{"id":66503,"date":"2015-08-28T17:43:26","date_gmt":"2015-08-28T21:43:26","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser-version-4-5-security-affairs\/"},"modified":"2015-08-28T17:43:26","modified_gmt":"2015-08-28T21:43:26","slug":"tor-browser-version-4-5-security-affairs","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-version-4-5-security-affairs\/","title":{"rendered":"Tor Browser version 4.5 &#8211; Security Affairs"},"content":{"rendered":"<p><p>    Are you a frequent visitor of thedeep    web? Is the Tor Network a necessity for youronline    anonymity?  <\/p>\n<p>    You must download the new release for the Tor    Browser,Tor    Browser 4.5, that was designed with a variety of    improvements. The developers at the Tor Project have introduced    a number of security, privacy and usability enhancements in    theTor Browser 4.5.  <\/p>\n<p>    On theprivacyfront,    theTor Browser 4.5 improves thefirst    party isolationfeature that is designed to prevent    third party company tracking online activities of the Tor    users.  <\/p>\n<p>      First party isolation provides the property that third      party advertisements, like buttons, and mashup content that      is included on one site will only know about your activity on      that site, and will not be able to match it to your activity      while you are on any other site. In other words, with first      party isolation, Facebook, Twitter, and Google+ cant track      you around the entire web using theirinfamous like      buttons. reads a blogpostaboutTor Browser      4.5.    <\/p>\n<p>    Additionally, the Tor Browser 4.5improves the resolution    and locale fingerprinting defenses, developers have disabled    thedevice sensor and video statistics APIs.  <\/p>\n<p>    On the security front, the TorBrowser 4.5 comes with a    new Security Slider designed to provide a user-friendly    vulnerability surface reduction and allow users to choice the    proper security level.  <\/p>\n<\/p>\n<p>    The slider is available from the menu item Privacy and    Security Settings.  <\/p>\n<p>      The Security Slider provides user-friendly       vulnerability surface reduction  as the security level      is increased, browser features that were shown to have a high      historical vulnerability count in the       iSec Partners hardening study are progressively      disabled. continues the post.    <\/p>\n<p>    Another featurethat enhances the security of the Tor    Browser 4.5 is the digital signature of the Windows packages    with a hardware token donated by DigiCert CA.  <\/p>\n<p>    The Tor Browser 4.5 also introduces anew obfs4    obfuscation protocol, which improve resistance for DPI and    probing and prevents automated scanning for Tor bridges.  <\/p>\n<p>    The new Tor Browser 4.5 also cames withDisconnectsearch    engine by default, which provides private Google search results    without Captchas or bans.  <\/p>\n<p>    Dont waste time, download the newTor    Browser 4.5!  <\/p>\n<p>    PierluigiPaganini  <\/p>\n<p>    (Security    Affairs Tor Browser 4.5, Deep    Web)  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/securityaffairs.co\/wordpress\/36500\/digital-id\/tor-browser-4-5.html\" title=\"Tor Browser version 4.5 - Security Affairs\">Tor Browser version 4.5 - Security Affairs<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Are you a frequent visitor of thedeep web? Is the Tor Network a necessity for youronline anonymity?  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-version-4-5-security-affairs\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-66503","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66503"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=66503"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66503\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=66503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=66503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=66503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}