Package: i2p Version: 0.9.8.1-deb6u1 Architecture: all Bugs: mailto:killyourtv@i2pmail.org Maintainer: Kill Your TV Installed-Size: 176 Depends: debconf (>= 0.5) | debconf-2.0, i2p-router (>= 0.8.6-5), adduser, libjbigi-jni, lsb-base, service-wrapper Homepage: http://www.i2p2.de/ Priority: optional Section: net Filename: pool/main/i/i2p/i2p_0.9.8.1-deb6u1_all.deb Size: 28218 SHA256: 1611534ed6180a74a4b40f6d20f2d38a0ce446ed700723cee7544f68cb9056e8 SHA1: 8ec4014bf50564a6582f6d32993b9b0c662f645c MD5sum: be11a74575472f8953899545374a15f2 Description: Load-balanced unspoofable packet switching network I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. . This package depends on the router, jbigi, the java service wrapper, and includes support to run I2P as a daemon. Package: i2p-router Source: i2p Version: 0.9.8.1-deb6u1 Architecture: all Bugs: mailto:killyourtv@i2pmail.org Maintainer: Kill Your TV Installed-Size: 14468 Depends: openjdk-6-jre-headless | openjdk-7-jre-headless | default-jre-headless | java5-runtime-headless | java6-runtime-headless, libecj-java Recommends: libjbigi-jni (>= 0.9.8.1-deb6u1), libjbigi-jni (<< 0.9.8.1-deb6u1.1~), ttf-dejavu Suggests: tor, i2p-messenger, i2phex, i2p-tahoe-lafs, imule, i2pfox, irc-client, itoopie, jircii, mail-client, mail-reader, news-reader, polipo, privoxy, robert, syndie, www-browser, xul-ext-torbutton Breaks: i2p (<< 0.8.6-5) Replaces: i2p (<< 0.8.6-5) Homepage: http://www.i2p2.de/ Priority: optional Section: net Filename: pool/main/i/i2p/i2p-router_0.9.8.1-deb6u1_all.deb Size: 9624612 SHA256: 6bf5076cae2ef610cdd5cc00ddb307d4a27ea2bf870748c30e9cdc9d77106310 SHA1: ae32a76af6dac32983c2d10d789aa6780daf2571 MD5sum: 055ce54e282fb90dc57d145a98970179 Description: Load-balanced unspoofable packet switching network I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. . TrueType fonts (such as those provided in the package ttf-dejavu) are required in order to generate graphs. Package: libjbigi-jni Source: i2p Version: 0.9.8.1-deb6u1 Architecture: i386 Bugs: mailto:killyourtv@i2pmail.org Maintainer: Kill Your TV Installed-Size: 48 Depends: i2p-router, libc6 (>= 2.1.3), libgmp3c2 Homepage: http://www.i2p2.de/jbigi Priority: optional Section: java Filename: pool/main/i/i2p/libjbigi-jni_0.9.8.1-deb6u1_i386.deb Size: 4132 SHA256: ced5d4305d5acaf52dde6cf88ec54c299ca542b8d1808d5be13a47795d2682cd SHA1: ea0cb71b9fd0a9ea9866f674a33c696e88eca815 MD5sum: febf1d70e530ab20852c06d492ea8166 Description: Java Big Integer library This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid). . libjbigi is a math library that is part of the I2P installation. Use of this library greatly enhances the efficiency of cryptographic algorithms, such as the ones used by I2P. You can expect to see a 5-7x speed improvement on certain tasks, such as elGamal encryption/decryption.