Why?
View Transitions support being implemented in 144 is a very big deal and pushes the web forward for native transition animations.
In the next two or three versions before the end of 2025, Anchor Positioning will also be a big deal.
So, congrats on Tor 15, but Tor 16 will bring a massive improvement for Tor!
Redster•1h ago
I suspect this is paranoia on my part, but I would be curious to hear thoughts from this crowd.
1. If you're threat model is surveillance state, are things like this helpful or harmful? 2. If you need a tool like this, what's the best way to obtain/install this anonymously?
bombcar•1h ago
Tor also has nothing to do with torrents.
chasil•1h ago
If you login with your phone to a corporate restaurant's wifi, you may find a number of sites blocked. Tor can circumvent that.
Onionshare is a handy way to exchange files with multiple parties.
And for sensitive questions that you don't want in your google search history, it's quite effective with startpage or duckduckgo.
I use ffupdater from f-droid to install and maintain Tor browser, although it is available directly from f-droid.
mhitza•52m ago
Unless you live in a fully authoritarian state, there shouldn't be a reason to be investigated for using Tor. Being put on a list is a different matter, but voicing your opinions online might also get you there. If not now, in a possible, not far away grim future.
Tor Browser is a great idea, and would be more usable on a daily basis if it'd block ads by default as well.
1. Maybe some of our Chinese peers can chime in. In such circumstances you need to take a step further and use bridges to connect to the Tor network to better circumvent restrictions. As far of deep packet inspection I'm not aware of the state of the art in China, and if it's possible to evade detection.
2. Download it from a public wifi with no cameras in sight?
globalnode•41m ago
I've also recently become aware of the depths of how insecure our data really is. windows recall is one problem, but they make the o/s, whos to say they arent sending data to hq about you anyway. then you have firmware that can do what it wants before you even get to the o/s layer.
encryption is nice if you own all the hardware and software before you hit the network (like on an embedded device for example) but then what about the security at the receivers end? even the pro's make mistakes in this area.
so while i try not to give away my data for free, if youre networked, your not 100% secure. im not even sure what other toys eavesdroppers have to get around problems but it sure is an interesting field!
neilv•26m ago
Good question. I don't know the answer, but I've been operating on the assumption that Tor Browser gives you more privacy from commercial surveillance (e.g., our fellow HNers), but not from many state actors (e.g., US gov't).
I especially wouldn't encourage Tor Browser use by a member of a group being oppressed by a regime that has use of sophisticated surveillance technology. Tor use is very easily detected, and I would fear they would just be drawing attention to themself.
However, if you're not targeted (as a group, or individually), and your threat model is mainly that you don't want a hundred data brokers to know about your totally legal interest in the Tina Fey Matt Damon Fanfic Clubhouse site... then, sure, run Tor Browser. Just be sure to disclose that club membership if ever asked on the form when applying for DoD security clearance, and I'd guess they probably already know.
> 2. If you need a tool like this, what's the best way to obtain/install this anonymously?
Simply using it will flag it to the ISP as Tor traffic. So you could just download it using whatever ISP you will be using to run it, without revealing much more.
nzeid•22m ago
I think the more vicious oppressive states will give you deep trouble if they simply catch you with this software. But if you're looking to simply obscure traffic from your internet provider or some other malcontent platform, Tor will work.
> If you need a tool like this, what's the best way to obtain/install this anonymously?
Hehe, if you need to hide your DNS query to the Tor project or traffic directly to it, you are probably somewhere where simply possessing this software can get you in a lot of trouble. I wouldn't encourage you to do anything reckless.
Otherwise, just go to the site shamelessly and get it.
Brian_K_White•11m ago
I value things like this because my threat model is "go F yourself".
Not you, all the entities that do not want you or me to have privacy and agency.
It doesn't matter what their reasons are from merely being nosy for no real reason, all the way to govenments trying to become panopticons.
You don't need a justification. No one needs a justification. "why do you need" is an absolutely invalid question from the first syllable.
And, I apologize for this because it will be unkind, but, when you roll over because you fear attracting attention, all you do is displace that attention onto someone else. Someone else takes on double hassle to pay for your avoiding hassle.
It doesn't go away. The attention is there regardless, and either we all bear a tiny bit and it's harmless, or a few bear it all and it kills them.
And then, when the the thorns are cut down, you end up in a worse world because now their behavior is no longer checked by any resistance. The level of grief you decided was tolerable, is no longer the level they will inflict. It's short-sighted and counter-productive in the long term. It's the same as all other examples of appeasement. Giving the bully what they want never actually accomplishes what the bully promises.