Result for 5DCA7C2CE851A1524555CBAAB2D1CB2472101809

Query result

Key Value
FileName./usr/share/doc/tor/HACKING/HowToReview.md
FileSize2273
MD50D1BCD302DC95C021A0960F8D57855CF
SHA-15DCA7C2CE851A1524555CBAAB2D1CB2472101809
SHA-2564DD05C074A6E3B4F225DAEC25E68F993CB8E4809B40AD04376F574560D51006C
SSDEEP48:oMcMQDAyBgDCghhZ7Iddoz4YiC7EVePzpvVCQx7efaVCJFSeq2MacrV:oN2D3jZ7IjHlC7BdVCQx7eCVCJ+
TLSHT1F4415467BE012B247483D2E1ABEF848DCB29C0FD67A80465144CD25C03257BCE57F5E0
hashlookup:parent-total49
hashlookup:trust100

Network graph view

Parents (Total: 49)

The searched file hash is included in 49 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD51FD7FFC6BE9141C3B66F91B022CC643E
PackageArchx86_64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.mga7
PackageVersion0.3.5.10
SHA-1004BBCC67BB9E8D992314FDBBDEB071E6D68EC92
SHA-256C96F3DDC148275A4AA9511CBBB36B52CE0759885711B4AFED0A1F554600AABDE
Key Value
MD57786E9342E50E802F00836F28EF20EDC
PackageArchx86_64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerFedora Project
PackageNametor
PackageRelease1.el7
PackageVersion0.3.5.16
SHA-1040FE6C78541966FE06510492E1781F694C92A99
SHA-256798D59C3B1F51A52D280EC0734180FCFFCEC829FA3A870CF2BE8795204583554
Key Value
MD5108706F63A46B6DBCBF53B7C2C7EE0D1
PackageArchaarch64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.1.mga8
PackageVersion0.3.5.15
SHA-1052ABBEC8FB8B1A63D75D74586FE74795B34B754
SHA-256A49CA335FDBF26C691C32F8E58F92CC6A77AE13D9294E1B1F406062127C70C98
Key Value
MD5E173FFA33FB99403735DC5CAB3F00BA3
PackageArchaarch64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainertmb <tmb>
PackageNametor
PackageRelease1.mga8
PackageVersion0.3.5.13
SHA-10AF88CDA5A55A8A29792E59F0C84B7ADF0E43D11
SHA-256021924B3E838F47BA564295CD575BF210917274113D064381E0E1AD8E5911707
Key Value
MD577F35CB6B88F091A992E358DB1718F4E
PackageArcharmv7hl
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.1.mga7
PackageVersion0.3.5.15
SHA-10B9A2B445F039D6552922D21C4A7B333FE5132E5
SHA-256E0010CB3263BE64958631266801CC884BEC4E11F63DF37DCAEE5414608CA41E1
Key Value
MD5BE0BDF4297DBBB5D05D271FECE13F293
PackageArchx86_64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainertmb <tmb>
PackageNametor
PackageRelease1.mga8
PackageVersion0.3.5.13
SHA-11BA3BF9E199C74714850F530C9EFA698D7753869
SHA-2563A1220EC45FE21FB15C8F8F949C19695CB1F00A2194EEAECAA7B77141032910A
Key Value
MD58D0CAAD6AB231FD5D5E350D61F18EA29
PackageArcharmv7hl
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainertmb <tmb>
PackageNametor
PackageRelease1.mga8
PackageVersion0.3.5.13
SHA-11C74C25E91BFD54E63D3447B1C23EE39A883565C
SHA-256ACD6B68FA6C69B6E8DF0DEC9BDC0988823921032149166ECC70CA042533926A1
Key Value
MD5AF658DC52798E9D6C5069E6E190A11DE
PackageArchi586
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerneoclust <neoclust>
PackageNametor
PackageRelease1.mga7
PackageVersion0.3.5.14
SHA-1235FEBC165ECCE0D15766A941B04A5ECEE2F25E6
SHA-2565096DFA6C43C5501F8F018A1A4A08D090E7CFBF2B5B4F9AA164D390B92EDB24D
Key Value
MD510B73697C09D7E96D9DAAE0B6AFCDDD2
PackageArchx86_64
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "tor" user and a "tor" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerhttps://bugs.opensuse.org
PackageNametor
PackageReleaselp151.1.1
PackageVersion0.3.4.11
SHA-127363BDAC25CFD1E341BB0770D8559E600848A7D
SHA-2560BE9FB9BD629A807D6AEAF07979FC1D8AEECC5B08A4D80C15BAD921B8F61E1F7
Key Value
MD561BC35644F11DDB53AF061963A479C5C
PackageArchi586
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerwally <wally>
PackageNametor
PackageRelease1.mga8
PackageVersion0.3.5.16
SHA-12F6BE854214884BE2001A94332B5A9321EE584B4
SHA-25682FFDBD60D3825E100A8AE1B1022C2920241E7B7EE9416625D941121D6A307DB