Package: tor Version: 0.4.8.23-dev-20260407T153407Z-1~d14.forky+1 Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 5894 Depends: libc6 (>= 2.38), libcap2 (>= 1:2.10), libevent-2.1-7t64 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libssl3t64 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.5), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.8.23-dev-20260407T153407Z-1~d14.forky+1_arm64.deb Size: 1957600 SHA256: 3e5e217d28fb9580e5f903e84a8fd09cedd3e833abebdda8dba635889fc1939c SHA1: 8da72b920a101b0492a40175b64e2b8a8864d77c MD5sum: dc9e5da08daa4ce44d88de9bfc45e4af Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.8.23-dev-20260407T153407Z-1~d14.forky+1 Auto-Built-Package: debug-symbols Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 10382 Depends: tor (= 0.4.8.23-dev-20260407T153407Z-1~d14.forky+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.8.23-dev-20260407T153407Z-1~d14.forky+1_arm64.deb Size: 5401560 SHA256: ed9bad0cde7e8aea719be4af36ae837dd0b73a3fe44ad90b19ab876f903e24ac SHA1: eb69ab12a1174cc05b5c3e1c5679036edd4b3fe0 MD5sum: 7c84e56e5546dc764f78d083625da4bc Description: debug symbols for tor Build-Ids: 2075dc8135100f9a415e7b3d10ba9a8c8bb9c3a9 5a25e832bd6a1d8e26dd91cd923fee420f620862 862c53f0a909cbd3a2eb0b8bc2d95c397cc16d7a ef65b4b8ab7d8a7176d1357e12b2706b54b3a918 Package: tor-geoipdb Source: tor Version: 0.4.8.23-dev-20260407T153407Z-1~d14.forky+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 25115 Depends: tor (>= 0.4.8.23-dev-20260407T153407Z-1~d14.forky+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.8.23-dev-20260407T153407Z-1~d14.forky+1_all.deb Size: 2705704 SHA256: a8e4915bcae8f46161fa0f253202017fb687de1f8eff320b51e689259da4f880 SHA1: b4f3758db878aed597cff0ccb00f45a0253838ca MD5sum: fe0593f91123cb34a55bcc26b4c1c873 Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.