Guest User

Untitled

a guest
Mar 17th, 2018
257
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.40 KB | None | 0 0
  1. # apt-cache show tor
  2. Package: tor
  3. Version: 0.3.2.10-1~trusty+1
  4. Architecture: amd64
  5. Maintainer: Peter Palfrader <weasel@debian.org>
  6. Installed-Size: 4196
  7. Depends: libc6 (>= 2.17), libcap2 (>= 2.10), libevent-2.0-5 (>= 2.0.10-stable), libseccomp2 (>= 0.0.0~20120605), libssl1.0.0 (>= 1.0.1), zlib1g (>= 1:1.1.4), adduser, lsb-base
  8. Recommends: logrotate, tor-geoipdb, torsocks
  9. Suggests: mixmaster, torbrowser-launcher, socat, tor-arm, apparmor-utils, obfs4proxy
  10. Conflicts: libssl0.9.8 (<< 0.9.8g-9)
  11. Homepage: https://www.torproject.org/
  12. Priority: optional
  13. Section: net
  14. Filename: pool/main/t/tor/tor_0.3.2.10-1~trusty+1_amd64.deb
  15. Size: 1266344
  16. SHA256: cbba273ed08f2236f5ad98d6cbacada4f1404d61dce5077f47d106f4b6724e70
  17. SHA1: 4f44ed8c5087594ecc2b3e41b5e4d23836df47e9
  18. MD5sum: 4fbf733059e198c27d7ecd6df4822ba1
  19. Description: anonymizing overlay network for TCP
  20. Tor is a connection-based low-latency anonymous communication system.
  21. .
  22. Clients choose a source-routed path through a set of relays, and
  23. negotiate a "virtual circuit" through the network, in which each relay
  24. knows its predecessor and successor, but no others. Traffic flowing
  25. down the circuit is decrypted at each relay, which reveals the
  26. downstream relay.
  27. .
  28. Basically, Tor provides a distributed network of relays. Users bounce
  29. their TCP streams (web traffic, ftp, ssh, etc) around the relays, and
  30. recipients, observers, and even the relays themselves have difficulty
  31. learning which users connected to which destinations.
  32. .
  33. This package enables only a Tor client by default, but it can also be
  34. configured as a relay and/or a hidden service easily.
  35. .
  36. Client applications can use the Tor network by connecting to the local
  37. socks proxy interface provided by your Tor instance. If the application
  38. itself does not come with socks support, you can use a socks client
  39. such as torsocks.
  40. .
  41. Note that Tor does no protocol cleaning on application traffic. There
  42. is a danger that application protocols and associated programs can be
  43. induced to reveal information about the user. Tor depends on Torbutton
  44. and similar protocol cleaners to solve this problem. For best
  45. protection when web surfing, the Tor Project recommends that you use
  46. the Tor Browser Bundle, a standalone tarball that includes static
  47. builds of Tor, Torbutton, and a modified Firefox that is patched to fix
  48. a variety of privacy bugs.
  49. Description-md5: 9106e8e4b3843ebd532ba2b89615a92e
Add Comment
Please, Sign In to add comment