This release fixes the security vulnerability in the JavaScript engine of *Firefox* and *Tor Browser* announced on [[May 24|security/prototype_pollution]].
This release was delayed from May 31 to June 5 because of a delay in the release of *Tor Browser* [11.0.14](https://blog.torproject.org/new-release-tor-browser-11014/).
Tails learns the current time by connecting to the captive portal detection service of [Fedora](https://getfedora.org/), which is used by most Linux distributions. This connection does not go through the Tor network and is an exception to our policy of only making Internet connections through the Tor network.
<p>You can learn more about our security assessment of this time synchronization in our [[design documentation about non-Tor traffic|contribute/design/Tor_enforcement#non-tor-traffic]].</p>
We wrote a new homepage for the *Unsafe Browser* when you are not connected to the Tor network yet. This new version makes it easier to understand how to sign in to the network using a captive portal.