Website publishers now can advertise their onion service to Tor users by adding an HTTP header. If you are a developer, learn how to enable Onion-Location in your website: community.torproject.org/onion

Onion service URLS are not easy for humans to remember, which makes it hard for users to discover or return to an onion site. In this release, we're bringing you a proof-of-concept for human-memorable names for SecureDrop
, developed with Freedom of Press
& HTTPSEverywhere.

Show thread

When users try to visit onion sites and encounter an error, Tor Browser 9.5 now displays informational messages about the service-, client-, or network-side error. Previously, only standard Firefox error messages were displayed.

Show thread

Now, onion service administrators who want to add an extra layer of security to their website can set a pair of keys for access and control.
You can find how to set up Onion-Location and Client Authorization for your onion service here: community.torproject.org/onion

Show thread

Tor Browser 9.5 allows website publishers to advertise their onion service to Tor users by adding HTTP headers. When Onion Location is enabled, Tor users will be prompted to opt-in to upgrade to the onion service.

Show thread

πŸŽ‰ Time to update: Tor Browser 9.5 is out now.

This Tor Browser release is focused on helping you understand and use onion services.

blog.torproject.org/new-releas

We build our tools to support human rights defenders and help them protect their online activity from the monitoring eyes of the state. To those in the streets in the U.S., remember to stay safe online. Use Tor to protect your browsing. torproject.org/download.

When ISPs or governments block access to Tor, our users rely on bridges to connect. With BridgeDB, we tackle the problem of how to get bridges to censored users while making it difficult for censors to get all bridges.

BridgeDB version 0.10.1 is out now: blog.torproject.org/new-releas

This Friday 29th, from 1200 UTC to 2000 UTC, we will teach you how to run a Tor bridge and answer questions about our anti-censorship technology.

Bridges are useful for Tor users living in oppressive regimes, and for people who want an extra layer of security because they're worried somebody will recognize that they are contacting a public Tor relay IP address.

The event will happen via text (not video or audio) on IRC.

More info:
blog.torproject.org/run-and-us

This Friday 29th, from 1200 UTC to 2000 UTC, we will teach you how to run a Tor bridge and answer questions about our anti-censorship technology.

Bridges are useful for Tor users living in oppressive regimes, and for people who want an extra layer of security because they're worried somebody will recognize that they are contacting a public Tor relay IP address.

The event will happen via text (not video or audio) on IRC.

More info:
blog.torproject.org/run-and-us

"Seven of the top ten companies by market capitalization are tech companies. Seven out of ten are using data that they take from us, without our consent, to create their products. That is part of our labor power: those products are made with our emotional labor, our mental labor. Privacy is a way to reclaim our labor power." -- @flexlibris

logicmag.io/security/free-as-i

"Normal web browsing is easy with Tor... once you're in, you can use Tor just as you would any other browser."

cnet.com/how-to/what-is-tor-a-

Looking for some extra protection for your #Nextcloud server? How about using @torproject to access it!

This script can help you get started.

github.com/digitalautonomy/nex

β›” Incognito mode and private tabs don't make your browsing activity private, despite misleading language.

Your ISP and anybody watching your connection will still see the sites you visit.

Get real privacy: use Tor Browser.
torproject.org/download

NEW: Meet the Tor Community portal! blog.torproject.org/community-

Tor's Community portal is home to info and resources for you, the people who make Tor possible.

What used to be buried, scattered across our website, and outdated is now organized, refreshed, and easy to use.

Today, the pre-Tor onion routing paper, "Anonymous Connections and Onion Routing" by Paul Syverson, David Goldschlag, and Michael Reed from IEEE S&P 1997, received the Test of Time Award by the IEEE Symposium on Security and Privacy. Congratulations! πŸ₯³

blog.torproject.org/test-of-ti

Show more
Mastodon

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!