Result for FB6A7248CEB8875B0158E37F4D71EF45B95D8693

Query result

Key Value
FileName./usr/share/doc/tor/changelog.gz
FileSize277291
MD5DF593F9A33C9AD78B8A9A2C4D112142B
SHA-1FB6A7248CEB8875B0158E37F4D71EF45B95D8693
SHA-256EFCE11B8F4DED1A4CB1ABBFBE62D21A76DAE337D5B1A53EDF62E87151D35319D
SSDEEP6144:3zzS3K3mLZONKs4OhTI+C0TStVvbO2shDrJK9WxRw65zVx7OwbNrClr:PQKAwTIpVvi2sh/JKay6ng4CR
TLSHT1F244233622A57464E65C4C6CE96D70D9F8A0EFF2596ACC17F81EE40C09E7F386085BB4
hashlookup:parent-total5
hashlookup:trust75

Network graph view

Parents (Total: 5)

The searched file hash is included in 5 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize1177836
MD5DB5E263B6F8207245D912FE633630EE5
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-16523D0851D78FE094462E1E2CF2C99D472CEC701
SHA-256B7B44DB4AB6CA563382D626DD29F96CBE5B141E3CDF88B16FA339496010FBBEA
Key Value
FileSize1060700
MD5B0E54F177034A05F5F87E4CFA5EDCF72
PackageDescriptionGeoIP database for Tor This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries. . Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges. . Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor-geoipdb
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-10ED84C42B340473D023EA5B11662AB04973E9B10
SHA-256822417DEA67E2881785A129C1B1AE5CB289FA6CA3B57C07258FA8119486B7AAB
Key Value
FileSize1048442
MD5FFEC9C89AF6A53F330DE24A0E53B2826
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-1F3393035CDD3A5AF51DED51803FC30484E419C6A
SHA-2561A9AC869589416DCA38F0C19B19C93397D7BAEF8AEC56BF775202FD4629783E1
Key Value
FileSize1070200
MD5AFCB7E517C7A4DA1866D282A30FC0DD3
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-1D50AC01FCFF13ADB5E632AE4E15FD62D22F40132
SHA-256B6811DD3C9269CC261EE0A086BDE4DBE7B83B3BE4362D7B507D56E0E2CFC82AB
Key Value
FileSize1129052
MD579CCC5867567110280EF823CA87D7F80
PackageDescriptionanonymizing overlay network for TCP Tor is a connection-based low-latency anonymous communication system. . Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. . Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. . This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. . Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. . Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
PackageMaintainerPeter Palfrader <weasel@debian.org>
PackageNametor
PackageSectionnet
PackageVersion0.2.5.16-1
SHA-119733BA13650B600E3CDBC41BFDD8AF970264687
SHA-256BC592A17A938C9A81AE42693955491E3CA8EC31D0C29C8710B330F161E6466A2