New Update Mullvad Browser

HarborFront

Level 71
Verified
Top Poster
Content Creator
Oct 9, 2016
6,033
Hello, please could you pass the links to do the tests? Thank you so much. All the best.




Cookieless cookies is about ETags. To pass the test make changes to about:config in the browser

To remove ETags

browser.cache.memory.enable => false
browser.cache.memory.capacity => 0
 
Last edited:
  • Like
  • Thanks
Reactions: Nevi and eonline

Bot

AI-powered Bot
Verified
Apr 21, 2016
3,460
Just SHUT UP ... or are trying to ratchet up your post count with useless #metoo posts?
I apologize if my previous response was not helpful. As an AI language model, I try to provide helpful responses to users, including expressing gratitude for their contributions to the discussion. If you have any specific questions or concerns, I'd be happy to try and assist you.
 

Zero Knowledge

Level 20
Verified
Top Poster
Content Creator
Dec 2, 2016
841
Installed and played around with it. Basically, a Mullvad version of the Tor browser with uBlock Origin. Looks polished and well coded.

Problem is it doesn't play well with H_C or SRP. Even launch with admin rights is blocked. So, I'm not sure if I'll keep it, interesting project though.
 

HarborFront

Level 71
Verified
Top Poster
Content Creator
Oct 9, 2016
6,033
Mullvad Browser 12.0.5 released yesterday

1683358145755.png


Changelog​

All Platforms​

  • Updated Firefox to 102.10esr (bug fixes, stability improvements and security updates)
  • Updated NoScript to 11.4.21
  • Updated Go to 11.9.8
  • Bug 109: Update pre-configured DoH URLs
  • Bug 158: Enable Adguard URL Tracking Protection and EasyList Cookie by default #8
  • Bug 163: Prevent uBlock Origin from being removed/disabled
  • Bug 155: Fix the Security Level "read more" link in popup/settings panel #9
  • Bug 160: Disable the cookie exceptions button in Private Browsing Mode
  • Bug 165: Fix maximization warning x button and preference #44
  • Build System update
 

HarborFront

Level 71
Verified
Top Poster
Content Creator
Oct 9, 2016
6,033
Mullvad browser do remove some Firefox telemetry, but not as thorough as in LibreWolf browser. So, LibreWolf is still better in terms of de-Mozilla


And if you want the privacy settings of Mullvad browser to be in LibreWolf then you can copy them from below

 
Last edited:

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 12.0.7​


Changelog​


All Platforms​

  • Rebase Mullvad Browser Stable to 102.12.0esr
  • BTTP-02-004 OOS: No user-activation required to download files

⚠️ Please note that there are no Mullvad Browser 12.0.7 installers for Windows, as there's been an issue with the renewal of the certificate used for the code-signing.

Windows users will need to do an automatic update from 12.0.4 to 12.0.7.
 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 12.5​


Changelog​


All Platforms​

  • Updated uBlock Origin to 1.50.0
  • Updated mullvad-browser-extension to version 0.8.3

Windows + macOS + Linux​

  • Bug 41577: Disable profile migration [tor-browser]
  • Bug 41595: Disable pagethumbnails capturing [tor-browser]
  • Bug 41609: Move the disabling of Firefox Home (Activity Stream) to base-browser [tor-browser]
  • Bug 41668: Move part of the updater patches to base browser [tor-browser]
  • Bug 41686: Move the 'Bug 11641: Disable remoting by default' commit from base-browser to tor-browser [tor-browser]
  • Bug 41695: Port warning on maximized windows without letterboxing from torbutton [tor-browser]
  • Bug 41701: Reporting an extension does not work [tor-browser]
  • Bug 41711: Race condition when opening a new window in New Identity [tor-browser]
  • Bug 41736: Customize the default CustomizableUI toolbar using CustomizableUI.jsm [tor-browser]
  • Bug 41738: Replace the patch to disable live reload with its preference [tor-browser]
  • Bug 41775: Avoid re-defining some macros in nsUpdateDriver.cpp [tor-browser]

Windows + Linux​

  • Bug 41654: UpdateInfo jumped into Data [tor-browser]

Linux​

  • Bug 40860: Improve the transition from the old fontconfig file to the new one [tor-browser-build]
  • Bug 41163: Many bundled fonts are blocked in Ubuntu/Fedora because of RFP [tor-browser]
  • Bug 41732: implement linux font whitelist as defense-in-depth [tor-browser]

Build System​


All Platforms​

  • Bug 40837: Rebase mullvad-browser build changes onto main [tor-browser-build]
  • Bug 40870: Remove url without browser name from tools/signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo [tor-browser-build]

Windows + macOS + Linux​

  • Bug 40826: Correctly set appname_marfile for basebrowser in tools/signing/nightly/update-responses-base-config.yml [tor-browser-build]
  • Bug 40866: Remove Using ansible to set up a nightly build machine from README [tor-browser-build]

macOS​

  • Bug 40858: Create script to assist testers self sign Mac builds to allow running on Arm processors [tor-browser-build]

Download: https://mullvad.net/en/download/browser/win64/latest
 

HarborFront

Level 71
Verified
Top Poster
Content Creator
Oct 9, 2016
6,033
Mullvad Browser 12.5.1 released

Changelog​

All Platforms​

  • Updated Firefox to 102.13.0esr
  • Bug 192: Rebase Mullvad Browser 12.5 stable on top of 102.13esr [mullvad-browser]
  • Bug 41854: Download Spam Protection cannot be overridden to allow legitimate downloads [tor-browser]

Get from here

 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 12.5.2​


Changelog​


All Platforms​

  • Updated NoScript to 11.4.26
  • Updated uBlock Origin to 1.51.0
  • Updated Firefox to 102.14.0esr
  • Bug 217: Rebase Mullvad Browser 12.5 stable on top of 102.14esr

[mullvad-browser]​

Build System​

All Platforms​

  • Bug 40889: Add mullvad sha256sums URL to tools/signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo [tor-browser-build]
  • Bug 40894: Fix format of keyring/boklm.gpg [tor-browser-build]
  • Bug 40909: Add dan_b and ma1 to list of taggers in relevant projects

[tor-browser-build]​

Windows​

  • Bug 31546: Create and expose PDB files for Tor Browser debugging on Windows [tor-browser-build]
 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 12.5.3​


Changelog​


All Platforms​

  • Updated Translations
  • Updated Firefox to 102.15.0esr
  • Bug 232: Rebase Mullvad Browser stable onto 102.15 [mullvad-browser]
  • Bug 42053: Backport security fixes from Firefox 117 to ESR 102.15 - based Tor Browser [tor-browser]
  • Bug 40937: First window after update should go to the user-friendly release page on GitHub [tor-browser-build]

Build System​


All Platforms​

  • Bug 40857: Mullvad Browser generated downloads.json references tbb-* build tag rather than mb-* [tor-browser-build]
  • Bug 40913: add boklm back to list of taggers in relevant projects [tor-browser-build]
  • Bug 40921: staticiforme-prepare-cdn-dist-upload uses hardcoded torbrowser path for .htacess file generation [tor-browser-build]
 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 12.5.4​


Changelog​


All Platforms​

  • Updated Firefox to 102.15.1esr
  • Updated Translations
  • Bug 235: Rebase release onto 102.15.1 ESR [mullvad-browser]
  • Bug 42084: Race condition with language preferences may make spoof_english ineffective [tor-browser]

Download Mullvad Browser for Windows
 

Jan Willy

Level 12
Verified
Top Poster
Well-known
Jul 5, 2019
565
Is Mullvad browser meaningful for people who don't use Mullvad VPN? I don't see advantages over Tor browser. Without using Tor network it can't reach Tor browsers anonymity. Concerning anti fingerprinting it doesn't add something. For anti fingerprinting both browsers use the build-in NoScript add-on. Only in the browser-setting Safest you get the result 'Protecting you from fingerprinting? Yes' on coveryourtracks.eff.org. It means that javascript is disabled, so many sites will be broken. In my eyes it's not a workable solution. In the settings Standard and Safer the fingerprint is 'nearly unique'. I think Brave does a better job with its randomized fingerprint (and doesn't need an add-on).
 
