Thursday, April 18, 2024

Tor Browser 8.5 Released – Tor For Android is Now Available from Google Play

Tor Browser 8.5 officially launched now along with the new version of Tor for Android which is also first time available in Google play store.

Tor project releases Tor for Android with the highest privacy protections that include block trackers, Resist Fingerprinting and Multi-Layered Encryption.

Tor browser 8.05 is the first stable version for Android since Tor Team released an Alpha version on last year September.

Tor for Android brings much future for Android users with full privacy protection feature same as we enjoyed with Desktop version of Tor.

Tor for Android is a Stable version

Mobile browsing is an essential part nowadays, but users are often worried about massive surveillance and censorship online.

In this case, Tor for Android brings complete anonymity for users and make sure to gain a wide range of accessibility on the internet with extreme privacy.

With the alpha version of Tor, users also need to have proxy application Orbot installed in the device to connect the Tor Browser for Android with the Tor network.

Tor said, “We made sure there are no proxy bypasses that first-party isolation is enabled to protect you from cross-site tracking and that most of the fingerprinting defenses are working in Android version of Tor.

Also, Tor Team Promised that there are still feature gaps between the desktop and Android Tor Browser, “we are confident that Tor Browser for Android provides essentially the same protections that can be found on desktop platforms.”

In this release, Tor redesigns the Tor Logos and also Tor Browser 8.5 compatible with Firefox’s Photon UI.

“The new Tor Browser icon was chosen through a round of voting in our community,” Tor said.

There is no official release for Tor Browser for iOS devices, Tor project recommends using Onion Browser.

You can Download Tor Browser 8.5 from Here Tor Browser and distribution directory.

The Android version is available from 
Google Play

Follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

TOP 11 Deep Web Search Engine Alternative for Google and Bing 2019

Top 5 Best Dark Web Browser for Anonymous Web Browsing With Ultimate Privacy

TOR and VPN Anonymous Enough for Dark Web

Dark Web Secrets: What Should You Know About Your Information Being on the Dark Web?

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

Website

Latest articles

LeSlipFrancais Data Breach: Customers’ Personal Information Exposed

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer...

Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center

Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity.This groundbreaking...

Phishing-as-a-Service Platform LabHost Seized by Authorities

Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across...

What is Encryption in Malware? – Understand From Basics to XOR

Malware commonly encrypts its traffic (stolen data sent to a command-and-control server) and internal...

Armis Acquires AI-based Vulnerability Detection Firm Silk Security

Armis, a leading cybersecurity company, has acquired Silk Security, an AI-powered vulnerability detection firm.The...

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles