What's New in Tor Version 3?
The Tor Project has introduced a significant update with its Version 3 protocol, marking a substantial improvement over its predecessor, Tor v2. This article explores the new features and enhancements that come with Tor Version 3, available for Windows, macOS, and Linux. The Tor Browser 7.5a51 is the first to support the v3 protocol.
For macOS users, installing the new version is straightforward with the command brew install tor
in the terminal (assuming you have Homebrew2 installed). Once installed, check your version with tor version
to ensure it’s at least Tor 0.3.2.1 or higher.
Key Features of Tor v3, also known as prop224 34
With the implementation of v3 starting from Tor version 0.3.2.1-alpha, several enhancements have been introduced:
-
Upgraded Security Protocols: Transitioning to SHA3, ed25519, and curve25519, replacing the older SHA1, DH, and RSA1024. This shift significantly enhances the cryptographic strength of the network.
-
Improved Directory Protocol: The new protocol reduces the amount of information that directory servers can leak, enhancing user privacy.
-
Resilience Against Attacks: Directory servers now have a reduced impact when encountering attacks, ensuring more robust network stability.
-
Enhanced Onion Addresses: The shift to SHA3 for onion addresses increases the difficulty of brute-forcing these addresses.
-
Scalable Exchange Protocol: The v3 protocol introduces a more flexible and scalable exchange protocol5.
-
Refined and Modular Codebase: The underlying code of Tor has been streamlined and modularized, making it more efficient and easier to maintain.
Comparison: v2 vs. v3 Onion Domains
The most noticeable difference between v2 and v3 is in the length of the onion domain names. Longer domain names in v3 significantly reduce the feasibility of attackers successfully generating identical domains, a tactic used in phishing attacks.
- v2 Domain Example:
cryptolk2jn53pi7.onion
- v3 Domain Example:
4acth47i6kxnvkewtm6q7ib2s3ufpo5sqbsnzjpbi7utijcltosqemad.onion
Tor Project’s Test Servers
Here are some test servers for experimenting with Tor v3:
- Riseup: http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion
- Searx: http://ozmh2zkwx5cjuzopui64csb5ertcooi5vya6c2gm4e3vcvf2c2qvjiyd.onion
- IRC Test Hub:
gff4ixq3takworeuhkubzz4xh2ulytoct4xrpazkiykhupalqlo53ryd.onion:6697
- Federalist Papers: http://7fa6xlti5joarlmkuhjaifa47ukgcwz6tfndgax45ocyn4rixm632jid.onion/
- Other Addresses: http://j2eiu2izwjpazjevu4xs3muaif3jzex3nnvnu677vz2fypmzccvhhiid.onion, http://lgekyjf5vosmbfvcxzg3g5mmcncmwy4d3nhjrdqqiqzl5nmhqlfemaid.onion/
- Isis’ Blog (Patterns in the Void): Link to OnionShare
These enhancements and changes in Tor v3 represent a significant step forward in terms of security, privacy, and efficiency. The longer .onion addresses, while more complex, offer greater protection against impersonation and phishing attacks, contributing to a safer and more secure anonymous browsing experience.
Enjoy Reading This Article?
Here are some more articles you might like to read next: