Package: tor Version: 0.4.8.19-1~d13.trixie+1 Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 5815 Depends: libc6 (>= 2.38), libcap2 (>= 1:2.10), libevent-2.1-7t64 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl3t64 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.5), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Breaks: runit (<< 2.1.2-51~) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.4.8.19-1~d13.trixie+1_amd64.deb Size: 2059108 SHA256: b265b4c4aaa57a27b134a7dfb8ea8567b2feead6d094744ac57251f00b5f4bf9 SHA1: 81f8d0c48707cf075921bd0434c84d912ebea771 MD5sum: 9dbdff3e764a48f68c634a44261bb103 Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbgsym Source: tor Version: 0.4.8.19-1~d13.trixie+1 Auto-Built-Package: debug-symbols Architecture: amd64 Maintainer: Peter Palfrader Installed-Size: 7350 Depends: tor (= 0.4.8.19-1~d13.trixie+1) Breaks: tor-dbg (<< 0.3.1.5-alpha) Replaces: tor-dbg (<< 0.3.1.5-alpha) Priority: optional Section: debug Filename: pool/main/t/tor/tor-dbgsym_0.4.8.19-1~d13.trixie+1_amd64.deb Size: 5736220 SHA256: 4dd5efbcb6a7a10419ee3cb0009961464b26f7d4d7d9c34b87c9d2adf24fa2b9 SHA1: bb4b8bf22d1cab1669a7fbf851e503a48dfe8bfb MD5sum: 9331a125c68f3f9ad4dbf8b95af6b7b1 Description: debug symbols for tor Build-Ids: 4bff6c47c54a0eeb3c562afe8536d2f6ec26445b 83f765d6a163fa2433ecee455e4653e383853e26 c720e112b5fb5555bcaac173fa2feae739c8d24c ed59facd3a04b17360458d1919951d68460c9efa Package: tor-geoipdb Source: tor Version: 0.4.8.19-1~d13.trixie+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 21264 Depends: tor (>= 0.4.8.19-1~d13.trixie+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor-geoipdb_0.4.8.19-1~d13.trixie+1_all.deb Size: 2480052 SHA256: 42af36b43e3cabfb335bad927a8c7f6d0e61632814a1e3a941a8b1f144141534 SHA1: 91ed3ae920a27c7d36750f35baf464d71d42b246 MD5sum: 0224b8c493cf1d12670ffb7461f01134 Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.