Package: i2p Version: 0.9.23-2~deb8u+1 Architecture: all Bugs: mailto:killyourtv@i2pmail.org Maintainer: Kill Your TV Installed-Size: 126 Depends: adduser, debconf, i2p-router (>= 0.8.6-5), libjbigi-jni, lsb-base, service-wrapper Homepage: https://geti2p.net Priority: optional Section: net Filename: pool/main/i/i2p/i2p_0.9.23-2~deb8u+1_all.deb Size: 36788 SHA256: 4179f5ffcbfe72a93e0ed8bf4a5f2d8dcdddfbfd34bbf7b1f209aef04dc14ab7 SHA1: 8c0fe5c04b16dc6b0f49908d563da67d902b916f MD5sum: 9a3b6f91a2d81f84cdf70f0d5e0d2480 Description: Load-balanced unspoofable packet switching network I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. . This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon. Package: i2p-router Source: i2p Version: 0.9.23-2~deb8u+1 Architecture: all Bugs: mailto:killyourtv@i2pmail.org Maintainer: Kill Your TV Installed-Size: 14715 Depends: openjdk-8-jre-headless | openjdk-7-jre-headless | openjdk-6-jre-headless | default-jre-headless | java8-runtime-headless | java7-runtime-headless | java6-runtime-headless, libecj-java Recommends: libjbigi-jni, ttf-dejavu Suggests: tor, apparmor, i2p-messenger, i2phex, i2p-tahoe-lafs, imule, irc-client, itoopie, mail-client, mail-reader, news-reader, polipo, privoxy, robert, syndie, www-browser, xul-ext-torbutton Breaks: i2p (<< 0.8.6-5) Replaces: i2p (<< 0.8.6-5) Homepage: https://geti2p.net Priority: optional Section: net Filename: pool/main/i/i2p/i2p-router_0.9.23-2~deb8u+1_all.deb Size: 10945008 SHA256: 931f31e7a238efce401e328234ebc8007476c714315eacaa0423d59edaa942bb SHA1: 8181e5e385c8a9ceb8642918d71489386b4c55ed MD5sum: c4e73a67a324c855ab90adea3c991bdf Description: Load-balanced unspoofable packet switching network I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. . TrueType fonts (such as those provided in the package ttf-dejavu) are required in order to generate graphs.