Package: i2p Version: 0.9.22-1~deb7u+1 Architecture: all Bugs: mailto:killyourtv@i2pmail.org Maintainer: Kill Your TV Installed-Size: 123 Depends: adduser, debconf, i2p-router (>= 0.8.6-5), libjbigi-jni, lsb-base, service-wrapper Homepage: https://geti2p.net Priority: optional Section: net Filename: pool/main/i/i2p/i2p_0.9.22-1~deb7u+1_all.deb Size: 34494 SHA256: b0a582aec8a68793f2644c97946ceda0c05268c7805d5c6554c8b958733896a8 SHA1: 17b0857268f7ee3a6a3bebe6126b0897b18ecc6e MD5sum: bb167738174eed637d3681b688a00735 Description: Load-balanced unspoofable packet switching network I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. . This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon. Package: i2p-router Source: i2p Version: 0.9.22-1~deb7u+1 Architecture: all Bugs: mailto:killyourtv@i2pmail.org Maintainer: Kill Your TV Installed-Size: 14572 Depends: openjdk-8-jre-headless | openjdk-7-jre-headless | openjdk-6-jre-headless | default-jre-headless | java8-runtime-headless | java7-runtime-headless | java6-runtime-headless, libecj-java Recommends: libjbigi-jni, ttf-dejavu Suggests: tor, apparmor, i2p-messenger, i2phex, i2p-tahoe-lafs, imule, irc-client, itoopie, mail-client, mail-reader, news-reader, polipo, privoxy, robert, syndie, www-browser, xul-ext-torbutton Breaks: i2p (<< 0.8.6-5) Replaces: i2p (<< 0.8.6-5) Homepage: https://geti2p.net Priority: optional Section: net Filename: pool/main/i/i2p/i2p-router_0.9.22-1~deb7u+1_all.deb Size: 10870444 SHA256: 58a368723fefe52b5d95f866bd3d40a36e5893ce4ab18bee811d434b55ec6b17 SHA1: c7388c87734d0ea030602fc75058b2e7a071f8e3 MD5sum: 347f30d5ce5016357750549c73d0fbac Description: Load-balanced unspoofable packet switching network I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. . TrueType fonts (such as those provided in the package ttf-dejavu) are required in order to generate graphs.