Package: tor Version: 0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1 Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 5603 Depends: libc6 (>= 2.34), libcap2 (>= 1:2.10), libevent-2.1-7 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl3 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.2), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1_amd64.deb Size: 1997448 SHA256: 40cc32a71d39917659e728373d176ef5f937508a30ce36006ba3f7a5fa06ae5f SHA1: 2947b5e03371b95deacfbfc0913b195e92e32c1b MD5sum: 7628574599ef4cfd15b85d86bcbdf83f Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1 Auto-Built-Package: debug-symbols Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 5961 Depends: tor (= 0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1_amd64.deb Size: 5550652 SHA256: e16bb4b38092f7a2963944ce861189e59200d9202e15560440edfd05a52a0e07 SHA1: b3a45eccb4fcf7bb143ff52e93f21c5a6a7cae46 MD5sum: 955f7748c09ddb68d0f4f5d4ef5cb122 Description: debug symbols for tor Build-Ids: 1e0b61cb6d75b0e74e8c80f184c973c21cf5831c 9d76d6772439512b24c4dd758742cbb996069493 a3edc3e70decd94c9e528f9f82d1d6560dbbe225 c7e907e1a909dd77d4f08d9d9ac5fd6d63c2552a Package: tor-geoipdb Source: tor Version: 0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 11181 Depends: tor (>= 0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.7.16-dev-20240913T060409Z-1~d12.bookworm+1_all.deb Size: 1549716 SHA256: b3977f531c1c20153c0d4942add57d278464422983c948651284df156a726e3c SHA1: 96a70248ac9bb78f7299f9a97c3746283f21acab MD5sum: c2b9a200ba2214ef6842d4d822590924 Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.