We disabled a number of “weaker” cyphers in TB12, about a year ago (some may have already been disabled). These cyphers combined accounted for approx 1% (from moz telemetry - 1% of total handshakes I guess, not traffic or sites). We then had to lock them, because after the TB12 release, we found numerous examples of users being told in forums/reddit/etc to change them to access the odd site.
@PieroV might be able to add more, but introducing weakness (downgrade attacks) for the sake of the occasional odd site, compromises the security of the other 99%, so this is unlikely not going to change, especially given that this is now established and accepted (anecdotally, yours is the first complaint I’ve seen in about a year), and the number of these cyphers in the wild is dwindling over time.
We do not recommend using outdated and unsupported browser releases. IDK the last version and I’m not going to check (not even sure which cipher is involved)
I’m sure you do not recommend using outdated and unsupported browser releases, but you forgot about those users who use Tor Browser just as ordinary web browser with high privacy and security and ability to surf blocked resources. And I am one of them. And those users are definitely MORE than 1% from mozilla’s telemetry. MUCH more. Might be those users are MOST. Please, think of it!
Read the reply again. I am giving you options to use the “weak” https protocol which Tor does not allow and an option to come out of a VPN node from various countries. I never suggested using http.