{"id":16989,"date":"2018-10-24T14:14:57","date_gmt":"2018-10-24T14:14:57","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29445\/Mozilla-Will-Match-All-Donations-To-The-Tor-Project.html"},"modified":"2018-10-24T14:14:57","modified_gmt":"2018-10-24T14:14:57","slug":"mozilla-will-match-all-donations-to-the-tor-project","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/","title":{"rendered":"Mozilla Will Match All Donations To The Tor Project"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2018\/10\/24\/a6223657-a396-4661-857b-604f7927f8d5\/ae15845e6eb12e3c61db3e1173bb6f05\/tor.png\" class=\"\" alt=\"tor.png\"\/><\/span><span class=\"credit\">Image: Tor Project<\/span><\/p>\n<p>Mozilla will be matching all donations made to the Tor Project until the end of the year, the Tor Project announced today.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>The <a href=\"https:\/\/blog.torproject.org\/strength-numbers-double-your-donation-mozillas-match\" target=\"_blank\" rel=\"noopener noreferrer\">announcement<\/a> came as the Tor Project launched this week its scheduled end-of-year <a href=\"https:\/\/donate.torproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">donations campaign<\/a> through which the organization supplements its next year&#8217;s budget.<\/p>\n<p>This is the second year in a row that Mozilla has agreed to match Tor Project donations. <a href=\"https:\/\/twitter.com\/torproject\/status\/946895511306620928\" target=\"_blank\" rel=\"noopener noreferrer\">Last year<\/a>, the Tor Project raised $200,000 from user donations, and with Mozilla&#8217;s contribution, that number went to $400,000.<\/p>\n<p>With last year&#8217;s funds, the Tor Project was able to fund a <a href=\"https:\/\/www.zdnet.com\/article\/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine\/\" target=\"_blank\">huge facelift of the Tor Browser for Desktop<\/a>, but also release a <a href=\"https:\/\/www.zdnet.com\/article\/tor-project-releases-first-alpha-of-android-mobile-browser\/\" target=\"_blank\">dedicated Tor Browser for Android<\/a>.<\/p>\n<p>With funds that it will gather this year, the Tor Project promised today to:<\/p>\n<ul>\n<li>Increase the capacity, modularization, and scalability of the Tor network, making improvements and integrations into other privacy and circumvention tools easier and more reliable;<\/li>\n<li>Better test for, measure, and design solutions around internet censorship, allowing people around the world living under repressive governments to access the open web safely and privately; and<\/li>\n<li>Strengthen our development of Tor Browser for Android, now in alpha, and make sure it&#8217;s in tip top shape to reach the rising number of people around the world who only access the internet from a mobile device which may have low bandwidth and a costly connection.<\/li>\n<\/ul>\n<h3>Mozilla and Tor Project are tied at the hip<\/h3>\n<p>The Tor and Mozilla organizations are deeply interconnected. While most people already know that the Tor Browser is a privacy-hardened version of Mozilla&#8217;s Firefox browser working on the Tor Project&#8217;s Tor and Onion protocols, the connection goes both ways, and Firefox is also hugely dependent on the Tor Browser as well.<\/p>\n<p>Since 2016, Mozilla developers have been siphoning privacy-hardening features developed originally for the Tor Browser and integrating them into Firefox, as part of an internal project named <a href=\"https:\/\/wiki.mozilla.org\/Security\/Tor_Uplift\" target=\"_blank\" rel=\"noopener noreferrer\">Tor Uplift<\/a>.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>For example, the Tracking Protection feature that Mozilla enabled for all users yesterday, <a href=\"https:\/\/www.zdnet.com\/article\/firefox-63-released-with-always-on-tracking-protection\/\" target=\"_blank\">with the release of Firefox 63<\/a>, was actually initially based on a list of known user fingerprinting domains that the Tor Project was maintaining to block inside the Tor Browser. Mozilla integrated that list <a href=\"https:\/\/www.ghacks.net\/2016\/07\/18\/firefox-48-blocklist-against-plugin-fingerprinting\/\" target=\"_blank\" rel=\"noopener noreferrer\">into Firefox 48<\/a>, and later developed into the more complex <a href=\"https:\/\/blog.mozilla.org\/futurereleases\/2018\/10\/23\/the-path-to-enhanced-tracking-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Enhanced Tracking Protection feature<\/a> that it launched yesterday.<\/p>\n<p>But that was only the beginning. Another Tor Browser feature landed in Firefox 52, with the addition of a second anti-fingerprinting technique that prevented websites from identifying users ba<a href=\"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1121643\" target=\"_blank\" rel=\"noopener noreferrer\">sed on their OS fonts<\/a>.<\/p>\n<p>This process later continued in Firefox 55 when Mozilla added a Tor Browser feature known as <a href=\"https:\/\/www.bleepingcomputer.com\/news\/software\/another-tor-browser-feature-makes-it-into-firefox-first-party-isolation\/\" target=\"_blank\" rel=\"noopener noreferrer\">First-Party Isolation (FPI)<\/a>, which worked by separating cookies on a per-domain basis, preventing ad trackers from using cookies to track users across the Internet.