Package: tor Version: 0.4.9.8-dev-20260519T181348Z-1~d14.forky+1 Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 5908 Depends: libc6 (>= 2.38), libcap2 (>= 1:2.10), libevent-2.1-7t64 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libssl3t64 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.5), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.9.8-dev-20260519T181348Z-1~d14.forky+1_arm64.deb Size: 1978724 SHA256: 17201898a25db54ed43802d68b9491205e70a9333e1773ff7364fb583e9c1945 SHA1: 3ac09bf4ab1b9cbf0d39221af41c049e522455d3 MD5sum: 76cb0ab5eb1a6a5e6d3e81d433c33d8d Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.9.8-dev-20260519T181348Z-1~d14.forky+1 Auto-Built-Package: debug-symbols Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 10531 Depends: tor (= 0.4.9.8-dev-20260519T181348Z-1~d14.forky+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.9.8-dev-20260519T181348Z-1~d14.forky+1_arm64.deb Size: 5475448 SHA256: 574d757b1f415487a00879a61c76f2af84935c3df1bd36b64de36ee63e0de902 SHA1: 9a61ade8212399e72e34a64e4cf2c6f98d9eeb08 MD5sum: 6f718178172c5f75fa8ded2d1dd22db0 Description: debug symbols for tor Build-Ids: 184ccf1cbcb25efdca3ec0c9f519af101247a323 23c7d56446b4279b5f992e338d92302d39a2bbd6 2bd10db72600944c333e70d7ae4769e2fd409c3f bd43522ca207043f011c6b5fd1995eb5e003df3b Package: tor-geoipdb Source: tor Version: 0.4.9.8-dev-20260519T181348Z-1~d14.forky+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 26437 Depends: tor (>= 0.4.9.8-dev-20260519T181348Z-1~d14.forky+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.9.8-dev-20260519T181348Z-1~d14.forky+1_all.deb Size: 2762732 SHA256: 13e958cfa8e1efb3ed7e4da7ddccf7dcf8a7f85d28425663d2e01e238b80476d SHA1: 42a25d0dae097826ab0b3c56254565793b6d1eb8 MD5sum: 653c5428e3d9a44d3e853e4d7be0e66b Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.