Debian Sanctuary Project
Summary
Anonymous Browsing
Debian Anonymous Browsing Packages

This metapackage will install packages useful for browsing anonymously in Debian.

Description

For a better overview of the project's availability as a Debian package, each head row has a color code according to this scheme:

If you discover a project which looks like a good candidate for Debian Sanctuary to you, or if you have prepared an unofficial Debian package, please do not hesitate to send a description of that project to the Debian Sanctuary mailing list

Links to other tasks

Debian Sanctuary Anonymous Browsing packages

Official Debian packages with high relevance

corkscrew
Getunnelte TCP-Verbindungen über HTTP-Proxys
Versions of package corkscrew
ReleaseVersionArchitectures
bookworm2.0-14amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie2.0-14amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
buster2.0-11amd64,arm64,armhf,i386
sid2.0-14amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
bullseye2.0-13amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
jessie2.0-10amd64,armel,armhf,i386
stretch2.0-11amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
Debtags of package corkscrew:
interfacecommandline
networkvpn
roleprogram
scopeutility
securityprivacy
useproxying
Popcon: 19 users (3 upd.)*
Versions and Archs
License: DFSG free
Git

Corkscrew ist ein einfaches Werkzeug zum Tunneln von TCP-Verbindungen durch einen HTTP-Proxy, welches die CONNECT-Methode unterstützt. Es liest von Stdin und schreibt Stdout durch die Verbindung - so wie Netcat.

Es kann beispielsweise zur Verbindung eines SSH-Servers über den Port 443 des entfernten Rechners durch ein reines HTTPS-Proxy benutzt werden.

gnunet
GNU's framework for secure peer-to-peer networking
Versions of package gnunet
ReleaseVersionArchitectures
sid0.20.0-4.1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
jessie0.10.1-2.1amd64,armel,armhf,i386
stretch0.10.1-4amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
buster0.10.1-5.1amd64,arm64,armhf,i386
bullseye0.13.1-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm0.19.3-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie0.20.0-4amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
upstream0.21.1
Debtags of package gnunet:
interfacecommandline, daemon
networkclient, server, service
roleprogram, shared-lib
securityauthentication
suitegnu
usechatting, downloading
Popcon: 39 users (9 upd.)*
Newer upstream!
License: DFSG free

GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. Its high-level goal is to provide a strong free software foundation for a global network that provides security and in particular respects privacy.

GNUnet started with an idea for anonymous censorship-resistant file-sharing, but has grown to incorporate other applications as well as many generic building blocks for secure networking applications. In particular, GNUnet now includes the GNU Name System, a privacy-preserving, decentralized public key infrastructure.

gnunet-fuse
secure, trust-based peer-to-peer framework (fuse filesystem client)
Versions of package gnunet-fuse
ReleaseVersionArchitectures
buster0.10.0-2amd64,arm64,armhf,i386
sid0.20.0-3amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
jessie0.10.0-1amd64,armel,armhf,i386
stretch0.10.0-2amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
trixie0.20.0-3amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
bookworm0.19.1-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye0.13.0-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
upstream0.21.0
Popcon: 2 users (2 upd.)*
Newer upstream!
License: DFSG free

GNUnet is a peer-to-peer framework which focuses on providing security. All link-to-link messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the peer-to-peer traffic in UDP, TCP, or SMTP messages.

This package contains the fuse filesystem client. In order use GNUnet, you also need gnunet either on your server or on your local machine.

gnunet-gtk
GNU's framework for secure peer-to-peer networking (GTK+ client)
Versions of package gnunet-gtk
ReleaseVersionArchitectures
bookworm0.19.0-4amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster0.10.1-5amd64,arm64,armhf,i386
stretch0.10.1-5amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie0.10.1-1amd64,armel,armhf,i386
sid0.20.0-4amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
bullseye0.13.1-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
upstream0.21.0
Debtags of package gnunet-gtk:
interfacecommandline, x11
networkclient
roleprogram
scopeapplication
securityauthentication
suitegnu
uitoolkitgtk
usechatting, downloading
x11application
Popcon: 4 users (10 upd.)*
Newer upstream!
License: DFSG free

GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. Its high-level goal is to provide a strong free software foundation for a global network that provides security and in particular respects privacy.