<\/p>\n<p>Another Tor Browser feature was also added in Firefox 58. Just like in Firefox 52, Mozilla engineers integrated another Tor Browser anti-fingerprinting technique, but this time one that prevented websites from tracking users <a href=\"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=967895\" target=\"_blank\" rel=\"noopener noreferrer\">via the HTML5 canvas element<\/a>.<\/p>\n<p>The connection between the two projects was more than visible again in Firefox 60, which included a feature developed at the request of the Tor Project, whose developers wanted a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/software\/mozilla-will-let-users-disable-firefox-sync-starting-with-firefox-60\/\" target=\"_blank\" rel=\"noopener noreferrer\">simple method to disable Firefox Sync<\/a> in their browser, to prevent users from accidentally syncing Tor browsing data to Mozilla&#8217;s servers.<\/p>\n<p>It&#8217;s for these reasons that Mozilla has matched Tor Project donations in 2017 and 2018, and will most likely continue to do so in the foreseeable future.<\/p>\n<p>Upcoming Tor Uplift plans <a href=\"https:\/\/wiki.mozilla.org\/Security\/Tor_Uplift\/Tracking\" target=\"_blank\" rel=\"noopener noreferrer\">include<\/a> Mozilla engineers adding support in Firefox for blocking sites from fingerprinting users via VP8 and VP9 codecs, via the AudioContext API, and support for preventing Firefox from loading user details (username, emails, real names) into the operating system RAM.<\/p>\n<h3>More browser coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29445\/Mozilla-Will-Match-All-Donations-To-The-Tor-Project.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16990,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[4215],"class_list":["post-16989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacymozillafirefoxcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mozilla Will Match All Donations To The Tor Project 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mozilla Will Match All Donations To The Tor Project 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-24T14:14:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/mozilla-will-match-all-donations-to-the-tor-project.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mozilla Will Match All Donations To The Tor Project\",\"datePublished\":\"2018-10-24T14:14:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/mozilla-will-match-all-donations-to-the-tor-project.png\",\"keywords\":[\"headline,privacy,mozilla,firefox,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/\",\"name\":\"Mozilla Will Match All Donations To The Tor Project 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/mozilla-will-match-all-donations-to-the-tor-project.png\",\"datePublished\":\"2018-10-24T14:14:57+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/mozilla-will-match-all-donations-to-the-tor-project.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/mozilla-will-match-all-donations-to-the-tor-project.png\",\"width\":820,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-will-match-all-donations-to-the-tor-project\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,mozilla,firefox,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacymozillafirefoxcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mozilla Will Match All Donations To The Tor Project\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mozilla Will Match All Donations To The Tor Project 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/","og_locale":"en_US","og_type":"article","og_title":"Mozilla Will Match All Donations To The Tor Project 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-24T14:14:57+00:00","og_image":[{"width":820,"height":425,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/mozilla-will-match-all-donations-to-the-tor-project.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mozilla Will Match All Donations To The Tor Project","datePublished":"2018-10-24T14:14:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/"},"wordCount":628,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/mozilla-will-match-all-donations-to-the-tor-project.png","keywords":["headline,privacy,mozilla,firefox,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/","url":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/","name":"Mozilla Will Match All Donations To The Tor Project 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/mozilla-will-match-all-donations-to-the-tor-project.png","datePublished":"2018-10-24T14:14:57+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/mozilla-will-match-all-donations-to-the-tor-project.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/mozilla-will-match-all-donations-to-the-tor-project.png","width":820,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-will-match-all-donations-to-the-tor-project\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,mozilla,firefox,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacymozillafirefoxcryptography\/"},{"@type":"ListItem","position":3,"name":"Mozilla Will Match All Donations To The Tor Project"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16989"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16989\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16990"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}