Result for 08F8C35E77831BFBBB6DB831DA0F14169A798B83

Query result

Key Value
CRC32CC19F75E
FileName./usr/share/tor/tor-service-defaults-torrc-instances
FileSize447
MD52420557B707B5BF7631E1443C27176A5
OpSystemCode{'MfgCode': '1006', 'OpSystemCode': '362', 'OpSystemName': 'TBD', 'OpSystemVersion': 'none'}
ProductCode{'ApplicationType': 'Operating System', 'Language': 'Multilanguage', 'MfgCode': '2500', 'OpSystemCode': '51', 'ProductCode': '163700', 'ProductName': 'Tails', 'ProductVersion': '2.11'}
SHA-108F8C35E77831BFBBB6DB831DA0F14169A798B83
SHA-256FA5913D742F2544F7442F0E19DE64975D34F81B7B0A7A581EAA84FBADDEBD098
SHA-5124B8C11109DDB981312FB41F0D0919A4715BE71043D22AC99A1B17C02415F4231A2B8D5622B3D75F619D373D5B46DF3031061D6DAAD6D43ACB6F3D5A3E0C84CAF
SSDEEP12:xc3W68r+RW4Q9s3eB8WkVLV3s6GRsnWPtvTBR3T+RW4qFaP:x160+4/B7kRV3s6usWVvT33T+44+w
SpecialCode
TLSHT1A7F02B4F7F7E2D1E3FDB80257136A909614AE89E9CC208674809B8F451D650B0FE38FA
dbnsrl_modern_rds
insert-timestamp1700765393.3058896
mimetypetext/plain
sourcesnap:npG2BsdnO0lR4Vy1rmK5ZsK0qpsawZ8L_12
hashlookup:parent-total15
hashlookup:trust100

Network graph view

Parents (Total: 15)

The searched file hash is included in 15 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
SHA-145BC4C73DE1FE6D0096D3B12997ECA554119A221
snap-authoritycanonical
snap-filenamenpG2BsdnO0lR4Vy1rmK5ZsK0qpsawZ8L_12.snap
snap-idnpG2BsdnO0lR4Vy1rmK5ZsK0qpsawZ8L_12
snap-nameormesh
snap-publisher-ida95kkXCT3MH6YnEBARXha95KfYMEaJrI
snap-signkeyBWDEoaqyr25nF5SNCvEv2v7QnM9QsfCc0PBMYD_i2NGSQ32EF2d4D0hqUel3m8ul
snap-timestamp2017-11-16T03:20:27.712595Z
source-urlhttps://api.snapcraft.io/api/v1/snaps/download/npG2BsdnO0lR4Vy1rmK5ZsK0qpsawZ8L_12.snap
Key Value
FileSize1448556
MD50EA167304C8C9289F19E67A3499E3A70
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-171147A988F91AD6EEF0CDCB1B0C41023160F7028
SHA-2563BFBBA4162928DEBD5E81FC9EBCE730E3A9079891134749D33C4C55A8FC4F9B0
Key Value
FileSize1454722
MD56506A7C96BC24B4643EB59F7581659EF
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-1E911DA168BFA0A2024A996361454F71548C1CA5B
SHA-2562B1C2DBF562E11A726E6809C49073A730D225F8FC9C0140399BC96786D97ECE5
Key Value
FileSize1259260
MD535B074A07DEC40F31313978A0CAC4EBA
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNametor
PackageSectionnet
PackageVersion0.3.2.10-1
SHA-1F6E7838FD86ECE808A9346D128F3B7696D4D8704
SHA-2565B37CCB419B324F5CA625EDD9CB696DD836AEC3768C186CF65CDAC237EEFBBB9
Key Value
FileSize1480200
MD5C0ED417C5DC250AAC4E3C7F8F4DA589C
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-1DB1414E35E7F4254BA5C1A09A3D30A0924001925
SHA-256639960C2A43F67E83E4CEBB9CDF75C84873A24F44A6953FBFB0B30F0B6527D9E
Key Value
FileSize1451162
MD5D14B395CB09962ABEB4A3BAD23674433
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-18CEDB1DD0E10F35B9D2E25AE289D60E47903FFD5
SHA-25679E587A7C5BD5B880B156AE1E53BB6209DEA05BBA0B5579E0541F7C185DC3B67
Key Value
FileSize1114284
MD582845377FF6983E7C1593EE6C1FDED98
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.14-1ubuntu1~16.04.3
SHA-12EE9E8579BA7E1DB2EBE381E08AF1FB34AB09D41
SHA-256BDB29BDC861684BE64FC308908539C900A9030097714B94C92462D8736E7F795
Key Value
FileSize1162080
MD5C2CEE27482B3F908E9D01FFE21C6B580
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.14-1ubuntu1~16.04.3
SHA-1F4D78291A63D49427BA51D35696031549455E648
SHA-25698F4E0EBFDD26DBAEDDE174E92A976C0658032EFFDD84E14FD0D26A7AB6F5F85
Key Value
FileSize1434466
MD5711D74548A9288C9BEADE9D65D6BCD3E
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-133B82A3E1131A81C862EDEDEEA7B19BB6F280DAE
SHA-256CDE8717214D7435AA4D6883578E6EE6E4BFB222CF078772DD3908767358A8B8F
Key Value
FileSize1539442
MD5892A9C98128254BAFB840E41C185C1B6
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-15DBF3195D14A220B049D1F1F7A685E09E013F4D0
SHA-256F3C64729ACC46642D2AFB13B50984D431B1CA87341A7DE91D66564C7581CCD26
Key Value
FileSize1412908
MD5E9E74A4D70F712B87A4F62EF2E0B6D24
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-17A293B56E5161B8FC982CA618EB67519D1E85F38
SHA-256AAED572FAF31AFF9763F0B6728F02F33D2131E4414B4B55AF1F9AEBF23E2A613
Key Value
FileSize1419260
MD502E5332E5F088EA4187487B69C8A35D7
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-1BA3341ED6851E0F5D4D76F4CA1FACF2425D7DD4E
SHA-25629AFCA05BE878EC4E928C4595D781E75D515B0081B2268458094A4DB34F9654B
Key Value
FileSize1432036
MD53CA647425169A2C4741AD76EA040BDC1
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-1300883327CA49837618F30BB82C7FA2EBCC4F782
SHA-25614207E2807D56A9477DC4443973945E472080797AEA9F462BB20ADA9EF139EB1
Key Value
FileSize1332204
MD5F1B8766FA486644B0F89459587691039
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNametor
PackageSectionnet
PackageVersion0.3.2.10-1
SHA-1E9D351FB0BA4F2034D9F26D326DEF1DE054E58D6
SHA-25671429D0448A1FF2E51ED02B82B8791933AE487D33767CE3FCB444065FB1C6EC0
Key Value
FileSize1391742
MD5F61F7F832D50BFCF35C77D4889F9C937
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.9.16-1
SHA-1A6E314FA88DCCC064AF717C00A48D5AA512502CC
SHA-2569376B41FBED05468AE6EC3947F1D5EB6C1A3557DABD64F1AB0D08AE4E294A86B