This package contains the graphical client, using the GTK+ toolkit. In order use GNUnet, you also need gnunet either on your server or on your local machine.

Screenshots of package gnunet-gtk
iodine
tool for tunneling IPv4 data through a DNS server
Maintainer: gregor herrmann
Versions of package iodine
ReleaseVersionArchitectures
trixie0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
jessie0.7.0-3amd64,armel,armhf,i386
stretch0.7.0-7amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
buster0.7.0-9amd64,arm64,armhf,i386
bullseye0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
sid0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
upstream0.8.0
Debtags of package iodine:
interfacecommandline, daemon
networkclient, server, vpn
roleprogram
scopeutility
works-withnetwork-traffic
Popcon: 299 users (5 upd.)*
Newer upstream!
License: DFSG free
Git

This is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.

macchanger
utility for manipulating the MAC address of network interfaces
Versions of package macchanger
ReleaseVersionArchitectures
bookworm1.7.0-5.4amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
jessie1.7.0-5.3amd64,armel,armhf,i386
trixie1.7.0-5.4amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
bullseye1.7.0-5.4amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
sid1.7.0-5.4amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
buster1.7.0-5.4amd64,arm64,armhf,i386
stretch1.7.0-5.3amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
Debtags of package macchanger:
networkconfiguration
roleprogram
scopeutility
suitegnu
useconfiguring
Popcon: 99 users (28 upd.)*
Versions and Archs
License: DFSG free

GNU MAC Changer is an utility that makes the maniputation of MAC addresses of network interfaces easier. MAC addresses are unique identifiers on networks, they only need to be unique, they can be changed on most network hardware. MAC addresses have started to be abused by unscrupulous marketing firms, government agencies, and others to provide an easy way to track a computer across multiple networks. By changing the MAC address regularly, this kind of tracking can be thwarted, or at least made a lot more difficult.

Features:

  • set specific MAC address of a network interface
  • set the MAC randomly
  • set a MAC of another vendor
  • set another MAC of the same vendor
  • set a MAC of the same kind (eg: wireless card)
  • display a vendor MAC list (today, 6200 items) to choose from
Screenshots of package macchanger
mat
??? missing short description for package mat :-(
Versions of package mat
ReleaseVersionArchitectures
jessie0.5.2-3+deb8u1all
bullseye-security0.12.1-2+deb11u1all
bullseye0.12.1-2+deb11u1all
buster0.8.0-3+deb10u1all
stretch0.6.1-4all
bookworm0.13.3-1all
buster-backports0.10.0-1~bpo10+1all
buster-security0.8.0-3+deb10u1all
jessie-security0.5.2-3+deb8u1all
Popcon: 6 users (0 upd.)*
Versions and Archs
License: DFSG free
Git
Screenshots of package mat
obfs4proxy
pluggable transport proxy for Tor, implementing obfs4
Versions of package obfs4proxy
ReleaseVersionArchitectures
bullseye0.0.8-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
jessie0.0.3-2amd64,armel,armhf,i386
sid0.0.14-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
trixie0.0.14-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
bookworm0.0.14-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye-backports0.0.14-1~bpo11amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster-security0.0.7-4+deb10u1amd64,arm64,armhf,i386
buster0.0.7-4amd64,arm64,armhf,i386
stretch-security0.0.7-1+deb8u1amd64,arm64,armel,armhf,i386
stretch0.0.7-1amd64,arm64,armel,armhf,i386,ppc64el
jessie-security0.0.3-2+deb8u1amd64,armhf,i386
Popcon: 163 users (47 upd.)*
Versions and Archs
License: DFSG free
Git

obfs4proxy is a tool that attempts to circumvent censorship by transforming the Tor traffic between the client and the bridge. This way censors, who usually monitor traffic between the client and the bridge, will see innocent-looking transformed traffic instead of the actual Tor traffic.

obfs4proxy implements the obfuscation protocols obfs2, obfs3, and obfs4.

It is written in Go and is compliant with the Tor pluggable transports specification, and its modular architecture allows it to support multiple pluggable transports.

This package contains both the client and the bridge in a single program.

obfsproxy
pluggable transport proxy for Tor
Versions of package obfsproxy
ReleaseVersionArchitectures
jessie0.2.12-1all
stretch0.2.13-2+deb9u1all
buster0.2.13-3all
Popcon: 2 users (0 upd.)*
Versions and Archs
License: DFSG free
Git

obfsproxy is a tool that attempts to circumvent censorship by transforming the Tor traffic between the client and the bridge. This way censors, who usually monitor traffic between the client and the bridge, will see innocent-looking transformed traffic instead of the actual Tor traffic.

It is written in Python and is compliant with the Tor pluggable transports specification, and its modular architecture allows it to support multiple pluggable transports.

onioncat
IP-Transparent Tor hidden service connector
Versions of package onioncat
ReleaseVersionArchitectures
stretch0.2.2+svn569-2amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie0.2.2+svn559-2amd64,armel,armhf,i386
Popcon: 0 users (0 upd.)*
Versions and Archs
License: DFSG free
Git

OnionCat creates a transparent IP layer on top of Tor hidden services. It transparently transmits any kind of IP-based data through the Tor network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services.

OnionCat is a stand-alone application which runs in userland and is a connector between Tor and the local OS. Any protocol based on IP, such as UDP or TCP, can be transmitted.

OnionCat supports IPv6; native IPv4 forwarding, though still available, is deprecated: the recommended solution for IPv4 forwarding is to build a IPv4-through-IPv6 tunnel through OnionCat.

onionshare
Share a file over Tor Hidden Services anonymously and securely
Versions of package onionshare
ReleaseVersionArchitectures
buster1.3.2-1all
stretch-backports1.3-1~bpo9+1all
sid2.6-7all
jessie0.6-3 (contrib)all
bookworm2.6-5~deb12u1all
bullseye2.2-3+deb11u1all
upstream2.6.2
Popcon: 25 users (11 upd.)*
Newer upstream!
License: DFSG free
Git

OnionShare lets you securely and anonymously share a file of any size with someone. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL to access and download the file. It doesn't require setting up a server on the Internet somewhere or using a third party filesharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the Internet. The other user just needs to use the Tor Browser and TO Enter the URL to download the file from you.

Screenshots of package onionshare
openvpn
Daemon für virtuelle private Netze
Maintainer: Bernhard Schmidt
Versions of package openvpn
ReleaseVersionArchitectures
stretch-backports2.4.7-1~bpo9+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie2.3.4-5+deb8u2amd64,armel,armhf,i386
jessie-security2.3.4-5+deb8u2amd64,armel,armhf,i386
stretch2.4.0-6+deb9u3amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
stretch-security2.4.0-6+deb9u4amd64,arm64,armel,armhf,i386
buster2.4.7-1+deb10u1amd64,arm64,armhf,i386
buster-backports2.5.1-2~bpo10+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bullseye2.5.1-3amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye-backports2.6.3-1+deb12u2~bpo11+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm2.6.3-1+deb12u2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm-security2.6.3-1+deb12u2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie2.6.7-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
sid2.6.9-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
upstream2.6.10
Debtags of package openvpn:
interfacecommandline, daemon
networkserver, vpn
roleprogram
securitycryptography
userouting
Popcon: 21709 users (242 upd.)*
Newer upstream!
License: DFSG free
Git

Mit der Anwendung OpenVPN können Sie IP-Netzwerke über einen einzelnen UDP- oder TCP-Port sicher tunneln. Sie kann benutzt werden, um auf entfernte Rechner zuzugreifen, sichere Punkt-zu-Punkt-Verbindungen einzurichten, die Sicherheit von Funknetzen zu verbessern, usw.

OpenVPN nutzt alle in der OpenSSL-Bibliothek enthaltenen Verschlüsselungs-, Authentifizierungs- und Zertifizierungs-Funktionen (alle Chiffren, Schlüsselgrößen oder HMAC-Signatur).

