New Release: Tor Browser 15.0

Date:

Share:

Tor Browser 15.0 is now available from the Tor Browser download page and distribution directory. This is our first stable release based on Firefox ESR 140, incorporating a year’s worth of changes that have been shipped upstream in Firefox. As part of this process, we’ve also completed our annual ESR transition audit, where we reviewed and addressed around 200 Bugzilla issues for changes in Firefox that may negatively affect the privacy and security of Tor Browser users. Our final reports from this audit are now available in the tor-browser-spec repository on our GitLab instance.

The ongoing development of Tor Browser is made possible thanks to the support of our community. If Tor Browser is important to you, now is a great time to support our mission to FREE THE INTERNET, as all donations will be matched by Power Up Privacy through December 31, 2025.

What’s new?

Desktop

Tor Browser 15.0 inherits a multitude of useful new features and usability improvements from Firefox that have passed our audit. For desktop, these include vertical tabs: providing a more manageable, alternative layout with open and pinned tabs stacked in a sidebar rather than across the top of the window. For ease of access, Bookmarks can be retrieved directly from the sidebar when expanded too. However, regardless of whether you prefer horizontal or vertical tabs, everyone benefits from the addition of tab groups: helping you keep on top of the clutter by organizing tabs into collapsible groups that can be given names and color-coded. Tor Browser 15.0 also inherits elements of Firefox’s recent address bar refresh, including a new unified search button that allows you to switch search engines on the fly, search bookmarks or tabs, and reference quick actions from the same menu.

Note that Tor Browser tabs are still private tabs, and will clear when you close the browser. This enforces a kind of natural tidiness in Tor Browser since each new session starts fresh – however for privacy-conscious power users, project managers, researchers, or anyone else who accumulates tabs frighteningly quickly, we hope these organizational improvements will give you a much needed productivity boost.

A screenshot featuring Tor Browser for Desktop with vertical tabs enabled and three tab groups present in the resulting sidebar

Android

On Android, screen lock adds an extra layer of security to your browsing sessions. After enabling screen lock in Settings > Tabs, your tabs will lock automatically when you switch away from the browser without closing it. Upon returning to the app, you’ll be prompted to unlock your tabs using your fingerprint, face, or pass code, depending on which option your device is configured to use.

Like Tor Browser for Desktop, your browsing session will still be cleared when Tor Browser is closed. However, this feature provides peace of mind in a specific scenario: by ensuring that your browsing remains private even if someone has gained temporary access to your unlocked phone with Tor Browser open in the background – whether you’ve handed it to a friend, or left your device sitting on a table.

A screenshot demonstrating screen lock for Tor Browser on an Android phone, followed by a second screenshot of a passcode being entered

What’s changing?

Updates to Android and Linux device compatibility

At present, Firefox 140 and Tor Browser 15.0 support Android 5.0 or later, which was released almost 11 years ago. While Mozilla’s commitment to support such an old version of Android is admirable, it introduces several technical and security challenges for developers. As a consequence, Firefox have announced their intention to increase the minimum support requirements to Android 8.0, and have also decided to drop support for x86 CPUs for Android and Linux. Sadly, it’s not possible for the Tor Project to maintain support for these platforms on our own without official support from Mozilla.

While these changes won’t impact Tor Browser users immediately, we expect them to take effect with the release of Tor Browser 16.0 mid-next year. This means that Tor Browser 15.0 will be the last major release to support x86 for Linux and Android, in addition to Android 5.0, 6.0, and 7.0. However, we will continue to release minor updates with security fixes for these platforms until Tor Browser 16.0’s eventual release.

Although nobody wants to see support for their platform get dropped, it’s an important step to maintain the stability and security of both Firefox and Tor Browser over time, and will allow developers to utilize newer technologies in both browsers. In addition, supporting x86 for Android has been particularly challenging for our developers due to the 100MB package size limit imposed by Google Play. While we have deployed several workarounds to stay within this limit in the recent past, these often come at a cost – such as x86 Android users missing out on the Conjure pluggable transport, for example.

