12
submitted 1 month ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

Today the Tor Project, a global non-profit developing tools for online privacy and anonymity, and Tails, a portable operating system that uses Tor to protect users from digital surveillance, have joined forces and merged operations. Incorporating Tails into the Tor Project's structure allows for easier collaboration, better sustainability, reduced overhead, and expanded training and outreach programs to counter a larger number of digital threats. In short, coming together will strengthen both organizations' ability to protect people worldwide from surveillance and censorship.

8
submitted 1 month ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

This is a minor Desktop-only release containing (primarily) updated strings for users on legacy Windows and macOS.

6
submitted 1 month ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

This version includes important security updates to Firefox.

12
submitted 2 months ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

This version includes important security updates to Firefox.

12
submitted 4 months ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

In that respect, Tor Browser 13.5 feels like a milestone: in addition to the dozens of bug fixes and minor improvements noted in the changelog below, this release features major changes to Android's connection experience in preparation for the future addition of Connection Assist, including full access to Settings before connecting and a new, permanent home for Tor logs.

For desktop, we're continuing our efforts to improve the user experience of Tor Browser's fingerprinting protections. Following the changes we introduced to new window sizes in Tor Browser 13.0 for Desktop, this release features welcome design changes to letterboxing, including new options to remember your last used window size and adjust the alignment of the letterbox in General Settings. Bridge users will also discover a myriad of improvements to bridge settings, including a complete redesign of bridge cards with improved sharing features, and a new section designed to help you find more bridges elsewhere. Lastly, the design of onion site errors has received a visual refresh aimed at making them consistent with the other kinds of Network Errors you can find in Tor Browser.

27
submitted 4 months ago by byte1000@discuss.tchncs.de to c/tor@lemmy.ml
[-] byte1000@discuss.tchncs.de 9 points 7 months ago
16
submitted 7 months ago* (last edited 7 months ago) by byte1000@discuss.tchncs.de to c/tor@lemmy.ml

Onion link

This is an unscheduled emergency release with important security updates to Firefox for Desktop platforms. Android is unaffected.

43
Lockdown Mode for Android? (discuss.tchncs.de)

Is there a fork of Android (or a way to harden it) that locks down the OS similarly to how Apple does it?

Apple's implementation can actually protect you from commercial spyware. I'm impressed.

[-] byte1000@discuss.tchncs.de 4 points 7 months ago

~43% of all Lemmy's monthly active users are on lemmy.world .

Yeah, that's even worse.

[-] byte1000@discuss.tchncs.de 7 points 7 months ago* (last edited 7 months ago)

The instance has too many people registered. It has ~27% of all Mastodon's monthly active users.

A huge part of the network was down. People should be encouraged to migrate to smaller instances, so we can have better decentralization.

40
submitted 8 months ago by byte1000@discuss.tchncs.de to c/matrix@lemmy.ml

Element has been working with Meta since the end of last year to help test their DMA interoperability (given we’re probably the world leader in interoperable end-to-end-encrypted communication) - and Matrix announced last month at FOSDEM that Element has successfully integrated 1:1 chats between Matrix and WhatsApp via the DMA APIs, while maintaining end-to-end encryption (having implemented full Signal compatibility in vodozemac). We’ve also formally requested interoperability with WhatsApp, as of yesterday.

[-] byte1000@discuss.tchncs.de 15 points 8 months ago

All internet connections into and out of your Linux device will now be blocked unless a VPN connection to a Proton VPN server is active.

If I understand correctly, before version 4.2.0 (that includes the Advanced setting), the kill switch wasn't active until you opened the ProtonVPN program. So if you restarted you PC, it was connecting to the internet without going through the VPN tunnel, so your traffic was somewhat exposed.

Now, with the new permanent kill switch, there's no internet access without running ProtonVPN.

[-] byte1000@discuss.tchncs.de 5 points 8 months ago

The update seems to be bugged. I tried to upgrade version 0.0.57 to 0.0.58, and it seems like nothing have changed. I'm still on 0.0.57 after a "successful" install.

[-] byte1000@discuss.tchncs.de 3 points 11 months ago

Good to know. Thank you for your answers!

[-] byte1000@discuss.tchncs.de 6 points 1 year ago

You mean Pixel 5.

[-] byte1000@discuss.tchncs.de 3 points 1 year ago* (last edited 1 year ago)

Additionally, if you share your account with other people and haven’t enabled two-factor authentication, you may not want to join the Sentinel program, as it will increase your chance of being challenged during logins.

I wonder, so why not just force Sentinel program users to enable 2FA?

[-] byte1000@discuss.tchncs.de 10 points 1 year ago

If an app on one device connects to an app on another via Veilid, it shouldn't be possible for either client to know the other's IP address or location from that connectivity, which is good for privacy, for instance. The app makers can't get that info, either.

Is that considered a new thing? I don't think I've ever encountered a P2P service/protocol that also masks IP addresses.

[-] byte1000@discuss.tchncs.de 5 points 1 year ago

Relatively high number of RCE vulnerabilities.

[-] byte1000@discuss.tchncs.de 4 points 1 year ago

IMHO that's a highly requested feature.

[-] byte1000@discuss.tchncs.de 3 points 1 year ago

What if the site was even able to fingerprint my Tor browser?

I didn't change anything in the browser settings menu. Only thing I did after loading the site for the first time was to click "block canvas fingerprinting".

I'm on Windows 11 BTW.

19
submitted 1 year ago* (last edited 1 year ago) by byte1000@discuss.tchncs.de to c/solarpunk@slrpnk.net
view more: next ›

byte1000

joined 1 year ago