Key | Value |
---|---|
CRC32 | 4B88EF3A |
FileName | ./usr/share/tor/geoip6 |
FileSize | 1238895 |
MD5 | EA88FECCA1EB4F18A84A9C2CD9DC9EBE |
OpSystemCode | {'MfgCode': '1006', 'OpSystemCode': '362', 'OpSystemName': 'TBD', 'OpSystemVersion': 'none'} |
ProductCode | {'ApplicationType': 'internet browser', 'Language': 'English', 'MfgCode': '2500', 'OpSystemCode': '598', 'ProductCode': '17029', 'ProductName': 'Tor Browser', 'ProductVersion': '4.5.1'} |
SHA-1 | 1F99B6B0EC78E9DB34D61AE7E0FC261D558E8E5D |
SHA-256 | C88021F8CC270DD2AFA490450094AD1BE8FE8A1BFD0984D3E5270278E29A7927 |
SSDEEP | 24576:EVSYCDSdFmcjbUvjLPTH6yI7LyJxiHjh+sDN/io33Zx43X/V:R |
SpecialCode | |
TLSH | T15A45D2740DBFD7C623C4F26A2118385F82EAF1D8BE1A18E04A6ADC7407D58479AED753 |
db | nsrl_modern_rds |
insert-timestamp | 1646990479.6602764 |
source | NSRL |
hashlookup:parent-total | 9 |
hashlookup:trust | 95 |
The searched file hash is included in 9 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | B5ED29D86EF717199F5114DB2177E0D4 |
PackageArch | i386 |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.el5 |
PackageVersion | 0.2.4.27 |
SHA-1 | A94FABA4E4841DC6F2605EDE85CD5AF6D5EB599F |
SHA-256 | 49BB08D5E32DC8D7B11A0E11E923FF4B3702E205A1740AA64F5CF995FF7BED04 |
Key | Value |
---|---|
MD5 | 0F925849E8DB99A304D4EB9ACA0BEE95 |
PackageArch | aarch64 |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.fc22 |
PackageVersion | 0.2.5.12 |
SHA-1 | 182DAB265FA408867D174DF3F054AE464F76F414 |
SHA-256 | EA33FE1B1D2AE3187FBF9C7B98EE645AD65C61493A15B5081D2DF8B242734173 |
Key | Value |
---|---|
MD5 | B3B8781AA572A2C8C5496089B0C48272 |
PackageArch | ppc |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.el5 |
PackageVersion | 0.2.4.27 |
SHA-1 | E6815265786C74ED14C7015F7CFE24524D83B578 |
SHA-256 | AFE6D503865FE03FFEBBB3A7B0137414001206C84BEE4405381A2F3466881899 |
Key | Value |
---|---|
FileSize | 519134 |
MD5 | 2EC9726BC090EC7D3BE58DDADD85CB93 |
PackageDescription | GeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | tor-geoipdb |
PackageSection | net |
PackageVersion | 0.2.4.27-1ubuntu0.1 |
SHA-1 | DE2585042F36E10B3834C43D303D6206DBA24C9F |
SHA-256 | BEC732FB09855D464663A6A6C823C8667207526C6657EB12C98914C6F7A8EC8B |
Key | Value |
---|---|
MD5 | 2F19310BF361EE18D4D69A58898B3B23 |
PackageArch | s390x |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.fc22 |
PackageVersion | 0.2.5.12 |
SHA-1 | D21EE0F774A5849F951F31F8A622C0C0352D24BB |
SHA-256 | 9A49D5756B6A013B2273F03D45712733571E7D8D7A384094022D190F69FC674F |
Key | Value |
---|---|
MD5 | 1D9DB76C880E35247EC03BEC7D6BFB7D |
PackageArch | ppc64 |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.fc22 |
PackageVersion | 0.2.5.12 |
SHA-1 | D70F2878E5F1FACC0C0F87AF2DCE5FB378424FB7 |
SHA-256 | 27E85D708FA45A248791FA64F2A32C7F13B092F5EE02E7569E2BB5FA5D21C089 |
Key | Value |
---|---|
MD5 | 9CC2E1E615DD855BFABE8C4A637850C6 |
PackageArch | s390 |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.fc22 |
PackageVersion | 0.2.5.12 |
SHA-1 | 27951BBC9E6CD3D7EA5D5D14D0B63C3A2342F052 |
SHA-256 | 42F13F9C0D4A573BA74D54306CE3C4BDD752D83A24161D7A8BABFDF158413E62 |
Key | Value |
---|---|
MD5 | 20F9F3B0B87624F28A4B3B28E0EE4636 |
PackageArch | ppc64le |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.fc22 |
PackageVersion | 0.2.5.12 |
SHA-1 | 7BF37CFBD3BE0420D3434EA25FD28308588C8A8A |
SHA-256 | C8AD168353815FB43CA7054093CC8C20CA0B1CFC0DDF42222FE5B820232AAD95 |
Key | Value |
---|---|
MD5 | 19435A7B73AC38A4AA6F485CA1C45370 |
PackageArch | x86_64 |
PackageDescription | Tor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. |
PackageMaintainer | Fedora Project |
PackageName | tor |
PackageRelease | 1.el5 |
PackageVersion | 0.2.4.27 |
SHA-1 | AB0794DB2A0940E6E8EB597CD2461BF1C521440B |
SHA-256 | 6C1325F0A738ED088372DD8A1883650C128BFEFF5A49102CCE8B36AB4F90C434 |