Package: tor Version: 0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1 Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 5911 Depends: libc6 (>= 2.34), libcap2 (>= 1:2.10), libevent-2.1-7 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libssl3 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.2), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1_arm64.deb Size: 1995424 SHA256: a3107b2bbe4dc293267479115415f6454d02a3af0075328791e764dcba54569e SHA1: 80053e7b968b71640e2af554eab0b95092b93bf7 MD5sum: e9b83b7da1e9e526361b912d0333219f Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1 Auto-Built-Package: debug-symbols Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 6046 Depends: tor (= 0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1_arm64.deb Size: 5555180 SHA256: dfeea684a9714d73066c9112b83137fff909d854ecc21a6705fbec01367b9cb2 SHA1: 9da7aeacf0610756135a6d1541c0d3ab2181346e MD5sum: b2657a742e9cb4b940408e2c7f43f8df Description: debug symbols for tor Build-Ids: 4aec1ff20c9f1c4b9e08fbdf14b53f51cb830146 5124621af6575fb795a081eb45e2f3c361b736ad b77454a55f3e52e83fc2ea7ec90efda7edbbc3e7 f05b7295fd6141623704d30f27fc113e001b7e59 Package: tor-geoipdb Source: tor Version: 0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 26440 Depends: tor (>= 0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.9.8-dev-20260521T181401Z-1~d12.bookworm+1_all.deb Size: 2768516 SHA256: e71d507eaa230cbd9ac74976ba520f471f345d4e18c269ee58e2eca71717fc5c SHA1: dbb7f7297c1c13b3ea2dde4eba380eadf73c8ae7 MD5sum: 56fe3658279343639600eafee28e878c Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.