated foxyproxy addon) and some custom configs , all has been revamped and Updated , Self extracting archive For those wanting to reach torrent webpages they cant reach on a normal browser try the updated pirate browser.. portable.. you might have seen the first version that the pirate bay shared http://piratebrowser.com/ now its been updated and revamped.. better updated links added , updated and added some good extensions to hide yourself online , Pirate Tor Browser version 08 build 7.0.8 Better Pirate Browser version 07 build 56.0.2 - New Pirate.Tor.Browser.0.8.(7.0.8) Better Pirate Browser 0.7 (56.0.2) 27/10/2017 - New HOMEPAGE https://lilfellauk.wordpress.com/pirate-tor-browser/ Download - Pirate.Tor.Browser.0.8.(7.0.8): Site: https://mega.nz Sharecode[?]: /#!Z25lAD4T!2OPkWG4lTEqq7kgEyTNs33LmYXR573b-e4sbfeUHk_8 Download - Better Pirate Browser version 07 build 56.0.2: - New Site: https://mega.nz Sharecode[?]: /#!13ATGQ6L!YgDypu2bvimH6qXZFHdMiXdlePPm1KeFceUfUh8xfd4
  23. Tor Fact #1: Tor privately tips off the federal government to security vulnerabilities before alerting the public This Tor factcheck is part of a series called "The Tor Files: Transparency for the Dark Web," which will use a cache of FOIA documents to explore and expose the close relationship between Tor and the U.S. National Security State. Read more about it here: Fact-checking the Tor Project's government ties. (And get the whole story in Yasha Levine's new book Surveillance Valley: The Secret Military History of the Internet.) Note: This is the first in what will be a series of "Tor fact-checks"...check back for more! CLAIM #1: Tor does not provide backdoors to the U.S. government RATING: Moderately true. While the documents do not show Tor employees providing backdoors into their software, they do reveal that they have no qualms with privately tipping off the federal government to security vulnerabilities before alerting the public, a move that would give the feds an opportunity to exploit the security weakness long before informing Tor users. Take the incident involving "TLS normalization." In 2007, Tor developer Steven Murdoch wrote up a report on the problems and vulnerabilities connected to the way Tor encrypted its internet connection. Turned out that it did so in a very unique way, which made Tor traffic stand out from all the rest and made it easy to fingerprint and single out people who were using Tor from the background data noise of the internet. Not only did this encryption quirk make it easy for foreign countries to block Tor (at the time Tor's efforts were targeted primarily at China and Iran), but in theory it made it much easier for anyone interested in spying on and cracking Tor traffic — whether the NSA, FBI or GCHQ — to identify and isolate their target. In his email to Tor cofounder Roger Dingledine, Murdoch suggested they keep this vulnerability hidden from the public because disclosing it without first finding a solution would make it easy for an attacker to exploit the weakness: "it might be a good to delay the release of anything like 'this attack is bad; I hope nobody realizes it before we fix it'," he wrote. Dingledine agreed. He didn't tell the public. But he also didn't keep the information private. He did something very much the opposite: he debriefed his backers at the BBG, an agency that had been spun off from the CIA and continues to be involved in covert change efforts around the world. (For my reporting on this history see: Surveillance Valley.) Roger forwarded his exchange with Steven to the BBG, making it clear that they would not be fixing this vulnerability anytime soon and that the public would be kept in the dark about this fact. He ended his email with ":)" — a smiley face. How cute. Privately tipping off a spooky federal agency deeply embedded in the U.S. National Security State to a vulnerability? No matter how slight the weakness being reported, you'd have to be naive to think that the U.S. government would not move to exploit it. Don't know about you, but I'd wager most Tor users wouldn't be too happy knowing that this goes on at Tor. I'd wager they'd see it as nothing less than a total betrayal of trust. A double-cross. To them, Tor is not supposed to be giving advance warning to the U.S. government about it's vulnerabilities. It's supposed to be fighting on the other side: a rebel grassroots privacy tech outfit building tools that thwart the most powerful governments and intel agencies in the world. That's the mystique and that's the promise. That's supposedly why Tor's endorsed by the EFF and Edward Snowden, the most celebrated government whistleblower in recent memory. Some, like Ross Ulbricht, proprietor of the original Silk Road, staked their lives on their belief in Tor's independence and anti-state nature. Maybe it's not a surprise that Ulbricht is now spending life behind bars. This brief interaction (and there are many many others on all sorts of topics) gives you a glimpse into the kind of friendly backroom relationship Tor has with the U.S. government. Fact is, Tor does not see the BBG as a threat. How can it see it that way? The BBG is a major benefactor, handing out over $6 million in contracts to the Tor Project from 2007 through 2015. The BBG is a friend and source of funds — and Tor management is eager to please. And of course the BBG isn't Tor's only friend in the U.S. government: the U.S. Navy and the State Department have also funneled millions into the project, and continue to do so today. So...How long did it take for Tor to reveal this security weakness to the general public? Well, it's hard to say. But looking through Tor's "tor-dev" mailing list it appears the document Roger initially shared with the BBG in 2007 was brought to the public's attention only in 2011. That's four years after the federal government was tipped off about it! Note: The thing to remember is that Tor's BBG correspondence only reveals a sliver of Tor's full interaction with the feds. Much of the funding for Internet Freedom tech takes place under Radio Free Asia's umbrella, a private government corporation that claims it does not fall under FOIA mandate and so refuses to comply with journalists' FOIA requests. We also do not know what Tor reveals to its other two backers, the State Department and the U.S. Navy. Nor do we know what Roger Dingledine or other Tor managers reveal in their regular meetings with U.S. intelligence and law enforcement agencies. And there are many such meetings. Read more: Tor Files Source
  24. The operator of a Tor exit-node faces tens of thousands of dollars in potential damages because his connection was allegedly used to download a pirated copy of Dallas Buyers Club. The movie company used the operator's lack of response as proof, but the defendant is now striking back, questioning whether the company actually owns the proper copyrights. The copyright holders of Dallas Buyers Club have sued thousands of BitTorrent users over the past few years. The film company first obtains the identity of the Internet account holder believed to have pirated the movie, after which most cases are settled behind closed doors. It doesn’t always go this easily though. A lawsuit in an Oregon federal court has been ongoing for nearly three years but in this case the defendant was running a Tor exit node, which complicates matters. Tor is an anonymity tool and operating a relay or exit point basically means that the traffic of hundreds or thousands of users hit the Internet from your IP-address. When pirates use Tor, it will then appear as if the traffic comes from this connection. The defendant in this lawsuit, John Huszar, has repeatedly denied that he personally downloaded a pirated copy of the film. However, he is now facing substantial damages because he failed to respond to a request for admissions, which stated that he distributed the film. Not responding to such an admission means that the court can assume the statement is true. “An admission, even an admission deemed admitted because of a failure to respond, is binding on the party at trial,” Dallas Buyers Club noted in a recent filing, demanding a summary judgment. Huszar was represented by various attorneys over the course of the lawsuit, but when the admissions were “deemed admitted” he was unrepresented and in poor health. According to his lawyer, Ballas Buyers Club is using this to obtain a ruling in its favor. The film company argues that the Tor exit node operator admitted willful infringement, which could cost him up to $150,000 in damages. The admissions present a serious problem. However, even if they’re taken as truth, they are not solid proof, according to the defense. For example, the portion of the film could have just been a trailer. In addition, the defense responds with several damaging accusations of its own. According to Huszar’s lawyer, it is unclear whether Dallas Buyers Club LLC has the proper copyrights to sue his client. In previous court cases in Australia and Texas, this ownership was put in doubt. “In the case at bar, because of facts established in other courts, there is a genuine issue as to whether or not DBC owns the right to sue for copyright infringement,” the defense writes. As licensing constructions can be quite complex, this isn’t unthinkable. Just last week another U.S. District Court judge told the self-proclaimed owners of the movie Fathers & Daughters that they didn’t have the proper rights to take an alleged pirate to trial. Another issue highlighted by the defense is the reliability of witnesses Daniel Macek and Ben Perino. Both men are connected to the BitTorrent tracking outfit MaverickEye, and are not without controversy, as reported previously. “oth parties have previously been found to lack the qualifications, experience, education, and licenses to offer such forensic or expert testimony,” the defense writes, citing a recent case. Finally, the defense also highlights that given the fact that Huszar operated a Tor exit-node, anyone could have downloaded the film. The defense, therefore, asks the court to deny Dallas Buyers Club’s motion for summary judgment, or at least allow the defendant to conduct additional discovery to get to the bottom of the copyright ownership issue. Source: http://Tor Exit Node Operator Denies Piracy Allegations and Hits Back
×
×
  • Create New...