Package: tor Version: 0.4.7.6-rc-1~d12.bookworm+1 Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 6083 Depends: libc6 (>= 2.33), libcap2 (>= 1:2.10), libevent-2.1-7 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl1.1 (>= 1.1.1), libsystemd0, libzstd1 (>= 1.5.2), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.10.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-36~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.7.6-rc-1~d12.bookworm+1_i386.deb Size: 2094364 SHA256: 41d2a94da92be1880d0be188e0979b6031f4a5be51bc1550440fa32c0564fc6a SHA1: 0c9ff91371426a6ab14115b53c44f8015127e9b2 MD5sum: e642ba16bdb8c24722ae08888582d927 Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.7.6-rc-1~d12.bookworm+1 Auto-Built-Package: debug-symbols Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 4918 Depends: tor (= 0.4.7.6-rc-1~d12.bookworm+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.7.6-rc-1~d12.bookworm+1_i386.deb Size: 4582188 SHA256: 77c73c7db9c34a9525335865840fd972592043ac807a706e45526f365c94c01b SHA1: b13104248afe7d3b245f10ea6dddc988e648aa59 MD5sum: 1f4c4c7a0cbac9f9cfca1fabb9f2a90e Description: debug symbols for tor Build-Ids: 1e85a88f5fddf43e56e9ddb38e2e77d573a01889 4043153de38ce9cf830762019f6724c0f25e3a79 55bb32099cc635684e79966608394b5bc0095e09 94e545768bc5e4d9f067d1dc47de47263b0812c4 Package: tor-geoipdb Source: tor Version: 0.4.7.6-rc-1~d12.bookworm+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 10018 Depends: tor (>= 0.4.7.6-rc-1~d12.bookworm+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.7.6-rc-1~d12.bookworm+1_all.deb Size: 1460000 SHA256: bffa24221d8b24aa9ce5dfe660f59e5c24612d6e727b0560358d2ebc2d762fdb SHA1: eb85d1eaf54e3e9062a0994d907e3d30ba738969 MD5sum: 2cb6c1f0b4733ef2bfd4575f23696b4e Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.