New Alpha Release: Tor Browser 14.0a4
Tor Browser 14.0a4 is now available from the Tor Browser download page and also from our distribution directory.
This version includes important security updates to Firefox.
We would like to thank the folowing community members for their contributions this release:
- NoisyCoil for their fixes for tor-browser#42730, tor-browser#43114, and tor-browser#43088
If you would like to contribute, our contributor guide can be found here.
User Agent Spoofing Changes
Historically, Tor Browser has spoofed the browser user agent found in HTTP headers, while not spoofing the user agent returned by the Navigator.userAgent
property in JavaScript. The logic behind the HTTP header spoofing was to prevent passive tracking of users' operating system by websites (when using the 'Safest' security level) and by malicious exit nodes (or their upstream routers) passively listening in on unencrypted HTTP traffic. We left the JavaScript query intact for the purposes of website compatibility and usability. We also left it enabled because there are already many ways of detecting a user's real operating system when JavaScript is enabled (e.g. via font enumeration).
With Tor Browser 14.0a4, we have introduced the boolean preference privacy.resistFingerprinting.spoofOsInUserAgentHeader
. When this pref is set to true
(which is currently the default), Tor Browser will follow the previously described legacy behaviour. However, if you set this preference (accessible in about:config) to false
, Tor Browser will never spoof the user agent and will report your operating system family (i.e. Windows, macOS, Linux, or Android) when requested. We are considering changing Tor Browser to make this the new default behaviour.
So, why are we considering making this change? Basically, asymetrically spoofing the user agent causes website breakage seemingly due to bot-detection scripts. And (in our analysis) it also provides only a negligible amount of benefit to the user in terms of additional linkability (i.e. cross-site tracking, fingerprinting) protections, and only then when JavaScript is disabled. Tor Browser's default HTTPS-Only mode (and much of the web having moved to HTTPS) has also significantly reduced the utility of passively sniffing HTTP traffic for user agents as well.
We would be very curious to hear from users and domain experts as to whether user agent spoofing is providing any other privacy benefits. In the meantime, disabling spoofing is available to users on an opt-in basis. For more information and to join the conversation, please see the Gitlab ticket tor-browser#42467.
Android APK Size Reduction
We have sufficiently reduced our APKs for x86 and x86_64 releases on Google Play. However, this is at the expense of the conjure pluggable-transport and the (currently unused on Android) GeoIP database. Long-term we will need to find additional savings for feature-complete releases for these platforms.
Bugzilla Triage and Review
We have 127 remaining upstream Bugzilla issues to review and potentially develop patches for.
This work can be tracked in this Gitlab query.
Send us your feedback
If you find a bug or have a suggestion for how we could improve this release, please let us know.
Full changelog
The full changelog since Tor Browser 14.0a3 is:
- All Platforms
- Updated NoScript to 11.4.35
- Updated OpenSSL to 3.0.15
- Bug tor-browser#30862: 10ms time precision via EXSLT date-time function
- Bug tor-browser#42601: Check Bug 1894779: Allow font-face urls to be resource:// urls and relax CORS for resource:// URLs
- Bug tor-browser#42684: Disable network prefetch
- Bug tor-browser#42685: compat: ESR128: enable textmetrics
- Bug tor-browser#42686: Backport Mozilla 1885101
- Bug tor-browser#42730: Make RemoteSettings use only local dumps
- Bug tor-browser#42867: Disable contentRelevancy component
- Bug tor-browser#43100: Backport security fixes from Firefox 130
- Windows + macOS + Linux
- Bug tor-browser#40147: Re-enable Picture-in-Picture mode
- Bug tor-browser#41309: Re-enable screenshots component
- Bug tor-browser#41835: Review default search engine options
- Bug tor-browser#42617: Restore the HTML form on DDG when using safest in 128
- Bug tor-browser#42630: Review LaterRun in 128
- Bug tor-browser#42640: Disable Firefox Flame button due to unknown interactions with New Identity
- Bug tor-browser#42735: Disable recent search suggestions
- Bug tor-browser#42737: Drop the hash check on updates
- Bug tor-browser#42743: Invalid onion sites are shown as secure in the page info window
- Bug tor-browser#42744: Light theme override for "about:tor" is inherited by chrome error pages.
- Bug tor-browser#42745: Remove some residuals from update scripts
- Bug tor-browser#42764: Unconditionally disable find-bar transition animation
- Bug tor-browser#42803: Lost focus styling for built-in bridges radio options
- Bug tor-browser#42891: Review Mozilla 1854965: Define new search engine configuration schema
- Bug tor-browser#43015: Missing region-name-skr fluent entry when fetching TorConnect country names
- Bug tor-browser#43075: Should we drop link spacing in about:tor
- Bug tor-browser#43082: Search engine icon is not shown while typing in the address bar
- Bug tor-browser#43103: Verify whether an update is unsupported before choosing one
- Bug tor-browser#43105: Migrating Disconnect is not needed anymore
- macOS + Linux
- Bug tor-browser#42467: Make OS HTTP User-Agent OS spoofing configurable by pref
- macOS
- Bug tor-browser#42494: mac: add Arial Black and Arial Narrow to allowlist
- Linux
- Bug tor-browser#42773: Replace ~ with the original HOME
- Bug tor-browser#43092: Disable Wayland by default in 14.0
- Android
- Bug tor-browser#42655: Implement "New circuit for this site" on Android
- Bug tor-browser#42731: Verify
privacy.spoof_english
still works once we have Android builds - Bug tor-browser#43016: Re-disable Nimbus
- Bug tor-browser#43023: Review Mozilla 1872510: Use SamsungColorEmoji by default for Samsung devices
- Bug tor-browser#43043: Remove credit card autofill UI elements from menu
- Bug tor-browser#43088: Query stripping is disabled on Android
- Bug tor-browser#43094: Remove "Open in regular tab" button
- Bug tor-browser#43114: Reader view uses the catch-all circuit on Android
- Bug tor-browser#43116: The lack of GeoIP databases produces a lot of spam in the console on Android
- Build System
- All Platforms
- Bug tor-browser-build#41096: Set SOURCE_DATE_EPOCH in the default env variables
- Bug tor-browser-build#41180: Some files do not need to be copied when building tor-expert-bundle
- Bug tor-browser-build#41188: Upgrade binutils to 2.41
- Bug tor-browser-build#41229: Migrate OpenSSL download location to github releases
- Android
- Bug tor-browser-build#41224: Do not ship Conjure and GeoIP databases on Android x86, x86-64 to save some space
- All Platforms
Comments
We encourage respectful, on-topic comments. Comments that violate our Code of Conduct will be deleted. Off-topic comments may be deleted at the discretion of the moderators. Please do not comment as a way to receive support or to report bugs on a post unrelated to a release. If you are looking for support, please see our FAQ, user support forum or ways to get in touch with us.