Package: tor
Version: 0.2.4.21-1+tails1~d70.wheezy+1
Architecture: i386
Maintainer: Peter Palfrader <weasel@debian.org>
Installed-Size: 2798
Pre-Depends: dpkg (>= 1.15.7.2)
Depends: libc6 (>= 2.10), libevent-2.0-5 (>= 2.0.10-stable), libssl1.0.0 (>= 1.0.1), zlib1g (>= 1:1.1.4), adduser, lsb-base
Recommends: logrotate, tor-geoipdb, torsocks
Suggests: mixmaster, xul-ext-torbutton, socat, tor-arm, polipo (>= 1) | privoxy, apparmor-utils
Conflicts: libssl0.9.8 (<< 0.9.8g-9)
Homepage: https://www.torproject.org/
Priority: optional
Section: net
Filename: pool/main/t/tor/tor_0.2.4.21-1+tails1~d70.wheezy+1_i386.deb
Size: 1305288
SHA256: 13871a9fb5457d0c4c8fb44534dc5f92578d08486e42a94c1f7345520d9ae977
SHA1: a2d70e87a8c395dc4555f2bfd9a3a6041a1538c5
MD5sum: 6c33738b1c2140b2f64a9b6fec19c7bb
Description: anonymizing overlay network for TCP
 Tor is a connection-based low-latency anonymous communication system.
 .
 Clients choose a source-routed path through a set of relays, and
 negotiate a "virtual circuit" through the network, in which each relay
 knows its predecessor and successor, but no others. Traffic flowing
 down the circuit is decrypted at each relay, which reveals the
 downstream relay.
 .
 Basically, Tor provides a distributed network of relays. Users bounce
 their TCP streams (web traffic, ftp, ssh, etc) around the relays, and
 recipients, observers, and even the relays themselves have difficulty
 learning which users connected to which destinations.
 .
 This package enables only a Tor client by default, but it can also be
 configured as a relay and/or a hidden service easily.
 .
 Client applications can use the Tor network by connecting to the local
 socks proxy interface provided by your Tor instance. If the application
 itself does not come with socks support, you can use a socks client
 such as torsocks.
 .
 Note that Tor does no protocol cleaning on application traffic. There
 is a danger that application protocols and associated programs can be
 induced to reveal information about the user. Tor depends on Torbutton
 and similar protocol cleaners to solve this problem. For best
 protection when web surfing, the Tor Project recommends that you use
 the Tor Browser Bundle, a standalone tarball that includes static
 builds of Tor, Torbutton, and a modified Firefox that is patched to fix
 a variety of privacy bugs.

Package: tor-dbg
Source: tor
Version: 0.2.4.21-1+tails1~d70.wheezy+1
Architecture: i386
Maintainer: Peter Palfrader <weasel@debian.org>
Installed-Size: 4940
Depends: tor (= 0.2.4.21-1+tails1~d70.wheezy+1)
Suggests: gdb
Homepage: https://www.torproject.org/
Priority: extra
Section: debug
Filename: pool/main/t/tor/tor-dbg_0.2.4.21-1+tails1~d70.wheezy+1_i386.deb
Size: 2162660
SHA256: 178083f1cc854eaaf5e92ba38e484cbe8a52182cce1185f076b1487a22bf6587
SHA1: b06bf8ea9b6f59b946f05ec711fd6f9ae2fa948d
MD5sum: 9849a6a028329d1770e1d3c689548d94
Description: debugging symbols for Tor
 This package provides the debugging symbols for Tor, The Onion Router.
 Those symbols allow your debugger to assign names to your backtraces, which
 makes it somewhat easier to interpret core dumps.

Package: tor-geoipdb
Source: tor
Version: 0.2.4.21-1+tails1~d70.wheezy+1
Architecture: all
Maintainer: Peter Palfrader <weasel@debian.org>
Installed-Size: 3188
Depends: tor (>= 0.2.4.21-1+tails1~d70.wheezy+1)
Breaks: tor (<< 0.2.4.8)
Replaces: tor (<< 0.2.4.8)
Homepage: https://www.torproject.org/
Priority: extra
Section: net
Filename: pool/main/t/tor/tor-geoipdb_0.2.4.21-1+tails1~d70.wheezy+1_all.deb
Size: 1002346
SHA256: ef056656215a2cea41e0dd4bd3ba4ee0c442ed690a9c125e64208aa3abd35d5b
SHA1: 08ff60c78cc5e2a4ba907cdaaa52a07c56c7216a
MD5sum: 26cf7e4791086a14f81f67d0f594b96a
Description: GeoIP database for Tor
 This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses
 to countries.
 .
 Bridge relays (special Tor relays that aren't listed in the main Tor
 directory) use this information to report which countries they see
 connections from.  These statistics enable the Tor network operators to
 learn when certain countries start blocking access to bridges.
 .
 Clients can also use this to learn what country each relay is in, so
 Tor controllers like arm or Vidalia can use it, or if they want to
 configure path selection preferences.