Package: tor Version: 0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1 Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 5976 Depends: libc6 (>= 2.38), libcap2 (>= 1:2.10), libevent-2.1-7t64 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libssl3t64 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.5), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1_arm64.deb Size: 2003048 SHA256: 907ac6833cdad910765c7aab4298bd84bb766cf4a00bbf34f7ac1711dc9eda6d SHA1: 47be0ef4ce391a456f5f25f9fa3a705a4c8dd12b MD5sum: d5672d114a15a1fe561f737c7bf38a86 Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1 Auto-Built-Package: debug-symbols Architecture: arm64 Maintainer: Peter Palfrader Installed-Size: 10561 Depends: tor (= 0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1_arm64.deb Size: 5494708 SHA256: 060032f5f5b367e534b871ed2f5e6fd59a96cbac94812616b95ce4c6f9d4e694 SHA1: 8257fc0cebb56e19213f59f6aaa1d822ae7a36ed MD5sum: bd1e5056426a7f00a8098949da42244a Description: debug symbols for tor Build-Ids: 376e837ca4f900af5570b64f74b7178cf1952550 55871d3859736ae3a83b5dd7476cb317b4f136aa 652ad9fb5d3e81ee1ca62299ad40c77e483bf7fc dac8f031e5408c629a0e1ae1af595b3908220764 Package: tor-geoipdb Source: tor Version: 0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 26440 Depends: tor (>= 0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.9.8-dev-20260521T181401Z-1~d13.trixie+1_all.deb Size: 2761896 SHA256: 1a1fb0ec0e6e1f75d9b8190c8cee2115ebffb2b72e8a0c674de425e152093ce5 SHA1: 1d25832bc9a8aadcbf34830dc1bdc9cf0844734d MD5sum: 42899540d64714244db9b8cc07ec5c94 Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.