OpenVPN kann statischen, vorher vereinbarten oder TLS-basierten dynamischen Schlüsselaustausch einsetzen. Sie unterstützt auch VPNs mit dynamischen Endpunkten (DHCP oder DFÜ-Clients), Tunnel über NAT oder verbindungsorientierte, zustandsgesteuerte Firewalls (z.B. unter Linux die iptables).

The package is enhanced by the following packages: openvpn-dco-dkms
privoxy
HTTP-Proxy zur Verbesserung der Privatsphäre
Maintainer: Roland Rosenfeld
Versions of package privoxy
ReleaseVersionArchitectures
jessie-security3.0.21-7+deb8u1amd64,armel,armhf,i386
stretch3.0.26-3amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bullseye3.0.32-2+deb11u1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster3.0.28-2+deb10u2amd64,arm64,armhf,i386
jessie3.0.21-7+deb8u1amd64,armel,armhf,i386
sid3.0.34-3amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
trixie3.0.34-3amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
bookworm3.0.34-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
stretch-security3.0.26-3+deb9u3amd64,arm64,armel,armhf,i386
Debtags of package privoxy:
interfacedaemon, web
networkserver
roleprogram
securityprivacy
useproxying
webserver
Popcon: 1023 users (48 upd.)*
Versions and Archs
License: DFSG free
Git

Privoxy ist ein Web-Proxy mit fortschrittlichen Filterfähigkeiten zum Schutz der Privatsphäre, Filterung von Webinhalten, Cookieverwaltung, Zugriffskontrolle und Entfernung von Werbung, Bannern, Pop-ups und anderem unbeliebten Internet-Müll. Privoxy ist sehr flexibel konfigurierbar und kann an individuelle Bedürfnisse und den eigenen Geschmack angepasst werden. Privoxy kann sowohl in eigenständigen Systemen als auch in Mehrbenutzernetzwerken angewendet werden.

Privoxy basiert auf dem Internet Junkbuster (tm).

tor
Anonymisierende Netzwerkschicht für TCP
Maintainer: Peter Palfrader
Versions of package tor
ReleaseVersionArchitectures
buster-backports0.4.5.10-1~bpo10+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
sid0.4.8.11-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
stretch-backports-sloppy0.4.4.5-1~bpo9+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bookworm0.4.7.16-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm-security0.4.7.16-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster-security0.3.5.16-1+deb10u1amd64,arm64,armhf,i386
buster0.3.5.16-1amd64,arm64,armhf,i386
jessie0.2.5.16-1amd64,armel,armhf,i386
stretch-backports0.3.5.10-1~bpo9+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie-security0.2.5.16-1amd64,armel,armhf,i386
stretch0.2.9.16-1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bullseye-backports0.4.7.13-1~bpo11+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
stretch-security0.2.9.15-1amd64,arm64,armel,armhf,i386
buster-backports-sloppy0.4.7.10-1~bpo10+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bullseye-security0.4.5.16-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye-backports-sloppy0.4.8.10-1~bpo11+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm-backports0.4.8.10-1~bpo12+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye0.4.5.16-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie0.4.8.10-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
Debtags of package tor:
interfacedaemon
networkclient, routing, server
roleprogram
securitycryptography, privacy
useproxying, routing
Popcon: 5744 users (59 upd.)*
Versions and Archs
License: DFSG free
Git

Tor ist ein verbindungsbasiertes, anonymes Kommunikationssystem mit geringer Latenz.

Clients wählen von der Quelle aus über eine gewisse Anzahl an Knoten eine Route aus und stellen eine »virtuelle Verbindung« darüber her, wobei jeder Knoten jeweils nur seinen Vorgänger und Nachfolger kennt. Daten, die diese Verbindung passieren, werden an jedem Knoten mit einem symmetrischen Schlüssel entschlüsselt, wodurch der nächste Knoten bekannt wird.

Im Grunde stellt Tor ein verteiltes Netzwerk von Knoten bereit. Benutzer schicken ihre TCP-Streams (Webdatenverkehr, ftp, ssh, usw.) über diese Knoten. Empfänger, Beobachter und selbst die Knoten können diese Streams nicht zurückverfolgen.

