Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
- Update Firefox to 52.1.2esr
- Update Tor to 0.3.0.7
- Update Torbutton to 1.9.7.3
- Update Firefox to 52.1.2esr
- Update Tor to 0.3.0.7
- Update Torbutton to 1.9.7.3
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Промените можете да видите
тук
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
- Update Tor to 0.2.3.25
- Update Firefox 10.0.11esr
- Update Vidalia to 0.2.21
- Update NoScript to 2.6.2
Все още няма добавени промени
- Update Firefox to 10.0.10esr
- Update NoScript to 2.5.9
- Update Firefox patches to prevent crashing (closes: #7128)
- Update HTTPS Everywhere to 3.0.2
- Update NoScript to 2.5.8
- Update Firefox to 10.0.9esr
- Update Torbutton to 1.4.6.3
- Update NoScript to 2.5.7
- Update HTTPS Everywhere to 2.2.2
- Update libpng to 1.5.13
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени
- Update Firefox to 11.0
- Update OpenSSL to 1.0.0h
- Update NoScript to 2.3.4
- Update HTTPS Everywhere to 2.0.1
- Always build to with warnings enabled (closes: #4470)
- Disable HTTPS Everywhere SSL Observatory screen (closes: #5300)
Windows
- Remove tor-resolve from the Windows bundle (closes: #5403)
Mac OS X
- Give OS X users below 10.5 an incompatibility message (closes: #4356)
Linux
- Don't attempt to load the default KDE 4 theme from Vidalia, because that fails when the Qt versions don't match (closes: #5214)
- Update Firefox to 10.0.1
- Update libpng to 1.5.8 (closes: #5144)
- Update Firefox to 10.0.1
- Update Vidalia to 0.2.17
- Update Libevent to 2.0.17-stable
- Update NoScript to 2.3
- Udate Firefox to 10.0
- Update Qt to 4.7.4
- Update OpenSSL to 1.0.0g
- Update zlib to 1.2.6
- Update HTTPS Everywhere to 1.2.2
- Update NoScript to 2.2.8
- New Firefox patches
- Limit the number of fonts per document
Linux changes
- Put documentation in remove-shared-lib-symlinks debug dumps (closes: #4984)
Windows changes
- Make sure mozconfig always gets copied into the Firefox build directory
(closes: #4879)
- Update OpenSSL to 1.0.0f
- Update NoScript to 2.2.5
- Update Firefox to 9.0.1
- Update Torbutton to 1.4.5.1
- Update Noscript to 2.2.4
- New Firefox patches
- Provide client values only to CSS Media Queries and disable several Mozilla extensions that seem fingerprintable
- Update Tor to 0.2.2.35
- Update NoScript to 2.2.3
- Update Torbutton to 1.4.5
- New Firefox patches: Disable SSL Session ID tracking; Provide an observer event to close persistent connections
- Update Firefox to 8.0.1
- Update Libevent to 2.0.16-stable
- Update NoScript to 2.2
- Update HTTPS Everywhere to 1.2.1
- Begin building Tor with --enable-gcc-warnings
- Update Firefox to 8.0
- Update Libevent to 2.0.15-stable
- Update NoScript to 2.1.8
- Add extensions.autoDisableScopes to allow TBB's Firefox to launch with its extensions enabled
Privacy/anonymity fixes (clients):
- Clients and bridges no longer send TLS certificate chains on outgoing OR connections. Previously, each client or bridge would use the same cert chain for all outgoing OR connections until its IP address changes, which allowed any relay that the client or bridge contacted to determine which entry guards it is using. Fixes CVE-2011-2768. Bugfix on 0.0.9pre5; found by "frosty_un".
- If a relay receives a CREATE_FAST cell on a TLS connection, it no longer considers that connection as suitable for satisfying a circuit EXTEND request. Now relays can protect clients from the CVE-2011-2768 issue even if the clients haven't upgraded yet.
- Directory authorities no longer assign the Guard flag to relays that haven't upgraded to the above "refuse EXTEND requests to client connections" fix. Now directory authorities can protect clients from the CVE-2011-2768 issue even if neither the clients nor the relays have upgraded yet. There's a new GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays" config option to let us
transition smoothly, else tomorrow there would be no guard relays.
