Show newer

📺 If you're using Tor Browser on Windows and having issues watching YouTube videos after the last update, we're working on a fix. You can wait for a new Tor Browser update, or you can change one line configuration to fix. Check the update on the blog post:

🔵 Time to update: Tor Browser 10.0 is out now. Tor Browser 10 ships with Firefox 78.3.0esr, updates NoScript to 11.0.44, and Tor to This release includes important security updates to Firefox.

Two new Directors have joined the Tor Project's Board!
Chelsea Komlo, cryptography and privacy researcher and engineer.

After months of work, we have a new stable release series! This series improves our guard selection algorithms, adds v3 onion balance support, improves the amount of code that can be disabled when running without relay support, and small bug fixes.

We are hopeful that the future of Tor will be free from DoS. We are looking for the resources and connections to make it happen. (8/8)
Read more on our blog post:

Show thread

While Proof-Of-Work has been traditionally used to power blockchains, it was originally suggested for DoS protection. Tor devs have been exploring the space and we believe that such a system could work wonders against the DoS attacks the network is currently experiencing. (7/8)

Show thread

Approach 2: A Proof-Of-Work system can be used to greatly increase the resources needed for an attacker to sustain a DoS attack against an onion service. (6/8)

Show thread

If we can ensure that attackers cannot get enough tokens to sustain a DoS attack, we can ensure free access to the service. Such tokens can be given to users by the onion service itself, or we can devise a variety of third-party services who provide such tokens to users. (5/8)

Show thread

Approach 1: Enter anonymous tokens. Imagine them as anonymous and unlinkable tickets that give you access to an onion service. These tokens were originally proposed for e-cash, but they've since been used in blockchains and in various types of private authentication schemes. (4/8)

Show thread

The idea is that clients need to include more information in their connection requests, so the onion service can prioritize which requests it responds to. (3/8)

Show thread

Over the past few years, Tor developers have read days of network logs trying to understand and fix the DoS threat. Because of our protocol's inherent asymmetric nature, there is no easy fix, and a more fundamental approach is needed to address it. (2/8)

Show thread

Suffering from onion service DoS? Here is a thread on how we would like to fix the problem for good. 👇

We are officially launching the Tor Project Membership Program, a new way for nonprofit and private sector organizations to financially support our work. 🎉

Challenges, priorities, and progress in anti-censorship technology at Tor

Censorship circumvention is a complex and ever evolving problem, and this blog post summarizes our approach in tackling it.

Read more our new blog post:

PrivChat Chapter #2 - the Good, the Bad, and the Ugly of Censorship Circumvention!

Today, at 17:00 UTC ⏰

Hosted by Cory Doctorow


Felicia Anthonio ()
Cecylia (@torproject)
Vrinda Bhandari (Internet Freedom Foundation)
Arturo Filastò (Project Lead & Engineer, @ooni)


End of campaign!

Over 60 organisations and individuals - small, medium, and large onions - have reached out to us to be part of this campaign.

Read more:

Show older

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!