Package: tor Version: 0.4.9.0-alpha-dev-20241116T020434Z-1 Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 6261 Depends: libc6 (>= 2.38), libcap2 (>= 1:2.10), libevent-2.1-7t64 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl3t64 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.5), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.9.0-alpha-dev-20241116T020434Z-1_i386.deb Size: 2135128 SHA256: 8798bfe543c7d547aba06b7533e9502b439261cf8ebc00288066bc6bd31649a8 SHA1: b4c575aca159493e4def72c33dd3dfa11088a6d9 MD5sum: 7624a70c088931c2c58c3f2b8859f5a0 Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.9.0-alpha-dev-20241116T020434Z-1 Auto-Built-Package: debug-symbols Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 5169 Depends: tor (= 0.4.9.0-alpha-dev-20241116T020434Z-1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.9.0-alpha-dev-20241116T020434Z-1_i386.deb Size: 4817352 SHA256: 1512a3f66049389f601e7b2b7a988039cbacec091e975a3feb4f34e6b7cc1534 SHA1: a72cbb52baeee13ad9b1c1783ddd4e58a6395806 MD5sum: 2187077eed102efc465756939fa7d839 Description: debug symbols for tor Build-Ids: 0ae0e06a08f0a381287a3c71804eebacc046a737 2bc2a3cd1f5c514ca595edf0340fa0ba025de54e 5e5ee4266d00014ba6cbabc2a8dfd45c1af50838 9f86b08e8d49b9e726a33fc5edf8b08b5d2d2fd4 Package: tor-geoipdb Source: tor Version: 0.4.9.0-alpha-dev-20241116T020434Z-1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 19565 Depends: tor (>= 0.4.9.0-alpha-dev-20241116T020434Z-1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.9.0-alpha-dev-20241116T020434Z-1_all.deb Size: 2409644 SHA256: 1f1df4c7ded23416a1cb395cca082a505e7d6ca04615d1425bc9fc10b8813ee5 SHA1: f28d1a177378f3508a450c1c639ec3930c573b60 MD5sum: 0f60f9ab392cf400d1f59564192a693d Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.