Result for 6E6CB5C396F9C6AF7316B3D126A057FD5A72D23E

Query result

Key Value
FileName./usr/share/doc/tor/README
FileSize936
MD50141695DDBAC68341891C0A6C0AEEF7F
SHA-16E6CB5C396F9C6AF7316B3D126A057FD5A72D23E
SHA-256FDD8E0E71B81DC44365186E57870810F1D1EFD6153285618DD32D815F41FA6E0
SSDEEP24:z5+CWfJiFFG0WzP0Wd9l6gCSGvwNgqACo90INg2djd:1ZWQFdWQWdmQGvwKR9fbd
TLSHT13911C4AFD825F233EB5769401665F9C4FF33642EB581A8B4306D51057BB15734313247
hashlookup:parent-total7
hashlookup:trust85

Network graph view

Parents (Total: 7)

The searched file hash is included in 7 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD54D407DBAD7E0FA199A85BFCCCABBF2F8
PackageArchs390
PackageDescriptionTor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease4.fc23
PackageVersion0.2.6.10
SHA-14102DB04F0D71D16C0F60AF4977D436D5E269D33
SHA-256DCABCC73AB48E4FFF67053FFC2E0C2CD57684E263A67BA08CA541AD018B469E9
Key Value
MD5903FB43AFA92FFCD128C722D24DBFB80
PackageArchs390x
PackageDescriptionTor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease4.fc23
PackageVersion0.2.6.10
SHA-14C0E42DFF057ADE0CD8FD5A85055EBECB0E741C0
SHA-256545DACDF0BF035608400749D70362FF392A3558B38712B3328A84892A8536F27
Key Value
MD5F0D2B0F0A2BA99D4DE9F7C8033601B96
PackageArchaarch64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerFedora Project
PackageNametor
PackageRelease6.fc24
PackageVersion0.2.7.6
SHA-1EA10F26E92615DEB38E15A430F1F953E83858260
SHA-256E828B0E101EAE9EC493844F34D7E7774DBC4103C729E232E56AFAFDE8F760E91
Key Value
MD50D1E2B6D3F0568D377CC38EBC9E5D4BB
PackageArchppc64le
PackageDescriptionTor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease4.fc23
PackageVersion0.2.6.10
SHA-1EB240644F19E3DFE46058D47085FEB378BA95004
SHA-2563357F07161CDDE444D81B07D8E84C8C1A4E8F50DC8E2A661EFD70C087259EED3
Key Value
MD58BA67B6CF8FFF9C322782EF6478DD8E8
PackageArchppc64
PackageDescriptionThe Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. This package contains the Tor software that can act as either a server on the Tor network, or as a client to connect to the Tor network.
PackageMaintainerFedora Project
PackageNametor
PackageRelease6.fc24
PackageVersion0.2.7.6
SHA-19C16AAB0B12BB46F71FF9FC101621BCEC75C7AF7
SHA-256ADC43F9FEE1C7A837753B43C55FD90F2E53AC61EF5F1B811B2F8C137D486BEEE
Key Value
MD5B667D0DB8593B431B05668049FB51707
PackageArchaarch64
PackageDescriptionTor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease4.fc23
PackageVersion0.2.6.10
SHA-1D22184D690EA884EBE70A17741C405FB58431C73
SHA-2560C56A1DCA4711B5203E1F728E6F50D8FA424DDB3A198827BB2085B8881B55A55
Key Value
MD5E395B836D4B6A3895E5AB3D58801954C
PackageArchppc64
PackageDescriptionTor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerFedora Project
PackageNametor
PackageRelease4.fc23
PackageVersion0.2.6.10
SHA-1DFF2C435D05427D80482E6C2650CCA13F2CAA0E2
SHA-256F9D4D12D7407FF477215BDF6CACF0E9CDF0106BBC9E203A2F3494EC5A247E574