Disabling of WebAssembly now managed by NoScript

WebAssembly (or Wasm) is a web technology that helps websites and web apps run faster. It allows web developers to write programs in languages like C, C++ or Rust, and compiles these into a special format that web browsers can run more efficiently.

As has been suggested in this meta-analysis from 2024, further investigation of Wasm’s potential exploits is necessary – therefore Wasm is currently disabled in the Safer and Safest security levels in order to reduce Tor Browser’s attack surface. Up until now, this was achieved by setting the global preference javascript.options.wasm to false – however this approach was no longer viable after Mozilla implemented part of their PDF reader in Wasm between versions 128 and 140. Consequently, we have decided to move control of Wasm to NoScript, which is bundled with Tor Browser, and already manages JavaScript and other security features. This means that Wasm now works on privileged browser pages such as the PDF renderer, but NoScript will continue blocking the technology on regular websites at the Safer and Safest security levels.

Users who have manually set javascript.options.wasm to “false” while in the Standard security level will see their security level represented as “Custom” instead. To mitigate any issues that may arise with the browser’s PDF reader, we encourage those users to switch the preference back to “true”, thereby passing management of Wasm over to NoScript. Furthermore, manually disabling Wasm at the Standard security level (either via NoScript or javascript.options/wasm) may also make your fingerprint more unique by deviating from Tor Browser’s default configuration. To avoid this scenario, we recommend sticking with one of the pre-defined security levels and caution users against making further changes to individual preferences in about:config.

Alternatively, should you wish to keep Wasm disabled in future, we invite you to increase your security level to Safer or Safest going forward. Note that both Safer and Safest users may notice javascript.options.wasm switch to “true” automatically as management of Wasm is passed over to and blocked by NoScript, meaning that you are still protected regardless. In addition, Safest users in particular are not vulnerable to any potential vulnerabilities introduced by Wasm since the format requires JavaScript to work.

Known issues

Tor Browser 15.0 comes with a number of known issues that can be found in Tor Browser’s issue tracker. In particular, we would like to highlight the following:

Desktop

The initial release of vertical tabs in Tor Browser includes a couple of quirks:

  • When the sidebar is visible (such as when vertical tabs are enabled), the window may visibly resize when Tor Browser is launched.
  • Due to variations in window size, Letterboxing may be visible. You still get the anti-fingerprinting protections provided by Letterboxing, but the default window size will be different than intended.

We are currently working to issue a fix for both of these bugs. Please see tor-browser#44096 for details.

Android

  • Web pages may not load after updating Tor Browser on older versions of Android. This can be fixed by clearing your app cache manually in Settings > Apps > Tor Browser > Storage & cache.

Get involved

If you find a bug or have a suggestion for how we could improve this release, we’d love to hear your feedback. If you would like to contribute to a future release, please see our guide for new contributors to get started.

Full changelog

The full changelog since Tor Browser 14.5.9 is:

  • All Platforms
  • Windows + macOS + Linux
  • Windows + Android
  • Windows
  • macOS
  • Linux
  • Android
  • Build System
    • All Platforms
    • Windows + macOS + Linux
    • Windows + Linux + Android
    • Windows
    • macOS
    • Linux
    • Android

Source link

Subscribe to our magazine

━ more like this

Old Navy x Anna Sui Collab Blends Two 90s Fashion Icons

Calling all fashion lovers because the nineties... and seventies... and sixties called, and they want to be back inside your closets. Luckily, New York-based...

Refy Lip Stick – The Beauty Look Book

Refy Beauty launched a new lip product called the Lip Stick ($28 each, available at Refy Beauty and Sephora). This is an innovative liquid...

Agrippa-d'Aubigné Terrace in Genève, Switzerland

This bright open space is in the heart of Old Town Geneva and dates back to at least 1535, when a former palace...

What You (Want to)* Want

November 2022Since I was about 9 I've been puzzled by the apparent contradiction between being made of matter that behaves in a predictable way, and the...