We will be hosting another State of the Onion livestream, a compilation of updates from the Tor Project's different teams discussing highlights of their work during the year and what we are excited about in the upcoming year, on November 9th from 17:00 - 19:00 UTC.
The Tor Project and Tails have joined forces and merged operations to streamline operations, expand outreach, and strengthen both organizations' ability to protect people worldwide from surveillance and censorship.
This blog post is a response to an investigative news report about a large-scale law-enforcement attack that managed to de-anonymize a user of an old version of the long-retired app Ricochet. This blog post aims to provide insight into what we know so far. Nothing that the Tor Project has learned about this incident suggests that Tor Browser was attacked or exploited. Tor users can continue to use Tor Browser to access the web securely and anonymously.
Drawing from his experience as a member of the hacker community, Assange recognized that encryption could offer a protective shield for investigative journalists and leveraged it for his work with Wikileaks. Among other tools, he used .onion sites, the Tor network, Tor Browser and Tails OS--which have now become a 'basic kit' for investigative journalism.