Privacy/anonymity fixes (bridge enumeration):
- Bridge relays now do their directory fetches inside Tor TLS connections, like all the other clients do, rather than connecting directly to the DirPort like public relays do. Removes another avenue for enumerating bridges. Fixes bug 4115; bugfix on 0.2.0.35.
- Bridges relays now build circuits for themselves in a more similar way to how clients build them. Removes another avenue for enumerating bridges. Fixes bug 4124; bugfix on 0.2.0.3-alpha, when bridges were introduced.
- Bridges now refuse CREATE or CREATE_FAST cells on OR connections that they initiated. Relays could distinguish incoming bridge connections from client connections, creating another avenue for enumerating bridges. Fixes CVE-2011-2769. Bugfix on 0.2.0.3-alpha. Found by "frosty_un".
Major bugfixes:
- Fix a crash bug when changing node restrictions while a DNS lookup is in-progress. Fixes bug 4259; bugfix on 0.2.2.25-alpha. Bugfix by "Tey'".
- Don't launch a useless circuit after failing to use one of a hidden service's introduction points. Previously, we would launch a new introduction circuit, but not set the hidden service which that circuit was intended to connect to, so it would never actually be used. A different piece of code would then create a new introduction circuit correctly. Bug reported by katmagic and found by Sebastian Hahn. Bugfix on 0.2.1.13-alpha; fixes bug 4212.
Minor bugfixes:
- Change an integer overflow check in the OpenBSD_Malloc code so that GCC is less likely to eliminate it as impossible. Patch from Mansour Moufid. Fixes bug 4059.
- When a hidden service turns an extra service-side introduction circuit into a general-purpose circuit, free the rend_data and intro_key fields first, so we won't leak memory if the circuit is cannibalized for use as another service-side introduction circuit. Bugfix on 0.2.1.7-alpha; fixes bug 4251.
- Bridges now skip DNS self-tests, to act a little more stealthily. Fixes bug 4201; bugfix on 0.2.0.3-alpha, which first introduced bridges. Patch by "warms0x".
- Fix internal bug-checking logic that was supposed to catch failures in digest generation so that it will fail more robustly if we ask for a nonexistent algorithm. Found by Coverity Scan. Bugfix on 0.2.2.1-alpha; fixes Coverity CID 479.
- Report any failure in init_keys() calls launched because our IP address has changed. Spotted by Coverity Scan. Bugfix on 0.1.1.4-alpha; fixes CID 484.
Minor bugfixes (log messages and documentation):
- Remove a confusing dollar sign from the example fingerprint in the man page, and also make the example fingerprint a valid one. Fixes bug 4309; bugfix on 0.2.1.3-alpha.
- The next version of Windows will be called Windows 8, and it has a major version of 6, minor version of 2. Correctly identify that version instead of calling it "Very recent version". Resolves ticket 4153; reported by funkstar.
- Downgrade log messages about circuit timeout calibration from "notice" to "info": they don't require or suggest any human intervention. Patch from Tom Lowenthal. Fixes bug 4063; bugfix on 0.2.2.14-alpha.
Minor features:
- Turn on directory request statistics by default and include them in extra-info descriptors. Don't break if we have no GeoIP database. Backported from 0.2.3.1-alpha; implements ticket 3951.
- Update to the October 4 2011 Maxmind GeoLite Country database.
- Update Vidalia to 0.2.15
- Update Torbutton to 1.4.4.1
- Update NoScript to 2.1.4
- Remove trailing dash from Windows version number (closes: #4160)
- Make Tor Browser (Aurora) fail closed when not launched with a TBB profile (closes: #4192)
- Begin building Vidalia with DEP/ASLR
- Stop TBB from logging so much information to the system by only allowing dyld log library loads to syslog when it is in debug mode (closes: #4093)
- Update Firefox to 7.0.1
- Update OpenSSL to 1.0.0e (closes: #3996) (except for OS X)
- Update Tor to 0.2.2.33
- Update NoScript to 2.1.2.8
- Downgrade HTTPS Everywhere to 1.0.3, because we don't want stable TBBs to use development versions of extensions (closes: #4050)
Все още няма добавени промени
Все още няма добавени промени
Все още няма добавени промени