Result for E7CF459300EC423C74BBE9BBE74F90644CC1F5B5

Query result

Key Value
FileNametor-0.2.5.x-logrotate.patch
FileSize1058
MD5D284C61365C1955CE7FB9FA7DFAE24BB
SHA-1E7CF459300EC423C74BBE9BBE74F90644CC1F5B5
SHA-2560191CB75238BA95FCB484251CB0E4397CEF50DC0A74B68C6E5EE734B748C633C
SSDEEP24:nFvXwnVfe2NHUE7R49m+JsaR47/alR4UbR4lPA7VX30Eun:nFvXYV9HFu94au7yluUbulocn
TLSHT1D311FC28BEB86462BDB20D39C02E6521CBC3B05E8CFD713057D69891B5C8770532EAD2
hashlookup:parent-total3
hashlookup:trust65

Network graph view

Parents (Total: 3)

The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD53228463BF35DE43D3108E3DA60059088
PackageArchx86_64
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "tor" user and a "tor" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerhttps://bugs.opensuse.org
PackageNametor
PackageRelease2.1
PackageVersion0.4.6.7
SHA-1B819E544B5E06F222DE51DC24A7460E4946BA30E
SHA-2566F34CF77F1E3284ED232343EC3ED3920CF44111EF293313DAA490CFF087FEA98
Key Value
MD5233BD5882D05DD567A03C6578D2DE8F0
PackageArchx86_64
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "tor" user and a "tor" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageMaintainerhttps://bugs.opensuse.org
PackageNametor
PackageRelease1.2
PackageVersion0.4.6.9
SHA-136434FCD1BFD75CC0BDF3DA74158377AF33193DD
SHA-256D177F5691CAD9727735F603AD6E3D3ECBF1E143E282891293B9C606A4AECE9B2
Key Value
MD5BBC1F4AAC76E3A1C778870FA1B179D6D
PackageArchaarch64_ilp32
PackageDescriptionTor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "tor" user and a "tor" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
PackageNametor
PackageRelease1.1
PackageVersion0.4.6.6
SHA-14C541CF9BAD3FE70078C4C7027EEC3261A1FBF42
SHA-2565F05C02DD20038D840AFBA6DB77B019C1739D57AEE58EA7F419EE4C1FC814155