Package: tor Version: 0.3.5.18-dev-20220215T080433Z-1~d10.buster+1 Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 5083 Depends: libc6 (>= 2.25), libcap2 (>= 1:2.10), libevent-2.1-6 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl1.1 (>= 1.1.1), libsystemd0, libzstd1 (>= 1.3.2), zlib1g (>= 1:1.1.4), adduser, lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, tor-arm, apparmor-utils, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.3.5.18-dev-20220215T080433Z-1~d10.buster+1_amd64.deb Size: 1809424 SHA256: 6858d39633a91a0d3634fe7af23bcb1ec30170d33e74f810d7664c60d723c6cc SHA1: 47db45f9a155d0301d05506d2d4a8d698a3366c8 MD5sum: 900af678d90b66b5f73e15db6ed4b57d Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.3.5.18-dev-20220215T080433Z-1~d10.buster+1 Auto-Built-Package: debug-symbols Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 5312 Depends: tor (= 0.3.5.18-dev-20220215T080433Z-1~d10.buster+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.3.5.18-dev-20220215T080433Z-1~d10.buster+1_amd64.deb Size: 4869848 SHA256: a8c2077324070ff701caaf664f1cdce93bfa8cdb5e7125a7cf1899c9e63c9af2 SHA1: b5b66b3fc6cd2228aee4d4fe7a9c97f7cea477a0 MD5sum: f2b3e2228826aeaaab260ea076eb32b1 Description: debug symbols for tor Build-Ids: 01933d7947b0f6c5190aed5bf876840d62accb1a 03fba1797599d0c2e2253b99c669e9be36acf207 895c279bbc8cf16fbfe340af41fdf4528c0e6fb4 9fe41bc683efc386c1420a74c5fa100d8758cf82 Package: tor-geoipdb Source: tor Version: 0.3.5.18-dev-20220215T080433Z-1~d10.buster+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 9767 Depends: tor (>= 0.3.5.18-dev-20220215T080433Z-1~d10.buster+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: extra Section: net Filename: pool/main/t/tor/tor-geoipdb_0.3.5.18-dev-20220215T080433Z-1~d10.buster+1_all.deb Size: 1369712 SHA256: b2984e7e7c514dbe745bae5bfca1ceb052cf707cd17b7963d268d61480a2a7f2 SHA1: d6d3f78246b1b2c9ea3736e2a038a56101f3422f MD5sum: e9ba7a7a09d8088896038ffeaff52a08 Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.