Thursday, March 28, 2024

Tor Browser 11.5 Released – Tor Now Automatically Bypasses Internet Censorship

It has been announced that Tor Browser 11.5, one of the major releases from the Tor Project, has been released, offering new features to combat censorship more effectively for users.

In order to access sites via the Onion Router network (Tor), the Tor Browser has been specifically created to perform these functions. This gives users the ability to access information on the web anonymously and in their own time when visiting websites.

In order to accomplish this, the traffic is routed through a number of nodes on the network that encrypt that traffic at each step along the way. 

It is the exit node that relays the information back to the user upon the connection reaching the destination so that the user is able to continue with their connection.

Using this new release, you can connect to Tor from heavily censored regions in a way that is not achievable with the earlier versions.

Tor Browser 11.5 – What’s New?

Here below we have listed all the new additions of this new version:-

  • Automatic censorship detection and circumvention
  • Redesigned Tor Network settings
  • HTTPS-Only Mode, by default
  • Connection Assist
  • Improved font support

It should be noted that in Tor Browser 11.5 there have been some updates aimed at circumventing censorship, an initiative that has been ongoing for nearly a year now. With this update, you are assured that the Tor connection experience will be improved and it will continue to develop as time progresses.

There are no longer any manual configurations that users have to try to get Tor unblocked in this new version 11.5. This version of Tor Browser, 11.5 comes with a new feature called Connection Assist, which makes it easier for users to connect.

A bridge configuration that is known to work best at the user’s location is automatically assigned by this feature. 

The Tor team welcomes user feedback and reports regarding Connection Assist since it is still in its beta phase (v1.0). By doing so, they will be able to eliminate any kinks in the system and enhance its capabilities.

In version 11.5 the default browsing mode has been changed to HTTPS-only mode, which is an important new feature. Through this procedure, a secure connection is established between the client and the server via a protected tunnel.

Users can take advantage of this feature to protect themselves against malicious exit relays, and man-in-the-middle (MitM) attacks. 

While the HTTPS-Everywhere extension that was used to interpret onion names has been replaced by a more suitable replacement, known as SecureDrop.

The Network Settings menu, which is now called Connection Settings in Tor Browser 11.5 is also another significant improvement since it’s heavily redesigned and updated.

The new interface offers an opportunity to view the configuration for the first time through the use of emojis on saved Bridges. 

The bridge is identified in a way that makes it easy to select the correct bridge when there is a need for one.

Download Tor Browser 11.5

This new version is available for all the major platforms like:-

  • Windows
  • macOS
  • Linux
  • Android

Depending on your OS architecture, you can download Tor Browser as an installable package or portable binary from the official Tor Browser download portal.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles