Skip to main content


Was anybody else just burned by the Tor Browser flatpak?


This entry was edited (1 month ago)

don't like this

in reply to nikqwxq550

I was about to advocate for the flatpak packager-maintainer being a random guy volunteering for the job. But no, it's official flathub.org/apps/org.torprojec…

catloaf doesn't like this.

Linux reshared this.

in reply to nikqwxq550

Just don't use flatpaks. Let your distribution handle updates like it is supposed to do.

don't like this

in reply to hummingbird

This was an official Flatpak from Tor Browser, so there's no reason why it should be less reliable than the packages from distribution maintainers. Not to mention for atomic distros, flatpaks are the official way to install software.
in reply to nikqwxq550

Well, for Tor Browser even AUR isn't recommended. Just download it from official website and put it under somewhere like ~/.local/opt.
This entry was edited (1 month ago)
in reply to muhyb

This seems like something that Flatpak should be able to handle though. Afaik Mullvad Browser never had this issue. Flatpaks also have numerous advantages, like automatically handling desktop shortcuts.
in reply to nikqwxq550

I'd like to add that you can setup desktop shortcuts pretty easily for Mullvad and TOR browser manual installs. For TOR browser simply run this after opening a terminal in the folder it was extracted to:
./start-tor-browser.desktop --register-app

Same thing should work for mullvad.
in reply to Asparagus0098

Wow nice. Still not really friendly to beginners, since this is something they would have to dig into documentation to find, but it's good to know
in reply to nikqwxq550

Yeah. I just found out about it by accident when I ran it with the --help flag.
in reply to nikqwxq550

Normally there shouldn't be a problem with packaging but Tor documentation recommends it like that to ensure security and authenticity. Even though it's self-updating, they also recommend to delete and re-install it time to time, instead of just updating.
in reply to Mwa

There might not be problems with other packaging but the point here is to not trust anything other than the official sources for maximum privacy I believe.
in reply to muhyb

Ohh okay I had to use a mirror to download it if that's fine.
in reply to Mwa

Mirrors are fine since the official website is not accessible on every country. They just suggest verifying the file signature.
in reply to nikqwxq550

Why don't they bundle the browser itself in the Flatpak and update it via the default Flatpak update mechanism?
in reply to nikqwxq550

So... How do we do we're running an outdated version, and what is the fix that requires manual intervention?
in reply to Vincent

You can check the Tor Project blog to figure out the latest release, and go to your Tor Browser's menu > Help > About Tor Browser to see if it matches. It should be version 14.0.7. If it is not, the fix is detailed in the Github issue I linked in the post
This entry was edited (1 month ago)
in reply to nikqwxq550

It was collapsed for me at first, and buried under a lot of other comments, but a workaround is mentioned here. Unfortunately, that didn't seem to work for me, but deleting the Flatpak and deleting all associated data, and then reinstalling it, I think did the trick.

Although it does now show this warning, which doesn't sound great.

Edit: actually, I think that was the reason I concluded the first workaround didn't work, but looking at that URL, this might just have been introduced in Firefox 128, which is newer than the old version of Tor was based on. So it looks like both worked.

This entry was edited (1 month ago)
in reply to Vincent

You are right I should have linked directly to the workaround, sorry. Glad you got it sorted out though.
in reply to nikqwxq550

The only way of getting Tor browser is through Tor project website

torproject.org/

Dont go download anything from anywhere else, dont matter if its flatpak snap, deb, whatever

in reply to cy_narrator

The only thing they offer is bare source?

I like they've just given up on trying to understand things like filesystem layouts and fucking systemd - which is cool - but now they own dependency hell and inconsistent installs in trade.

Nah. I'll get a package where I can confirm the contents, check the sigs, reproduce the build and then deploy it with its dependencies in a reliable, verifiably-consistent process.

rhel.pkgs.org/9/epel-x86_64/to…

Sources, sigs, signed BoM. Wheeee!

in reply to corsicanguppy

I think it has some sort of binary already in the archive. There's a "start-tor-browser.desktop" you just double click to launch the browser.
in reply to cy_narrator

I get what you're saying, but at the same time if every developer released software as pre-compiled binaries on their website, installing stuff on Linux would become such a PITA. (This is different from how Windows works because apps for Windows are distributed using installers like xxx.msi, and Linux does not have a unified installation system across distros)
in reply to cy_narrator

i just use pacman, mean it has checksum tests after downloading since youre only really downloading the launcher
This entry was edited (1 month ago)
in reply to nikqwxq550

How do you even access Reddit from Tor? I always see the message saying that my attempt was blocked by "Network Security".
in reply to lemel

switch to the old.reddit.com site (onion version tends to work more often), and if that doesn't work, switch Tor circuits (the option is under Tor Browser menu bar, I have it pinned to the top-bar for convenience)
in reply to nikqwxq550

I tried old.reddit.com as well. I think it used to work but it no longer does.
in reply to lemel

Lately they've been rate-limiting more heavily but if I wait and refresh enough times, or change circuits enough times, it tends to work
in reply to nikqwxq550

I would never install Tor via the flatpak or whatever. Just download from the website, run ./start-tor-whatever.sh and in the browser, check for updates. It's the official source.
This entry was edited (1 month ago)
in reply to LoudWaterHombre

It sounds like most other users install it that way too. Which surprises me, since I had thought the Linux community had started to move towards Flatpaks. But anybody who searched Flathub for Tor Browser, would have seen the flatpak with the Tor Project author listed as verified, and there would be no indication that this was in fact an unstable installation.
in reply to nikqwxq550

So the notification that is in the browser that directs you to update it wasn't enough? Because that totally works with the flatpak version of tor, because all the flatpak version of tor does is download a copy of the browser to your home directory and run it. There's a little notification dot on the hamburger menu of tor that directs you to the about page where you can download and update.

Because that's what I've been doing.

This entry was edited (1 month ago)
in reply to TheChickenOfDoom

Afaik the notification was suppressed, see the linked github issue in the post, or this one. I can guarantee the notification wasn't there on my end or else I would have noticed it
This entry was edited (1 month ago)