News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

New Release: Tor Browser 14.5 : Tor | Torhoo darknet markets

Was warned by the pop-up. Usually someone is ahead of that here :p

Download: https://www.torproject.org/download/ | http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/download/index.html

Blog: https://blog.torproject.org/new-release-tor-browser-145/ | http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/new-release-tor-browser-145/index.html


What's new?
/u/Snowman46053
2 points
2 months ago
I had to reset my safety settings and go to about:config and turn off JavaScript and a reminder of /post/8efe6154e761c03f6fbb after updating.
/u/BigBossChefOfArchetyp P
2 points
2 months ago
> Bug tor-browser#43189: Remove privacy.resistFingerprinting.spoofOsInUserAgentHeader machinery entirely
> https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43189

That's interesting. What are your thoughts on this /u/Paris? Maybe we should encourage all Dread users to use the same User agent and set a default for the community and hope it will reach as many users outside of Dread as well.
/u/Paris A
2 points
2 months ago
I encourage people to change it as it's an identity vector (specifically for those who are using unique operating systems).

/post/08483e2719d56b9b30a4
/u/BigBossChefOfArchetyp P
2 points
2 months ago
Yes, that's why I tagged you from what I understood they completely remove the feature and will now always show the real user agent?
/u/Paris A
2 points
2 months ago
Oh the fucking removed it entirely! There is not much we can do about that then. A little encouragement for people to use more safe operating systems like tails and whonix is really all we can do.
/u/Shakybeats M
2 points
2 months ago
........I just added your post to the bible. Fuck, someone send me more cocaine and hookers.
/u/BigBossChefOfArchetyp P
0 points
2 months ago
His post won't work with this update, they remove the feature Paris talked about in that change. Now everyone will show his real user agent.
/u/BigBossChefOfArchetyp P
1 points
2 months ago
It's an odd move, in my head this goes really against the philosophy of TBB, makes you wonder why they really did it as the reasons do not seem that important at least to me.
/u/chickenpoot65K
1 points
2 months ago*
"The philosophy of TBB" is to serve the interests of those holding the guns to their heads.

edit: Hey archetyp aren't you supposed to be a fed now? Or is that just a rumor?
The assessment of /u/socat2me is very good, complete and accurate. I'll quote it in case anyone looks at both of the topics /post/341c93c9ae682dcedf69/#c-df0adebfded4cc0555


The goal of Tor Browser is to make every user have a fingerprint that is as close as possible to being the same. The reason that they don't want you messing with settings in about:config is that while you may think the changes you are making are increasing your anonymity, they are making you more unique.

All the fingerprinting methods make use of JS. If you have your safety settings turned up to max then scripts are blocked across all sites by default.

Modern JS fingerprinting libraries have a very robust assortment of methods that create a detailed fingerprint. Spoofing something like the user agent or the in-browser value for the OS is not going to do much when data points being gathered include things like the variance in performance timing due to OS task scheduling.

In the end the values you've provided are not going to match the data for the real OS, so now your fingerprint is incredibly unique because you don't match Tor Browser users or users of the actual OS.

Accessing sites using tor browser while allowing javascript to run with customized about:config settings, expecting to be able to effectively fool most of the JS fingerprinting libraries through the manual changes you've made is only going to make you extremely unique and your fingerprint hash is going to make you easily identifiable across browser sessions regardless of your IP.

If you want to access sites while allowing JS to run and hope to effectively spoof an operating system while also masking your IP and having a non-unique browser fingerprint, this is outside the scope of Tor Browser and what it's meant for.
/u/BigBossChefOfArchetyp P
1 points
2 months ago
No, that comment by /u/socat2me is missing the point. Almost everyone disables JS. This however is a way to make users look different even with JS disabled.
/u/socat2me
2 points
2 months ago
I probably could have been a little clearer about what I meant, I do get your point about the user-agent being unrelated to JS, and I haven't closely followed the conversation amongst the devs, but my assumption would be they arrived at a conclusion similar to the discussion on the feasibility of hiding tor usage from ISPs.

With the amount of data points that leak information about the OS at the network and protocol layers (not that all of these are applicable across the whole tor circuit), and fingerprinting suites like J4+ I'm guessing that spoofing the user-agent value was either found to be counterproductive or an insignificant countermeasure against sophisticated adversaries.

That's speculative and my giving the devs some benefit of the doubt, although it seems more likely than them making the change for arbitrary reasons, or without any empirical basis.
Once again very accurate response couldn't have phrased it better. TCP packets are a chest full of information and guess what Tor uses. Your initial comment was correct and you did take into consideration the scenario /u/BigBossChefOfArchetyp said. Though not expanding on it in full it was kind of implied what you described further.
/u/chickenpoot65K
1 points
2 months ago
What about CSS mouse fingerprinting? Would you happen to know?
/u/quark P
1 points
2 months ago
Our old tor-news caster is mia
/u/MrBacon420
/u/newbieforever2018 P
1 points
2 months ago
Now hiring for exterminator jobs.
/u/chickenpoot65K
1 points
2 months ago*
You forgot to mention they removed useragent spoofing.


I rolled mine back and I recommend everybody does the same until we figure out a fucking solution.

Fuck the tor devs. Bunch of doxxed clearnet faggots with NSA cock in their ass and Mossad cock in their mouth. If this doesn't prove it to you then you're retarded.