Defend yourself against network surveillance and traffic analysis

Tor Browser

Tor Browser 11.5.8

  -  97.97 MB  -  Open Source
  • Latest Version

    Tor Browser 14.0.2

  • Operating System

    Windows 7 / Windows 8 / Windows 10 / Windows 11

  • User Rating

    Click to vote
  • Author / Product

    The Tor Project / External Link

  • Filename

    torbrowser-install-11.5.8_en-US.exe

  • MD5 Checksum

    3c6509ab943f8931dd48335657555c89

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Tor Browser 11.5.8.


For those interested in downloading the most recent release of Tor Browser or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Tor Browser 11.5.8 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Tor Browser 11.5.8 Screenshot 1
  • Tor Browser 11.5.8 Screenshot 2
  • Tor Browser 11.5.8 Screenshot 3
  • Tor Browser 11.5.8 Screenshot 4
  • Tor Browser 11.5.8 Screenshot 5

What's new in this version:

Fixed:
- In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.
- Service Workers might have learned size of cross-origin media files
- Fullscreen notification bypass
- Use-after-free in InputStream implementation
- Use-after-free of a JavaScript Realm
- Fullscreen notification bypass via windowName
- Use-after-free in Garbage Collection
- ServiceWorker-intercepted requests bypassed SameSite cookie policy
- Cross-Site Tracing was possible via non-standard override headers
- Symlinks may resolve to partially uninitialized buffers
- Keystroke Side-Channel Leakage
- Iframe contents could be rendered outside the iframe
- Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
- SameSite=Strict cookies could have been sent cross-site via intent URLs

- Update Translations
- Update OpenSSL to 1.1.1s
- Update NoScript to 11.4.12
- Update tor to 0.4.7.11
- Update zlib to 1.2.13
- Update obfs4proxy to 0.0.14 in Tor Browser
- Letterboxing is enabled in priviledged contexts too
- Consider adding about:tor and others to the list of pages that do not need letterboxing
- Backup intl.locale.requested in 11.5.x
- Letterboxing bypass through secondary tab (popup/popunder...)
- Backport ESR 102.5 security fixes to 91.13-based Tor Browser
- Migrate new identity and security level preferences in 11.5.8

Build:
- Update Go to 1.18.8
- Create an anticensorship team keyring
- Revert fix for zlib build break