Result for 5577D503993FC214A38DFCD5DBAC973E638297E9

Query result

Key Value
FileName./usr/share/doc/tor/changelog.Debian.gz
FileSize23021
MD55DA614ACD30647D3AE34E4C05E67E507
SHA-15577D503993FC214A38DFCD5DBAC973E638297E9
SHA-256CDB46A8E31FE2A9C2D7B9E29174CBA817E6943BA20F342E39E074C9666C94CC8
SSDEEP384:Ej++qQE2aqADGEuvixai7IhMDZDfsaUmiwWeoLoXBKFyT/HmC3RSH8nPtiXw1XrC:NXQjADOi37I2ZDljWeioXBKFecqFhW+M
TLSHT10DA2E16A4A677B4DC80598B2F16810B48106AF3D70D07EDCE953D6E499E99028EC0DF7
hashlookup:parent-total5
hashlookup:trust75

Network graph view

Parents (Total: 5)

The searched file hash is included in 5 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize1177836
MD5DB5E263B6F8207245D912FE633630EE5
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-16523D0851D78FE094462E1E2CF2C99D472CEC701
SHA-256B7B44DB4AB6CA563382D626DD29F96CBE5B141E3CDF88B16FA339496010FBBEA
Key Value
FileSize1060700
MD5B0E54F177034A05F5F87E4CFA5EDCF72
PackageDescriptionGeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor-geoipdb
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-10ED84C42B340473D023EA5B11662AB04973E9B10
SHA-256822417DEA67E2881785A129C1B1AE5CB289FA6CA3B57C07258FA8119486B7AAB
Key Value
FileSize1048442
MD5FFEC9C89AF6A53F330DE24A0E53B2826
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-1F3393035CDD3A5AF51DED51803FC30484E419C6A
SHA-2561A9AC869589416DCA38F0C19B19C93397D7BAEF8AEC56BF775202FD4629783E1
Key Value
FileSize1070200
MD5AFCB7E517C7A4DA1866D282A30FC0DD3
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-1D50AC01FCFF13ADB5E632AE4E15FD62D22F40132
SHA-256B6811DD3C9269CC261EE0A086BDE4DBE7B83B3BE4362D7B507D56E0E2CFC82AB
Key Value
FileSize1129052
MD579CCC5867567110280EF823CA87D7F80
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-119733BA13650B600E3CDBC41BFDD8AF970264687
SHA-256BC592A17A938C9A81AE42693955491E3CA8EC31D0C29C8710B330F161E6466A2