サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
衆院選
blog.torproject.org
Arti 1.0.0 is released: Our Rust Tor implementation is ready for production use. by nickm | September 2, 2022 Back in 2020, we started work on a new implementation of the Tor protocols in the Rust programming language. Now we believe it's ready for wider use. In this blog post, we'll tell you more about the history of the Arti project, where it is now, and where it will go next. Background: Why Ar
Arti 0.1.0 is released: Your somewhat-stable API is here! by nickm | March 1, 2022 Arti is our ongoing project to create a working embeddable Tor client in Rust. It’s nowhere near ready to replace the main Tor implementation in C, but we believe that it’s the future. Today, we've reached our 0.1.0 milestone: this means that we now consider Arti's high-level APIs to be "mostly stable", and ready fo
Announcing Arti, a pure-Rust Tor implementation by nickm | July 8, 2021 Greetings! Today I'm happy to announce a new era in Tor implementation. Over the past year or so, we've been working on "Arti", a project to rewrite Tor in Rust. Thanks to funding from Zcash Open Major Grants (ZOMG), we can finally put the Arti project up in our priorities list, and devote more time to it. Below I'll talk abou
Tor, like much of the world, has been caught up in the COVID-19 crisis. Like many other nonprofits and small businesses, the crisis has hit us hard, and we have had to make some difficult decisions. We had to let go of 13 great people who helped make Tor available to millions of people around the world. We will move forward with a core team of 22 people, and remain dedicated to continuing our work
Tor Browser 7.0.6 is released by boklm | September 28, 2017 Tor Browser 7.0.6 is now available from the Tor Browser Project page and also from our distribution directory. [UPDATE: the dist server was temporarily messed up, but it should be better now. Sorry for the troubles!] This release features important security updates to Firefox. This release includes security updates for Firefox (52.4.0esr)
Tor Messenger Beta: Chat over Tor, Easily by sukhbir | October 29, 2015 WARNING STARTS As of March 2018, Tor Messenger is no longer maintained and you should NOT use it. Please see the announcement for more information. WARNING ENDS Today we are releasing a new, beta version of Tor Messenger, based on Instantbird, an instant messaging client developed in the Mozilla community. What is it? Tor Mess
Thoughts and Concerns about Operation Onymous by phobos | November 9, 2014 What happened Recently it was announced that a coalition of government agencies took control of many Tor hidden services. We were as surprised as most of you. Unfortunately, we have very little information about how this was accomplished, but we do have some thoughts which we want to share. Over the last few days, we receiv
Update (Oct 22 13:15 UTC): Windows users that are affected by Tor Browser crashes might try to avoid this problem by opening "about:config" and setting the preference "media.directshow.enabled" to "false". This is a workaround reported to help while the investigation is still on-going. Update (Oct 25 02:32 UTC): If you are unhappy with the new Firefox 31 UI, please check out Classic Theme Restorer
Tor security advisory: "relay early" traffic confirmation attack by arma | July 30, 2014 This advisory was posted on the tor-announce mailing list. SUMMARY: On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to do traffic co
Mission Impossible: Hardening Android for Security and Privacy by mikeperry | April 3, 2014 Updates: See the Changes section for a list of changes since initial posting. This post has been updated further by the November 2016 Refresh of the same idea Executive Summary The future is here, and ahead of schedule. Come join us, the weather's nice. This blog post describes the installation and configur
Tor and the BEAST SSL attack by nickm | September 24, 2011 Today, Juliano Rizzo and Thai Duong presented a new attack on TLS <= 1.0 at the Ekoparty security conference in Buenos Aires. Let's talk about how it works, and how it relates to the Tor protocol. Short version: Don't panic. The Tor software itself is just fine, and the free-software browser vendors look like they're responding well and qu
About an hour ago I was contacted by the Dutch Government with more details about the DigiNotar Debacle. It seems that they're doing a great job keeping on top of things and doing the job that DigiNotar should've done in July. They sent a spreadsheet with a list of 531 entries on the currently known bad DigiNotar related certificates. The list isn't pretty and I've decided that in the interest of
The DigiNotar Debacle, and what you should do about it by ioerror | September 1, 2011 Recently it has come to the attention of, well, nearly the entire world that the Dutch Certificate Authority DigiNotar incorrectly issued certificates to a malicious party or parties. Even more recently, it's come to light that they were apparently compromised months ago or perhaps even in May of 2009 if not earl
Detecting Certificate Authority compromises and web browser collusion by ioerror | March 23, 2011 Thanks to Ian Gallagher, Seth Schoen, Jesse Burns, Chris Palmer, and other anonymous birds for their invaluable feedback on this writeup. The Tor Project has long understood that the certification authority (CA) model of trust on the internet is susceptible to various methods of compromise. Without st
Defend Internet Freedom with Tor in 2024 elections season by ggus | February 6, 2024 As over 65 elections will happen across the world in 2024, this year stands as the biggest election cycle of this century so far. Internet censorship and surveillance are a threat to the integrity of free and fair elections.
このページを最初にブックマークしてみませんか?
『Tor Blog | The Tor Project』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く