Oracle to Release Unbreakable Kernel R5U3

A new version of Tor Browser 9.0.7 is available, aimed at ensuring anonymity, security and privacy. The browser is focused on ensuring anonymity, security and privacy, all traffic is redirected only through the Tor network. It is impossible to access directly through the regular network connection of the current system, which does not allow tracking the real IP of the user (in case of a hacked browser, attackers can gain access to the network system parameters, so products such as Whonix should be used to completely block possible leaks). Builds Tor Browser prepared for Linux, Windows, macOS and Android.

The new release updated components Tor 0.4.2.7 and NoScript 11.0.19, in which vulnerabilities were fixed. Tor eliminated the DoS vulnerability, which created too much CPU load when accessing Tor directory servers controlled by cybercriminals. NoScript resolves a problem that allows you to work around the launch of JavaScript code in the “Safest” protection mode by redirecting to the “data:” URI.

In addition, the Tor Browser developers have added additional protection and if the “Safest” mode is turned on, they automatically disable JavaScript at the javascript.enabled setting level in about: config. This change does not allow whitelisting sites in NoScript for selective cancellation of “Safest” (to return to the old behavior, you can manually change the javascript.enabled value). After the Tor developers make sure that no loopholes are accurately covered in NoScript to bypass Safest, additional protection may be removed.

Get more at the official website.