Friday, June 14, 2024

Tor Browser 8.5 Released – Tor For Android is Now Available from Google Play

Tor Browser 8.5 officially launched now along with the new version of Tor for Android which is also first time available in Google play store.

Tor project releases Tor for Android with the highest privacy protections that include block trackers, Resist Fingerprinting and Multi-Layered Encryption.

Tor browser 8.05 is the first stable version for Android since Tor Team released an Alpha version on last year September.

Tor for Android brings much future for Android users with full privacy protection feature same as we enjoyed with Desktop version of Tor.

Tor for Android is a Stable version

Mobile browsing is an essential part nowadays, but users are often worried about massive surveillance and censorship online.

In this case, Tor for Android brings complete anonymity for users and make sure to gain a wide range of accessibility on the internet with extreme privacy.

With the alpha version of Tor, users also need to have proxy application Orbot installed in the device to connect the Tor Browser for Android with the Tor network.

Tor said, “We made sure there are no proxy bypasses that first-party isolation is enabled to protect you from cross-site tracking and that most of the fingerprinting defenses are working in Android version of Tor.

Also, Tor Team Promised that there are still feature gaps between the desktop and Android Tor Browser, “we are confident that Tor Browser for Android provides essentially the same protections that can be found on desktop platforms.”

In this release, Tor redesigns the Tor Logos and also Tor Browser 8.5 compatible with Firefox’s Photon UI.

“The new Tor Browser icon was chosen through a round of voting in our community,” Tor said.

There is no official release for Tor Browser for iOS devices, Tor project recommends using Onion Browser.

You can Download Tor Browser 8.5 from Here Tor Browser and distribution directory.

The Android version is available from 
Google Play

Follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

TOP 11 Deep Web Search Engine Alternative for Google and Bing 2019

Top 5 Best Dark Web Browser for Anonymous Web Browsing With Ultimate Privacy

TOR and VPN Anonymous Enough for Dark Web

Dark Web Secrets: What Should You Know About Your Information Being on the Dark Web?

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles