Package: tor Version: 0.2.4.21-1+tails1~d70.wheezy+1 Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 2798 Pre-Depends: dpkg (>= 1.15.7.2) Depends: libc6 (>= 2.10), libevent-2.0-5 (>= 2.0.10-stable), libssl1.0.0 (>= 1.0.1), zlib1g (>= 1:1.1.4), adduser, lsb-base Recommends: logrotate, tor-geoipdb, torsocks Suggests: mixmaster, xul-ext-torbutton, socat, tor-arm, polipo (>= 1) | privoxy, apparmor-utils Conflicts: libssl0.9.8 (<< 0.9.8g-9) Homepage: https://www.torproject.org/ Priority: optional Section: net Filename: pool/main/t/tor/tor_0.2.4.21-1+tails1~d70.wheezy+1_i386.deb Size: 1305288 SHA256: 13871a9fb5457d0c4c8fb44534dc5f92578d08486e42a94c1f7345520d9ae977 SHA1: a2d70e87a8c395dc4555f2bfd9a3a6041a1538c5 MD5sum: 6c33738b1c2140b2f64a9b6fec19c7bb Description: anonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs. Package: tor-dbg Source: tor Version: 0.2.4.21-1+tails1~d70.wheezy+1 Architecture: i386 Maintainer: Peter Palfrader Installed-Size: 4940 Depends: tor (= 0.2.4.21-1+tails1~d70.wheezy+1) Suggests: gdb Homepage: https://www.torproject.org/ Priority: extra Section: debug Filename: pool/main/t/tor/tor-dbg_0.2.4.21-1+tails1~d70.wheezy+1_i386.deb Size: 2162660 SHA256: 178083f1cc854eaaf5e92ba38e484cbe8a52182cce1185f076b1487a22bf6587 SHA1: b06bf8ea9b6f59b946f05ec711fd6f9ae2fa948d MD5sum: 9849a6a028329d1770e1d3c689548d94 Description: debugging symbols for Tor This package provides the debugging symbols for Tor, The Onion Router. Those symbols allow your debugger to assign names to your backtraces, which makes it somewhat easier to interpret core dumps. Package: tor-geoipdb Source: tor Version: 0.2.4.21-1+tails1~d70.wheezy+1 Architecture: all Maintainer: Peter Palfrader Installed-Size: 3188 Depends: tor (>= 0.2.4.21-1+tails1~d70.wheezy+1) Breaks: tor (<< 0.2.4.8) Replaces: tor (<< 0.2.4.8) Homepage: https://www.torproject.org/ Priority: extra Section: net Filename: pool/main/t/tor/tor-geoipdb_0.2.4.21-1+tails1~d70.wheezy+1_all.deb Size: 1002346 SHA256: ef056656215a2cea41e0dd4bd3ba4ee0c442ed690a9c125e64208aa3abd35d5b SHA1: 08ff60c78cc5e2a4ba907cdaaa52a07c56c7216a MD5sum: 26cf7e4791086a14f81f67d0f594b96a Description: GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.