Package: tor
Version: 0.3.0.8-1
Architecture: amd64
Maintainer: Peter Palfrader <weasel@debian.org>
Installed-Size: 4242
Depends: libc6 (>= 2.17), libevent-2.0-5 (>= 2.0.10-stable), libseccomp2 (>= 0.0.0~20120605), libssl1.1 (>= 1.1.0), libsystemd0, zlib1g (>= 1:1.1.4), adduser, init-system-helpers (>= 1.18~), lsb-base
Recommends: logrotate, tor-geoipdb, torsocks
Suggests: mixmaster, torbrowser-launcher, socat, tor-arm, apparmor-utils, obfsproxy, obfs4proxy
Conflicts: libssl0.9.8 (<< 0.9.8g-9)
Homepage: https://www.torproject.org/
Priority: optional
Section: net
Filename: pool/main/t/tor/tor_0.3.0.8-1_amd64.deb
Size: 1527326
SHA256: 565226c4ee6508294ec9bf1f2786d1fb11c66ee41e582b4d894e0053db138035
SHA1: 17729b83d9b3c8111257b8b9f1d6af4d319bbbd7
MD5sum: 9ce07863da068c1cc4cd7882e646d209
Description: anonymizing overlay network for TCP
 Tor is a connection-based low-latency anonymous communication system.
 .
 Clients choose a source-routed path through a set of relays, and
 negotiate a "virtual circuit" through the network, in which each relay
 knows its predecessor and successor, but no others. Traffic flowing
 down the circuit is decrypted at each relay, which reveals the
 downstream relay.
 .
 Basically, Tor provides a distributed network of relays. Users bounce
 their TCP streams (web traffic, ftp, ssh, etc) around the relays, and
 recipients, observers, and even the relays themselves have difficulty
 learning which users connected to which destinations.
 .
 This package enables only a Tor client by default, but it can also be
 configured as a relay and/or a hidden service easily.
 .
 Client applications can use the Tor network by connecting to the local
 socks proxy interface provided by your Tor instance. If the application
 itself does not come with socks support, you can use a socks client
 such as torsocks.
 .
 Note that Tor does no protocol cleaning on application traffic. There
 is a danger that application protocols and associated programs can be
 induced to reveal information about the user. Tor depends on Torbutton
 and similar protocol cleaners to solve this problem. For best
 protection when web surfing, the Tor Project recommends that you use
 the Tor Browser Bundle, a standalone tarball that includes static
 builds of Tor, Torbutton, and a modified Firefox that is patched to fix
 a variety of privacy bugs.

Package: tor-dbg
Source: tor
Version: 0.3.0.8-1
Architecture: amd64
Maintainer: Peter Palfrader <weasel@debian.org>
Installed-Size: 3533
Depends: tor (= 0.3.0.8-1)
Suggests: gdb
Homepage: https://www.torproject.org/
Priority: extra
Section: debug
Filename: pool/main/t/tor/tor-dbg_0.3.0.8-1_amd64.deb
Size: 3174346
SHA256: accde9a3c3b351065d37c94d67acc88458b6b1078760782e695d8207b715c454
SHA1: 721576cd195e467568c17c12ca76eb54deb2c949
MD5sum: d32d4c2c6a4b87ae0477024984d119ed
Description: debugging symbols for Tor
 This package provides the debugging symbols for Tor, The Onion Router.
 Those symbols allow your debugger to assign names to your backtraces, which
 makes it somewhat easier to interpret core dumps.
Build-Ids: c56180e6f38de694c0d583f0c7ade19160e76a6c d1bcb0cffa057ebf7b8eda9656bd6a39830e8359 ef03e43cd532f658f5d035a182412f700ac1073c

Package: tor-geoipdb
Source: tor
Version: 0.3.0.8-1
Architecture: all
Maintainer: Peter Palfrader <weasel@debian.org>
Installed-Size: 5853
Depends: tor (>= 0.3.0.8-1)
Breaks: tor (<< 0.2.4.8)
Replaces: tor (<< 0.2.4.8)
Homepage: https://www.torproject.org/
Priority: extra
Section: net
Filename: pool/main/t/tor/tor-geoipdb_0.3.0.8-1_all.deb
Size: 1089410
SHA256: 2437d5a697e963b18922b14a3e26de275ede88714db32168a9a0200d03da32a7
SHA1: 9667bbb0489bf1b03c7aa0275a657ae8a5cb8453
MD5sum: 8da5a25f7a1e1af7c87cadfb15d555c1
Description: GeoIP database for Tor
 This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses
 to countries.
 .
 Bridge relays (special Tor relays that aren't listed in the main Tor
 directory) use this information to report which countries they see
 connections from.  These statistics enable the Tor network operators to
 learn when certain countries start blocking access to bridges.
 .
 Clients can also use this to learn what country each relay is in, so
 Tor controllers like arm or Vidalia can use it, or if they want to
 configure path selection preferences.