GStreamer 1.16.0 Framework to Rolled Out

It's a cross-platform set of components for creating a wide range of multimedia applications, like media players or audio/video file converters, to VoIP apps
22 April 2019   927

After more than a year of development, GStreamer 1.16 was released. It is the C written cross-platform set of components for creating a wide range of multimedia applications, from media players and audio / video file converters, to VoIP applications and streaming systems. The GStreamer code is distributed under the LGPLv2.1 license.

Updates for the plug-ins gst-plugins-base, gst-plugins-good, gst-plugins-bad, gst-plugins-ugly, as well as the gst-libav to 1.16 is available. At the API and ABI level, the new release is backward compatible with branch 1.0. Binary assemblies will soon be prepared for Android, iOS, macOS and Windows (Linux is recommended to use packages from the distribution).

It has a lot of updates and improvements. For example, hidden subtitles support, optimization improvements and much more. Get more info at email archive

Tor Browser 9.0.7 to be Released

New version of browser, focused on security, has a lot of improvements, e.g., vulnerabilities at components Tor and NoScript are fixed
24 March 2020   189

A new version of Tor Browser 9.0.7 is available, aimed at ensuring anonymity, security and privacy. The browser is focused on ensuring anonymity, security and privacy, all traffic is redirected only through the Tor network. It is impossible to access directly through the regular network connection of the current system, which does not allow tracking the real IP of the user (in case of a hacked browser, attackers can gain access to the network system parameters, so products such as Whonix should be used to completely block possible leaks). Builds Tor Browser prepared for Linux, Windows, macOS and Android.

The new release updated components Tor 0.4.2.7 and NoScript 11.0.19, in which vulnerabilities were fixed. Tor eliminated the DoS vulnerability, which created too much CPU load when accessing Tor directory servers controlled by cybercriminals. NoScript resolves a problem that allows you to work around the launch of JavaScript code in the "Safest" protection mode by redirecting to the "data:" URI.

In addition, the Tor Browser developers have added additional protection and if the "Safest" mode is turned on, they automatically disable JavaScript at the javascript.enabled setting level in about: config. This change does not allow whitelisting sites in NoScript for selective cancellation of "Safest" (to return to the old behavior, you can manually change the javascript.enabled value). After the Tor developers make sure that no loopholes are accurately covered in NoScript to bypass Safest, additional protection may be removed.

Get more at the official website.