FreeBSD 12.1 Beta 2 to be Rolled Out

There're changes and updates compared to the previous beta, released earlier
01 October 2019   607

The second beta release of FreeBSD 12.1 is published. FreeBSD 12.1-BETA2 is available for amd64, i386, powerpc, powerpc64, powerpcspe, sparc64 and armv6, armv7 and aarch64 architectures. Additionally prepared images for virtualization systems (QCOW2, VHD, VMDK, raw) and Amazon EC2 cloud environments. The release of FreeBSD 12.1 is scheduled for November 4. An overview of the innovations can be found in the announcement of the first beta release.

Compared to the first beta version, errors in fusefs, strip, mpr, mps, ping6, jme, bhyve uart have been fixed. Added assembly modes WITH_PIE and WITH_BIND_NOW. The freebsd-update utility implements new commands 'updatesready' and 'showconfig'. In camcontrol, the 'devtype' command has been adjusted to work with SATL devices.

Tor Browser 9.0.7 to be Released

New version of browser, focused on security, has a lot of improvements, e.g., vulnerabilities at components TorĀ and NoScript are fixed
24 March 2020   189

A new version of Tor Browser 9.0.7 is available, aimed at ensuring anonymity, security and privacy. The browser is focused on ensuring anonymity, security and privacy, all traffic is redirected only through the Tor network. It is impossible to access directly through the regular network connection of the current system, which does not allow tracking the real IP of the user (in case of a hacked browser, attackers can gain access to the network system parameters, so products such as Whonix should be used to completely block possible leaks). Builds Tor Browser prepared for Linux, Windows, macOS and Android.

The new release updated components Tor 0.4.2.7 and NoScript 11.0.19, in which vulnerabilities were fixed. Tor eliminated the DoS vulnerability, which created too much CPU load when accessing Tor directory servers controlled by cybercriminals. NoScript resolves a problem that allows you to work around the launch of JavaScript code in the "Safest" protection mode by redirecting to the "data:" URI.

In addition, the Tor Browser developers have added additional protection and if the "Safest" mode is turned on, they automatically disable JavaScript at the javascript.enabled setting level in about: config. This change does not allow whitelisting sites in NoScript for selective cancellation of "Safest" (to return to the old behavior, you can manually change the javascript.enabled value). After the Tor developers make sure that no loopholes are accurately covered in NoScript to bypass Safest, additional protection may be removed.

Get more at the official website.