Monday, January 27, 2025
HomeSecurity ToolsTor Browser 10.0.18 Released - Fixed The Flaw That Let Websites...

Tor Browser 10.0.18 Released – Fixed The Flaw That Let Websites Tracking Users

Published on

SIEM as a Service

Follow Us on Google News

Tor is one of the biggest open-source software, its networks have virtual tunnels that generally enable people and different groups to enhance their privacy and security on the Internet.

Recently Tor has released its Tor Browser 10.0.18, and the main motive of this release is to fix all the countless bugs, which also include a vulnerability that enables different websites to keep track of their users by fingerprinting the installed application.

We all know that Tor administers Internet traffic with the help of an overlay network that is free worldwide.

But, this network consists of nearly seven thousand relays, that help in concealing a user’s location as well as usage from people who are conducting network surveillance or traffic examination.

Scheme Flooding vulnerability

Scheme flooding is a vulnerability, that uses different custom URL schemes as an attack vector. According to the experts, this vulnerability generally enables the actors to identify that which applications have been installed by the users.

Once the experts identified the application successfully, then they use all the data and information of the installed app on the user’s computer. 

And the main motive of doing this is that they want to assign a permanent unique identifier in the user’s computer so that they can use the system even if the users switch browsers just by using incognito mode or a VPN.

Not only this but scheme flooding also allows third-party tracking in a different browser. However, this exploit generally helps the hackers to track down the usage of users’ browsers like Google Chrome, Safari, even the Tor browser as well.

Thorough Changelog

The experts have mentioned a full changelog for Tor 10.0.18, which is given below:-

All Platforms

  • Update Tor to 0.4.5.9

Android

  • Update Fenix to 89.1.1
  • Update NoScript to 11.2.8
  • Bug 40055: Rebase android-components patches on 75.0.22 for Fenix 89
  • Bug 40165: Announce v2 onion service deprecation on about:tor
  • Bug 40166: Hide “Normal” tab (again) and Sync tab in TabTray
  • Bug 40167: Hide “Save to Collection” in menu
  • Bug 40169: Rebase fenix patches to fenix v89.1.1
  • Bug 40170: Error building tor-browser-89.1.1-10.5-1
  • Bug 40432: Prevent probing installed applications
  • Bug 40470: Rebase 10.0 patches onto 89.0

Build System

  • Android
    • Bug 40290: Update components for mozilla89-based Fenix

According to the security researchers, as well as Tor, this new version updates Tor to 0.4.5.9, and it consists of all the important security fixes. 

While this new release also updates Firefox to 89.1.1, and NoScript to 11.2.8 and all this new version includes the important security updates to Firefox for Android.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

CISA Releases Guidelines For Closing Software Understanding Gap

The Cybersecurity and Infrastructure Security Agency (CISA) has released a pivotal report calling for...

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...