Release Notes: This is the second release candidate for the Tor 0.2.4.x series. It fixes several crash bugs in the 0.2.4 branch.
Release Notes: This release makes relay measurement by directory authorities more robust, makes hidden service authentication work again, and resolves a DPI fingerprint for Tor's SSL transport.
Release Notes: This release fixes another opportunity for a remotely triggerable assertion, resumes letting relays test reachability of their DirPort, and cleans up a bunch of smaller bugs.
Release Notes: This release fixes a variety of smaller bugs. The development branch now builds on Windows again.
Release Notes: This release fixes yet more bugs to get closer to a release candidate. It also dramatically speeds up AES: fast relays should consider switching to the newer OpenSSL library.
Release Notes: This release lets fast exit relays scale better, allows clients to use bridges that run Tor 0.2.2.x, and resolves several big bugs when Tor is configured to use a pluggable transport like obfsproxy.
Release Notes: This release fixes some crash and assert bugs, including a socketpair-related bug which has been bothering Windows users. It adds support to serve microdescriptors to controllers, so Vidalia's network map can resume listing relays (once Vidalia implements its side) and adds better support for hardware AES acceleration. Finally, it starts the process of adjusting the bandwidth cutoff for getting the "Fast" flag from 20KB to (currently) 32KB. Preliminary results show that tiny relays harm performance more than they help network capacity.
Release Notes: This release adds a new "stream isolation" feature to improve Tor's security, and provides client-side support for the microdescriptor and optimistic data features introduced earlier in the 0.2.3.x series. It also includes numerous critical bugfixes in the (optional) bufferevent-based networking backend.
Release Notes: This release fixes many bugs. Hidden service clients are more robust. Routers no longer over-report their bandwidth. Win7 should crash a little less. NEWNYM now prevents hidden service-related activity from being linkable. The Entry/Exit/ExcludeNodes and StrictNodes configuration options were revamped to make them more reliable, more understandable, and more regularly applied.
Release Notes: This release fixes a variety of bugs, including a big bug that prevented Tor clients from effectively using "multihomed" bridges, that is, bridges that listen on multiple ports or IP addresses so users can continue to use some of their addresses even if others get blocked.