Package: tor Version: 0.2.6.7-1~d70.wheezy+1+tails2 Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 3099 Pre-Depends: dpkg (>= 1.15.7.2) Depends: libc6 (>= 2.10), libevent-2.0-5 (>= 2.0.10-stable), libseccomp2 (>= 0.0.0~20120605), libssl1.0.0 (>= 1.0.1), zlib1g (>= 1:1.1.4), adduser, lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, torbrowser-launcher, socat, tor-arm, apparmor-utils, obfsproxy, obfs4proxy Conflicts: libssl0.9.8 (<< 0.9.8g-9) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.2.6.7-1~d70.wheezy+1+tails2_i386.deb Size: 1515498 SHA256: cdd017090d6115bdbe0811bbe7e21722d8001893f6bb3a2c9a6312a6d9bc55a5 SHA1: 0625decc71c6154e639ddbdc1e3cad5bd3415a1e MD5sum: f0f2aa5262c0e4d09e269b6284a1304d Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbg Source: tor Version: 0.2.6.7-1~d70.wheezy+1+tails2 Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 5157 Depends: tor (= 0.2.6.7-1~d70.wheezy+1+tails2) Suggests: gdb Homepage: https://www.torproject.org/ Priority: extra Section: debug Filename: pool/main/t/tor/tor-dbg_0.2.6.7-1~d70.wheezy+1+tails2_i386.deb Size: 2306198 SHA256: 9020bf8a80eb893d1fbfdc91c4b17f3f1fe82540715d5f3e1e73c1d79bb73496 SHA1: e028ec319e069a9602f99e2ce40e77f9153718d9 MD5sum: e24b7e4566026b1ca3623eeeb0b82ac4 Description: debugging symbols for Tor This package provides the debugging symbols for Tor, The Onion Router. Those symbols allow your debugger to assign names to your backtraces, which makes it somewhat easier to interpret core dumps. Package: tor-geoipdb Source: tor Version: 0.2.6.7-1~d70.wheezy+1+tails2 Architecture: all Maintainer: Peter Palfrader Installed-Size: 4060 Depends: tor (>= 0.2.6.7-1~d70.wheezy+1+tails2) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: extra Section: net Filename: pool/main/t/tor/tor-geoipdb_0.2.6.7-1~d70.wheezy+1+tails2_all.deb Size: 1240402 SHA256: e29da9e4e9f2d277db07cc54a5b3d8e64979ee3c5cc335609bad37f0158a7e55 SHA1: 2963e233c7f37663acf7526512ef961bfe6ff1b6 MD5sum: 5f1987b3fa1d86eba7267a4adab080b0 Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.