New Release: Tor Browser 15.0.3[end quoted excerpt]
by ma1 | December 8, 2025
Tor Browser 15.0.3 is now available from the Tor Browser download page >https://www.torproject.org/download/
and also from our distribution directory. >https://www.torproject.org/dist/torbrowser/15.0.3/
This version includes important security updates to Firefox.
Tor-hosted NoScript updates
From this release on, NoScript versions for Tor Browser are hosted on Tor's >infrastructure, allowing us to deliver more timely and reliable updates. >Distinguished by a version number ending with ".1984", they are otherwise >equivalent to their AMO (stable) or pre-release counterparts: e.g. 13.5.2.1984 >(Tor) = 13.5.2 (AMO).
Send us your feedback
If you find a bug or have a suggestion for how we could improve this release, >please let us know.
Full changelog
The full changelog since Tor Browser 15.0.2 is:
All Platforms
Updated NoScript to 13.5.2.1984
Bug tor-browser#22974: Self-host NoScript Updates
Bug tor-browser#44348: Backport Bugzilla 1999126: Protect whether PDF.js is
enabled/disabled to improve fingerprinting protection
Bug tor-browser#44391: Restrictions cascade blocks every capability in
subframes (e.g. captchas)
Bug tor-browser#44399: Rebase Tor Browser 15.0 stable onto 140.6.0esr
Bug tor-browser#44409: Backport Security Fixes from Firefox 146
Bug tor-browser-build#41646: Update lyrebird version to v0.7.0
Windows + macOS + Linux
Updated Firefox to 140.6.0esr
Bug tor-browser#44414: Disable Zucchini for the 15.0 series.
Android
Updated GeckoView to 140.6.0esr
Bug tor-browser#44346: Webrender broken on Adreno 510 devices with esr140
Build System
All Platforms
Bug tor-browser-build#41644: Self-hosted browser extensions support in
relprep.py
Windows + Linux + Android
Updated Go to 1.24.11
https://blog.torproject.org/new-release-tor-browser-1503/
New Release: Tor Browser 15.0.3[end quoted excerpt]
by ma1 | December 8, 2025
Tor Browser 15.0.3 is now available from the Tor Browser download page
https://www.torproject.org/download/
and also from our distribution directory.
https://www.torproject.org/dist/torbrowser/15.0.3/
This version includes important security updates to Firefox.
Tor-hosted NoScript updates
From this release on, NoScript versions for Tor Browser are hosted on Tor's >> infrastructure, allowing us to deliver more timely and reliable updates.
Distinguished by a version number ending with ".1984", they are otherwise
equivalent to their AMO (stable) or pre-release counterparts: e.g. 13.5.2.1984
(Tor) = 13.5.2 (AMO).
Send us your feedback
If you find a bug or have a suggestion for how we could improve this release,
please let us know.
Full changelog
The full changelog since Tor Browser 15.0.2 is:
All Platforms
Updated NoScript to 13.5.2.1984
Bug tor-browser#22974: Self-host NoScript Updates
Bug tor-browser#44348: Backport Bugzilla 1999126: Protect whether PDF.js is
enabled/disabled to improve fingerprinting protection
Bug tor-browser#44391: Restrictions cascade blocks every capability in
subframes (e.g. captchas)
Bug tor-browser#44399: Rebase Tor Browser 15.0 stable onto 140.6.0esr
Bug tor-browser#44409: Backport Security Fixes from Firefox 146
Bug tor-browser-build#41646: Update lyrebird version to v0.7.0
Windows + macOS + Linux
Updated Firefox to 140.6.0esr
Bug tor-browser#44414: Disable Zucchini for the 15.0 series.
Android
Updated GeckoView to 140.6.0esr
Bug tor-browser#44346: Webrender broken on Adreno 510 devices with esr140 >> Build System
All Platforms
Bug tor-browser-build#41644: Self-hosted browser extensions support in >> relprep.py
Windows + Linux + Android
Updated Go to 1.24.11
Still spamming for Tor Browser, eh? IMO, anybody who uses it is simply putting a huge red flag on themselves for TLAs to take advantage of:
https://www.malwarebytes.com/blog/news/2024/09/tor-anonymity-compromised-by-law-enforcement-is-it-still-safe-to-use
On Wed, 10 Dec 2025 03:04:48 -0800, John C. wrote:
Still spamming for Tor Browser, eh? IMO, anybody who uses it is simply
putting a huge red flag on themselves for TLAs to take advantage of:
https://www.malwarebytes.com/blog/news/2024/09/tor-anonymity-compromised-by-law-enforcement-is-it-still-safe-to-use
The article you refer to is dated Sept 2024, so it's possibly outdated.
But it says:
'The Tor Project has not been granted access to supporting documents and
has not been able to independently verify if this claim is true, if the attack took place, how it was carried out, and who was involved.'
and:
'Tor is still safe to use'
<https://blog.torproject.org/tor-is-still-safe/>
The article you refer to is dated Sept 2024, so it's possibly outdated.
But it says:
'The Tor Project has not been granted access to supporting documents and
has not been able to independently verify if this claim is true, if the attack took place, how it was carried out, and who was involved.'
and:
'Tor is still safe to use'
<https://blog.torproject.org/tor-is-still-safe/>
I still prefer to err on the side of caution.
John C. wrote:
I still prefer to err on the side of caution.
In that case I would be more concerned about that Yahoo account of
yours.
| Sysop: | KJ5EKH |
|---|---|
| Location: | Siloam Springs, Ar. |
| Users: | 10 |
| Nodes: | 10 (0 / 10) |
| Uptime: | 77:11:27 |
| Calls: | 32 |
| Files: | 76,049 |
| Messages: | 59,683 |