Package: tor Version: 0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1 Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 5802 Depends: libc6 (>= 2.34), libcap2 (>= 1:2.10), libevent-2.1-7 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl3 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.2), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1_amd64.deb Size: 2063080 SHA256: 476e6e34482674a67d812b220888456bf1c2f1ba31b8b285109d80f00438b4c6 SHA1: 04d4c02b2a83f6d9c1e14c19cf7c83af8c5568aa MD5sum: dfeaa2576c06c03083e8b14b098a88af Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1 Auto-Built-Package: debug-symbols Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 6196 Depends: tor (= 0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1_amd64.deb Size: 5766732 SHA256: 6bb698b384c2c57dc1ab93c54e6031939fe8846887d0082d5f8b73e2df456612 SHA1: ab17cbc3faf300874a6bd43a18766831d805d46d MD5sum: b462fa854d079e73ff24a8030856bd71 Description: debug symbols for tor Build-Ids: 5ed517653dafa41a1a23247b2bed5ed4c1eddad3 9727569fc00b6ce4cf72dbcf6b931aeec72721ad 9a7b32e31f162828f135fe9e5e259129d3a6ab9e d9ce6c7ff9671ef7e3fdc4759ae8a25a2f6a5dba Package: tor-geoipdb Source: tor Version: 0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 25118 Depends: tor (>= 0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.8.23-dev-20260407T153407Z-1~d12.bookworm+1_all.deb Size: 2728420 SHA256: 0014f2dd294420207977b1d502a9f1344a165c1b7ba59abc6918c2c0af8a78f8 SHA1: fd724d599a1c990dc20caa0997138fae7d668753 MD5sum: 4c6251292aa6f47e25c9d0fe00a682ac Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.