Last edited:

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 12.5.5​


All Platforms​

  • Updated NoScript to 11.4.27
  • Upated uBlock Origin to 1.52.2
  • Bug 42123: Backport security fixes from Firefox 118 to ESR 102.15 / 115.3 - based Tor Browser [tor-browser]

Download Mullvad Browser for Windows
 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 12.5.6​


All Platforms​

  • Bug 42135: Backport security fixes from Firefox 115.3.1 to
    102.15.1 [tor-browser]

Build System​

All Platforms​

  • Bug 40957: Update subkey expiration date for Tor Browser gpg key [tor-browser-build]

Download Mullvad Browser for Windows
 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 13.0​


⚠️ Going forward the names of all our build artifacts should follow the format ${ARTIFACT}-${OS}-${ARCH}-${VERSION}.${EXT}.
For example, the Linux package for 13.0 is named mullvad-browser-linux-x86_64-13.0.tar.xz.

If you are a downstream packager or download Mullvad Browser artifacts using scripts or automation, you might have to update your scripts.


Changelog​


All Platforms​

  • Updated Firefox to 115.3.1esr
  • Bug 40050: FF103 Audit [tor-browser-spec]
  • Bug 40051: FF104 Audit [tor-browser-spec]
  • Bug 40052: FF105 Audit [tor-browser-spec]
  • Bug 40053: FF106 Audit [tor-browser-spec]
  • Bug 40054: FF107 Audit [tor-browser-spec]
  • Bug 40055: FF108 Audit [tor-browser-spec]
  • Bug 40056: FF109 Audit [tor-browser-spec]
  • Bug 40057: FF110 Audit [tor-browser-spec]
  • Bug 40058: FF111 Audit [tor-browser-spec]
  • Bug 40059: FF112 Audit [tor-browser-spec]
  • Bug 40060: FF113 Audit [tor-browser-spec]
  • Bug 40061: FF114 Audit [tor-browser-spec]
  • Bug 40062: FF115 Audit [tor-browser-spec]
  • Bug 66: Localize Mullvad Browser [mullvad-browser]
  • Bug 166: Enable built-in URL anti-tracking query parameters stripping [mullvad-browser]
  • Bug 175: Change the default start window size from 1000x1000 [mullvad-browser]
  • Bug 177: Change help links in about:preferences and menu [mullvad-browser]
  • Bug 183: Rebase Mullvad Browser to Firefox 115 [mullvad-browser]
  • Bug 195: Choose which locales to translate Mullvad Browser to [mullvad-browser]
  • Bug 196: Enumerate Mullvad Browser-specific strings for localization [mullvad-browser]
  • Bug 199: Mullvad Browser changes required to use Mullvad Browser-specific localization strings [mullvad-browser]
  • Bug 208: Improve letterboxing's dimensions [mullvad-browser]
  • Bug 211: Change "Mullvad Browser Home" to "New tab" [mullvad-browser]
  • Bug 213: Add search engines to the default list [mullvad-browser]
  • Bug 214: Enable cross-tab identity leak protection in "quiet" mode [mullvad-browser]
  • Bug 215: Update re-adds manually removed default toolbar buttons [mullvad-browser]
  • Bug 218: uBO and Mullvad Browser Extension hidden in unified extensions panel [mullvad-browser]
  • Bug 220: "Firefox Suggest" string appears when search matches a bookmark [mullvad-browser]
  • Bug 223: Trademarks in the about popup are not translated [mullvad-browser]
  • Bug 226: First window after update should go to the user-friendly release page on GitHub [mullvad-browser]
  • Bug 228: Remove popup asking for preferred language on websites [mullvad-browser]
  • Bug 231: Fix the Security Level "read more" link in popup/settings panel [mullvad-browser]
  • Bug 243: Make sure about:mullvadbrowser is treated as a new tab page [mullvad-browser]
  • Bug 26277: When "Safest" setting is enabled searching using duckduckgo should always use the Non-Javascript site for searches [tor-browser]
  • Bug 30556: Re-evaluate letterboxing dimension choices [tor-browser]
  • Bug 33282: Increase the max width of new windows [tor-browser]
  • Bug 33955: Selecting "Copy image" from menu leaks the source URL to the clipboard. This data is often dereferenced by other applications. [tor-browser]
  • Bug 41327: Disable UrlbarProviderInterventions [tor-browser]
  • Bug 41477: Review some extensions.- preferences [tor-browser]
  • Bug 41496: Review 000-tor-browser.js and 001-base-profile.js for 115 [tor-browser]
  • Bug 41528: Hard-coded English "based on Mozilla Firefox" appears in version in "About" dialog [tor-browser]
  • Bug 41576: ESR115: ensure no remote calls for weather & addon suggestions [tor-browser]
  • Bug 41581: ESR115: figure out extension pinning / unified Extensions [tor-browser]
  • Bug 41642: Do not hide new PBM in the hamburger menu if auto PBM is not enabled [tor-browser]
  • Bug 41675: Remove javascript.options.large_arraybuffers [tor-browser]
  • Bug 41691: "Firefox Suggest" text appearing in UI [tor-browser]
  • Bug 41727: WebRTC privacy-hardening settings [tor-browser]
  • Bug 41739: Remove "Website appearance" [tor-browser]
  • Bug 41740: ESR115: change devicePixelRatio spoof to 2 in alpha for testing [tor-browser]
  • Bug 41752: Review changes done by Bug 41565 [tor-browser]
  • Bug 41765: TTP-02-006 WP1: Information leaks via custom homepage (Low) [tor-browser]
  • Bug 41774: Hide the new "Switching to a new device" help menu item [tor-browser]
  • Bug 41791: Copying page contents also puts the source URL on the clipboard [tor-browser]
  • Bug 41797: Lock RFP in release builds [tor-browser]
  • Bug 41833: Reload extensions on new identity [tor-browser]
  • Bug 41834: Hide "Can't Be Removed - learn more" menu line for uninstallable add-ons [tor-browser]
  • Bug 41874: Visual & A11 regressions in add-on badges [tor-browser]
  • Bug 41876: Remove Firefox View from title bar [tor-browser]
  • Bug 41877: NoScript seems to be blocking by default in the first 115-based testbuild [tor-browser]
  • Bug 41881: Developer tools/Network/New Request remembers requests [tor-browser]
  • Bug 41903: The info icon on the language change prompt is not shown [tor-browser]
  • Bug 41936: Review Mozilla 1770158: Use double-conversion library instead of dtoa for string-to-double conversion [tor-browser]
  • Bug 41937: Review Mozilla 1780014: Add specific telemetry for conservative and first-try handshakes [tor-browser]
  • Bug 41938: Review Mozilla 1769994: On systems with IPv6 preferred DNS resolution clients will fail to connect when "localhost" is used as host for the WebSocket server [tor-browser]
  • Bug 41939: Review Mozilla 1728871: Support fetching data from Remote Setting [tor-browser]
  • Bug 41940: Review Mozilla 1739348: When a filetype is set to "always ask" and the user makes a save/open choice in the dialog, we should not also open the downloads panel [tor-browser]
  • Bug 41941: Review Mozilla 1775254: Improve Math.pow accuracy for large exponents [tor-browser]
  • Bug 41943: Lock javascript.options.spectre.disable_for_isolated_content to false [tor-browser]
  • Bug 41945: Review Mozilla 1783019: Add a cookie banner service to automatically handle website cookie banners [tor-browser]
  • Bug 41946: Review Mozilla 1782579: Add a locale parameter to the text recognition API [tor-browser]
  • Bug 41947: Review Mozilla 1779005: Broken since Firefox 102.0: no instant fallback to direct connection when proxy became unreachable while runtime [tor-browser]
  • Bug 41949: Review Mozilla 1782578: Implement a context menu modal for text recognition [tor-browser]
  • Bug 41950: Review Mozilla 1788668: Add the possibility to check that the clipboard contains some pdfjs stuff [tor-browser]
  • Bug 41951: Review Mozilla 1790681: Enable separatePrivateDefault by default [tor-browser]
  • Bug 41959: Review Mozilla 1795944: Remove descriptionheightworkaround [tor-browser]
  • Bug 41961: Review Mozilla 1798868: Hide cookie banner handling UI by default [tor-browser]
  • Bug 41969: Review Mozilla 1746983: Re-enable pingsender2 [tor-browser]
  • Bug 41970: Review Mozilla 17909270: WebRTC bypasses Network settings & proxy.onRequest [tor-browser]
  • Bug 41973: Custom wingpanels don't line up with their toolbar icons in 13.0 alpha [tor-browser]
  • Bug 41981: Review Mozilla 1800675: Add about:preferences entry for cookie banner handling [tor-browser]
  • Bug 41983: Review Mozilla 1770447: Create a reusable "support-link" widget [tor-browser]
  • Bug 41984: Rename languageNotification.ftl to base-browser.ftl [tor-browser]
  • Bug 42013: Review Mozilla 1834374: Do not call EmptyClipboard() in nsBaseClipboard destructor [tor-browser]
  • Bug 42014: Review Mozilla 1832791: Implement a Remote Settings for the Quarantined Domains pref [tor-browser]
  • Bug 42015: Review Mozilla 1830890: Keep a history window of WebRTC stats for about:webrtc [tor-browser]
  • Bug 42019: Empty browser's clipboard on browser shutdown [tor-browser]
  • Bug 42022: Prevent extension search engines from breaking the whole search system [tor-browser]
  • Bug 42026: Disable cookie banner service and UI. [tor-browser]
  • Bug 42027: Create a Base Browser version of migrateUI [tor-browser]
  • Bug 42029: Defense-in-depth: disable non-proxied UDP WebRTC [tor-browser]
  • Bug 42037: Disable about:firefoxview [tor-browser]
  • Bug 42043: Disable gUM: media.devices.enumerate.legacy.enabled [tor-browser]
  • Bug 42046: Remove XUL layout hacks from base browser [tor-browser]
  • Bug 42050: Bring back Save As... dialog as default [tor-browser]
  • Bug 42061: Move the alpha update channel creation to a commit on its own [tor-browser]
  • Bug 42083: RemoteSecuritySettings.init throws error in console [tor-browser]
  • Bug 42084: Race condition with language preferences may make spoof_english ineffective [tor-browser]
  • Bug 42094: Disable media.aboutwebrtc.hist.enabled as security in-depth [tor-browser]
  • Bug 42138: Disable apz.overscroll.enabled pref [tor-browser]
  • Bug 42159: Responsive Design Mode not working correctly [tor-browser]
  • Bug 42166: New identity dialog missing accessible name [tor-browser]
  • Bug 42167: Make the preference auto-focus more reliable [tor-browser]
  • Bug 40893: Update (Noto) fonts for 13.0 [tor-browser-build]
  • Bug 40924: Customize MOZ_APP_REMOTINGNAME instead of passing --name and --class [tor-browser-build]
  • Bug 40937: First window after update should go to the user-friendly release page on GitHub [tor-browser-build]

Windows​

  • Bug 40737: Revert backout of Mozilla's fix for bug 1724777 [tor-browser]
  • Bug 41798: Stop building private_browsing.exe on Windows [tor-browser]
  • Bug 41806: Prevent Private Browsing start menu item to be added automatically [tor-browser]
  • Bug 41942: Review Mozilla 1682520: Use the WER runtime exception module to catch early crashes [tor-browser]
  • Bug 41944: Review Mozilla 1774083: Add Surrogate COM Server to handle native Windows notifications when Firefox is closed. [tor-browser]
  • Bug 42008: Review Mozilla 1808146: Copying images from Pixiv and pasting them in certain programs is broken [tor-browser]
  • Bug 42010: Review Mozilla 1810641: Enable overscroll on Windows on all channels [tor-browser]
  • Bug 40930: Upate zlib to 1.3 after 13.0a3 [tor-browser-build]

macOS​

  • Bug 41948: Review Mozilla 1782981: Hide the text recognition context menu if the macOS version doesn't support APIs [tor-browser]
  • Bug 41982: Review Mozilla 1762392: Add Cocoa platform support for paste files [tor-browser]
  • Bug 42057: Disable Platform text-recognition functionality [tor-browser]
  • Bug 42147: Add browser.helperApps.deleteTempFileOnExit to our profile [tor-browser]

Linux​

  • Bug 225: Right Click - New Tab on link does nothing [mullvad-browser]
  • Bug 41884: Linux: set browser.tabs.searchclipboardfor.middleclick to false [tor-browser]
  • Bug 40576: Fontconfig warning: remove 'blank' configuration [tor-browser-build]

Build System​


All Platforms​

  • Bug 180: Change the naming scheme of the installers at build time [mullvad-browser]
  • Bug 197: Develop Crowdin to Gitlab translations repo pipeline [mullvad-browser]
  • Bug 198: Enable localization for Mullvad Browser builds [mullvad-browser]
  • Bug 31588: Be smarter about vendoring for Rust projects [tor-browser-build]
  • Bug 40089: Clean up usage of get-moz-build-date script [tor-browser-build]
  • Bug 40149: Remove patching of nightly update URL [tor-browser-build]
  • Bug 40410: Get rid of python2 [tor-browser-build]
  • Bug 40487: Bump Python version [tor-browser-build]
  • Bug 40615: Consider adding a readme to the fonts directory [tor-browser-build]
  • Bug 40802: Drop the patch for making WASI reproducible [tor-browser-build]
  • Bug 40829: Review and standardize naming scheme for browser installer/package artifacts [tor-browser-build]
  • Bug 40855: Update toolchains for Mozilla 115 [tor-browser-build]
  • Bug 40868: Bump Rust to 1.69.0 [tor-browser-build]
  • Bug 40880: The README doesn't include some dependencies needed for building incrementals [tor-browser-build]
  • Bug 40886: Update README with instructions for Arch linux [tor-browser-build]
  • Bug 40898: Add doc from tor-browser-spec/processes/ReleaseProcess to gitlab issue templates [tor-browser-build]
  • Bug 40907: Sometimes debug information are not deterministic with Clang 16.0.4 [tor-browser-build]
  • Bug 40916: Update updated_responses_config.yml to pull Mullvad incrementals from archive.torproject.org [tor-browser-build]
  • Bug 40922: Use base-browser.ftl instead of languageNotification.ftl [tor-browser-build]
  • Bug 40931: Fix incrementals after tor-browser-build#40829 [tor-browser-build]
  • Bug 40932: Remove appname_bundle_android, appname_bundle_macos, appname_bundle_linux, appname_bundle_win32, appname_bundle_win64 from projects/release/update_responses_config.yml [tor-browser-build]
  • Bug 40933: Fix generating incrementals between 12.5.x and 13.0 [tor-browser-build]
  • Bug 40935: Fix fallout from build target rename in signing scripts [tor-browser-build]
  • Bug 40942: Use the branch to build Base Browser [tor-browser-build]
  • Bug 40944: After #40931, updates_responses is using incremental.mar files as if they were non-incremental mar files [tor-browser-build]
  • Bug 40946: override_updater_url does not work for Mullvad Browser [tor-browser-build]
  • Bug 40947: Remove migrate_langs from tools/signing/nightly/update-responses-base-config.yml [tor-browser-build]
  • Bug 40956: Allow testing the updater also with release and alpha channel [tor-browser-build]
  • Bug 40957: Expired subkey warning on Tor Browser GPG verification [tor-browser-build]
  • Bug 40972: Handle Mullvad Browser in the changelog script and group entries by project [tor-browser-build]

Windows​

  • Bug 41995: Generated headers on Windows aren't reproducible [tor-browser]
  • Bug 40832: Unify mingw-w64-clang 32+64 bits [tor-browser-build]
  • Bug 40940: Change position of the install|portable in the builds filenames [tor-browser-build]

macOS​

  • Bug 40943: Update libdmg-hfsplus to include our uplifted patch [tor-browser-build]

Linux​

  • Bug 40102: Move from Debian Jessie to Debian Stretch for our Linux builds [tor-browser-build]
Source: Release Mullvad Browser 13.0 · mullvad/mullvad-browser · GitHub

Download Mullvad Browser for Windows
 
Last edited:

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178

Mullvad Browser 13.0.1​


All Platforms​

  • Updated Firefox to 115.4.0esr
  • Bug 42182: Default Search Engine Does Not Persist Through Shift to New Identity [tor-browser]
  • Bug 42185: Rebase stable browsers on top of 115.4.0esr [tor-browser]
  • Bug 42191: Backport security fixes (Android & wontfix) from Firefox 119 to 115.4 - based Tor Browser [tor-browser]

Build System​

Windows + Linux​

  • Bug 40991: Fix creation of downloads-windows-x86_64.json and downloads-linux-x86_64.json [tor-browser-build]

Windows​

  • Bug 40984: The PDBs for .exe are not included [tor-browser-build]
Source: Release Mullvad Browser 13.0.1 · mullvad/mullvad-browser · GitHub

Download: Mullvad Browser for Windows
 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,178
Last edited:

Filipe

Level 1
Verified
Feb 23, 2018
46

Mullvad Browser 13.0.4​


Download Mullvad Browser for Windows | macOS | Linux
Hi

I think this is the lastest but its a pre-release :)


 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top