English Italian
[[!meta title="Tails 5.1 is out"]]
[[!meta date="Sat, 04 Jun 2022 18:00:00 +0000"]]
[[!pagetemplate template="news.tmpl"]]
[[!tag announce]]
This release fixes the security vulnerability in the JavaScript engine of *Firefox* and *Tor Browser* announced on [[May 24|security/prototype_pollution]].
This release was delayed from May 31 to June 5 because of a delay in the release of *Tor Browser* [11.0.14](https://blog.torproject.org/new-release-tor-browser-11014/).
<h1 id="changes">Changes and updates</h1>
Tor Connection assistant
Tails 5.1 includes many improvements to the Tor Connection assistant:
The *Tor Connection* assistant now automatically fixes the computer clock if you choose to connect to Tor automatically.
This makes is much easier for people in Asia to circumvent censorship.
Tails learns the current time by connecting to the captive portal detection
service of [Fedora](https://getfedora.org/), which is used by most Linux
distributions. This connection does not go through the Tor network and is an
exception to our policy of only making Internet connections through the Tor
network.
<div class="next">
<p>You can learn more about our security assessment of this time
synchronization in our [[design documentation about non-Tor
traffic|contribute/design/Tor_enforcement#non-tor-traffic]].</p>
</div>
The time displayed in the top navigation uses the time zone selected when fixing the clock in the *Tor Connection* assistant.
In the future, we will make it possible to change the displayed time zone for
everybody from the desktop ([[!tails_ticket 10819]]) and store it in the
Persistent Storage ([[!tails_ticket 12094]]).
The last screen of the *Tor Connection* assistant makes it clear whether you are connected using Tor bridges or not.
[[!img bridges.png link="no" alt="Connected to Tor successfully with bridges"]]
*Unsafe Browser* and captive portals