Result for 149D09F69913FA0EC06718ECD864EF4857870630

Query result

Key Value
FileName./etc/tor/torrc
FileSize8652
MD5A9184F0A4F4675F6332D67F9895AC022
SHA-1149D09F69913FA0EC06718ECD864EF4857870630
SHA-2560691CD48DC5E17DEBFE8C47708BBBB61EB00575B2D24B5C9364E4E4DA3696397
SSDEEP192:X8OeRzHJTICG55/6SNCwHC6rvSOCOg5NxJx:uR9cd5CZ6zvCOsxL
TLSHT1D302C91BA798F3A203D30361525B73CAF71B517C6A6A346A405EE11823F067D53BB28F
hashlookup:parent-total5
hashlookup:trust75

Network graph view

Parents (Total: 5)

The searched file hash is included in 5 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize788582
MD5D804ADB1B2FC1E0F8CAE38168F27CA96
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNametor
PackageSectionnet
PackageVersion0.2.4.20-1
SHA-1D95E934AA747C9C9508E804714C1C3438C3DDFDA
SHA-25663D1998573892E9E2D5063EBAEA2F7D396357B053CA629AAEAE8897AE11EF767
Key Value
MD5B5ED29D86EF717199F5114DB2177E0D4
PackageArchi386
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease1.el5
PackageVersion0.2.4.27
SHA-1A94FABA4E4841DC6F2605EDE85CD5AF6D5EB599F
SHA-25649BB08D5E32DC8D7B11A0E11E923FF4B3702E205A1740AA64F5CF995FF7BED04
Key Value
MD5B3B8781AA572A2C8C5496089B0C48272
PackageArchppc
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease1.el5
PackageVersion0.2.4.27
SHA-1E6815265786C74ED14C7015F7CFE24524D83B578
SHA-256AFE6D503865FE03FFEBBB3A7B0137414001206C84BEE4405381A2F3466881899
Key Value
FileSize743348
MD5CE8ECE0C6FA6EFC61554F92BFF265681
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNametor
PackageSectionnet
PackageVersion0.2.4.20-1
SHA-157C48BEC5FAB4F4CA4AB7520868715EF2B60626D
SHA-256C48D4D20140B78F2CC14CF6319A7F77A442942CF7221BBD559623DF4D4A430F5
Key Value
MD519435A7B73AC38A4AA6F485CA1C45370
PackageArchx86_64
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease1.el5
PackageVersion0.2.4.27
SHA-1AB0794DB2A0940E6E8EB597CD2461BF1C521440B
SHA-2566C1325F0A738ED088372DD8A1883650C128BFEFF5A49102CCE8B36AB4F90C434