Several Security Vulnerabilities Fixed in Latest Tor Browser Release

So many critical security vulnerabilities have been fixed in newer Tor Browser Releases. One of such severe security vulnerability was addressed in Tor Browser 8.0.6, which is their latest release.

Tor, being a pro-security network is known for doing all that’s within their control to make sure that the user’s privacy is protected at all times. While users on the Tor network are protected from government surveillance, ISP monitoring, traffic hijacking, etc., the browser connects you to the Tor network seamlessly.

latest tor browser 8.0.6 update

Generally, the Tor Browser helps users to stay anonymous online; protecting them from advertisers activities, browsing habit hijacking, traffic monitoring, ISPs censorship, and prying eyes. The latest release of the Tor Browser addressed a severe Mozilla Firefox ESR 60.5.1 security vulnerability.

A few texts from the browser’s change log page is copied hereunder to help you understand why updating to the latest version is recommended.

Tor Browser 8.0.6 -- February 12 2019
 * All platforms
   * Update Firefox to 60.5.1esr
   * Update HTTPS Everywhere to 2019.1.31
   * Bug 29378: Remove 83.212.101.3 from default bridges
 * Build System
   * All Platforms
     * Bug 29235: Build our own version of python3.6 for HTTPS Everywhere

Tor Browser 8.0.5 -- January 29 2019
 * All platforms
   * Update Firefox to 60.5.0esr
   * Update Tor to 0.3.5.7
   * Update Torbutton to 2.0.10
     * Bug 29035: Clean up our donation campaign and add newsletter sign-up link
     * Bug 27175: Add pref to allow users to persist custom noscript settings
   * Update HTTPS Everywhere to 2019.1.7
   * Update NoScript to 10.2.1
     * Bug 28873: Cascading of permissions is broken
     * Bug 28720: Some videos are blocked outright on higher security levels
   * Bug 26540: Enabling pdfjs disableRange option prevents pdfs from loading
   * Bug 28740: Adapt Windows navigator.platform value on 64-bit systems
   * Bug 28695: Set default security.pki.name_matching_mode to enforce (3)

What to Do?

Since this newer release comes with significant security fixes, we recommend that you visit the download page of Tor to get the latest browser version.

ALSO READ
5 Tips to Improve Your Computer Security

Apart from the Firefox ESR 60.5.1 security vulnerability fixes, this latest Tor browser release also updated HTTPS Everywhere add-on as well as fixed some minor bugs with the earlier version.

Should  I Use Tor?

About the Tor Network

In case you don’t know what TOR network is or haven’t heard about the Tor browser before, this section is for you. TOR, also known as “The Onion Router” is an anonymity software that helps protect your identity and online activities.

The world over, Tor is used by journalists, people under a dictatorship, security officers, etc. to keep their online activities away from prying eyes. Traffic hijacking, browser habits monitoring, and online surveillance can be prevented easily with Tor.

While Tor isn’t a complete replacement for other Free VPN projects, it adds a primary or secondary protection layer (depending on your unique privacy needs). It also lets you host 100% private websites through their hidden (.onion) hosting services.

So the choice of whether to use or not to use Tor depends on your unique privacy needs. A regular online user that checks his Facebook, Twitter, Instagram, etc., does not need Tor. But someone that needs protection from prying eyes, government surveillance, ISP monitoring, etc. can use Tor and/or VPN programs to secure their activities on the internet.

What’s your take on the latest Tor Browser 8.0.6 release? Share your views and opinion below.

Previous Item3 Ways to Advance Content Marketing with Artificial Intelligence
Next ItemFour Ways to Connect Samsung Galaxy S9 to a TV Set
Obasi Miracle
Obasi Miracle is one of the brains behind 3rd Planet Techies. A webdesign afficionado and IT Support brain-box, he flourishes and revel in helping many-a-techies in their aspiration to become the best they can.

LEAVE A REPLY

Please enter your comment!
Please enter your name here