Result for 312B262F24BCB0C19A5D949F994E3AB51D2ADD68

Query result

Key Value
FileName./usr/share/doc/tor/HACKING/CodingStandardsRust.md
FileSize20347
MD50B448B5840A100AC813A3BDB205A8640
SHA-1312B262F24BCB0C19A5D949F994E3AB51D2ADD68
SHA-256BFF0A3E84CE2531DB453188FCA0CE4B8215C8C01314E5AF6306D65E8550ED5AD
SSDEEP384:1wbhAED8r3qDhbPWtI5e6ZdPpunzfoUIzy:8AEDCQeGdPp+foUN
TLSHT1D692F72F7A9523301A1312A2A79FD8D4E734D17F17209899B89D923C1F07279927E7F8
hashlookup:parent-total17
hashlookup:trust100

Network graph view

Parents (Total: 17)

The searched file hash is included in 17 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD52EDEBE719395B8FDBAA9382A0565E47E
PackageArchs390x
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerFedora Project
PackageNametor
PackageRelease1.el8
PackageVersion0.4.5.10
SHA-102800D4CA72DC4FBD7FF89CCFA0A6A2A55F0332B
SHA-2567686B5B8EB8A311DBB2FA62EC65A954C8C0B4E4A2F3DEC636DD907260FCE1494
Key Value
MD534FB4A6F177CA493A592F0907EF04F35
PackageArchx86_64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.mga8
PackageVersion0.4.5.12
SHA-11B388E1CF516C08D026D87E9F64BA2C3DA51E1A7
SHA-2560AB7F4381817E1B7191242474907B30250CECE962AC62324B206DB77FAD3BCFD
Key Value
MD58F866CFCFA9AFC039CFB7EC2521AD928
PackageArchi586
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerumeabot <umeabot>
PackageNametor
PackageRelease2.mga9
PackageVersion0.4.5.12
SHA-12DF6CF3A8098B057F7C737A0E148280247000D0E
SHA-2567FFE459537F683D527053858FD8F9010D96EE9FB1D15184B660885FE5EE98F50
Key Value
MD51DED33A80DA5153E9DE6008B404AA8AD
PackageArchaarch64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.mga8
PackageVersion0.4.5.12
SHA-156509055FF5465562C2F5C5CDAE9030C6E4A7EB0
SHA-25605CBAC0D5CC4C16826428627607E23735F9E7F505C8C893BCD97569F06619B65
Key Value
MD5EDFA66A21C5DF54DE9BA18137508AEC5
PackageArchaarch64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerFedora Project
PackageNametor
PackageRelease1.fc34
PackageVersion0.4.5.7
SHA-160DA844C3BE49A18827F6F0CAB2B15AC450369E1
SHA-256407BBCE8A8CE9C8BA07F85C6ACACF42B5AD442AF4BF325E2F0A2E11A44B4FD8E
Key Value
MD5295290210AD2539E98C3A99AA555081A
PackageArcharmv7hl
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.mga8
PackageVersion0.4.5.12
SHA-1771C075B67B45D9B25C3AD68D125971AC1843743
SHA-256F5C723011AC07FBBFDC23584EC852348DA3932EF60156D6149E8B910D0B3E9FF
Key Value
MD5CC81CFD99EF87F5A6D5884D52E766410
PackageArchi586
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.mga8
PackageVersion0.4.5.12
SHA-181DB6EE960B1A9F33575E3663BCAF7B0ACD31FDA
SHA-256A35E82211BD58731F4569FB663D0410A599F63651F520A3475821F2E8EB52574
Key Value
MD5D339BE12CF0BB3E124679E7F42BF41D8
PackageArchx86_64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerumeabot <umeabot>
PackageNametor
PackageRelease2.mga9
PackageVersion0.4.5.12
SHA-182B32417FC01A95E45694A42475627EA7F9FBF0D
SHA-256EA2BF88E06CAC21A4A7497EDB989FD9857E64B084E79F717DD81303FE9D5ADB2
Key Value
MD592C1B5DBA3F55EF5B1BA3BDB1BB1BDE2
PackageArchs390x
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "tor" user and a "tor" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerhttps://bugs.opensuse.org
PackageNametor
PackageReleasebp153.1.1
PackageVersion0.4.5.7
SHA-1842AB425C743E3D888E1C4233F8A69FC45144426
SHA-256EC4ED0B16CBD745584E82838EB1E8C0004CC8BAF03DF1089289B5A6A6F36FD34
Key Value
MD53DF07C7255963CED53C82C9F8F6587F6
PackageArchx86_64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerFedora Project
PackageNametor
PackageRelease1.el8
PackageVersion0.4.5.10
SHA-1ADE36026C326008E04CCA4E95F0877CA52A6FC00
SHA-256EA8A712D8C04ABC7D812A3D558B1C7CAF2900FA9F621D82514EA6756154F091C