Dieses Paket aktiviert standardmäßig einen Tor-Client, kann aber auch einen Knoten und/oder einen versteckten Dienst konfigurieren.

Clientanwendungen können das Tor-Netzwerk nutzen, indem sie sich mit der lokalen SOCKS-Proxy-Schnittstelle verbinden, die von Ihrer Tor-Instanz bereitgestellt wird. Wenn die Anwendung selbst SOCKS nicht unterstützt, können sie einen SOCKS-Client wie etwa torsocks benutzen.

Beachten Sie, dass Tor keine Protokollsäuberung für den Verkehr der Anwendung durchführt. Es besteht die Gefahr, dass Anwendungsprotokolle und dazugehörige Programme dazu gebracht werden können, Informationen über den Benutzer preiszugeben. Zur Lösung dieses Problems ist Tor abhängig von Torbutton und ähnlichen Protokollsäuberungsprogrammen. Für einen bestmöglichen Schutz beim Surfen im Web empfiehlt das Tor-Projekt das »Tor Browser Bundle«. Das ist ein eigenständiger Tarball, der statisch gelinkte Versionen von Tor, Torbutton und eine modifizierte Version von Firefox, die diverse Probleme bezüglich der Privatsphäre behebt, umfasst.

The package is enhanced by the following packages: obfsproxy redsocks
Screenshots of package tor
tor-arm
Übergangspaket
Versions of package tor-arm
ReleaseVersionArchitectures
buster2.1.0-2all
jessie1.4.5.0-1all
stretch1.4.5.0-1.1all
bullseye2.1.0-2.1all
bookworm2.1.0-2.2all
Debtags of package tor-arm:
roleprogram
usemonitor
Popcon: 1 users (0 upd.)*
Versions and Archs
License: DFSG free
Git

Dies ist ein Übergangspaket. Es kann sicher entfernt werden.

tor-geoipdb
GeoIP database for Tor
Maintainer: Peter Palfrader
Versions of package tor-geoipdb
ReleaseVersionArchitectures
buster-backports-sloppy0.4.7.10-1~bpo10+1all
bookworm-security0.4.7.16-1all
bookworm0.4.7.16-1all
stretch-backports-sloppy0.4.4.5-1~bpo9+1all
sid0.4.8.11-1all
buster-backports0.4.5.10-1~bpo10+1all
trixie0.4.8.10-1all
bullseye0.4.5.16-1all
bullseye-backports0.4.7.13-1~bpo11+1all
bullseye-security0.4.5.16-1all
bullseye-backports-sloppy0.4.8.10-1~bpo11+1all
bookworm-backports0.4.8.10-1~bpo12+1all
stretch0.2.9.16-1all
stretch-backports0.3.5.10-1~bpo9+1all
buster0.3.5.16-1all
buster-security0.3.5.16-1+deb10u1all
jessie-security0.2.5.16-1all
stretch-security0.2.9.15-1all
jessie0.2.5.16-1all
Debtags of package tor-geoipdb:
roleapp-data
securityprivacy
Popcon: 48 users (2 upd.)*
Versions and Archs
License: DFSG free
Git

This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries.

Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges.

Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.

torsocks
Nutzung SOCKS-freundlicher Anwendungen mit Tor
Versions of package torsocks
ReleaseVersionArchitectures
sid2.4.0-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
trixie2.4.0-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,s390x
bookworm2.4.0-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye2.3.0-3amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster2.3.0-2amd64,arm64,armhf,i386
stretch2.2.0-1+deb9u1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie2.0.0-3amd64,armel,armhf,i386
Debtags of package torsocks:
roleprogram
securityprivacy
Popcon: 4722 users (143 upd.)*
Versions and Archs
License: DFSG free
Git

Torsocks ermöglicht es Ihnen, den Netzwerkverkehr einzelner SOCKS-freundlicher Anwendungen über das Tor-Netzwerk umzuleiten. Außerdem wird sichergestellt, dass DNS-Abfragen korrekt verarbeitet werden, und blockiert explizit den gesamten UDP-Datenverkehr aus der betreffenden Anwendung. Es ist möglich, dass eine bestimmte Anwendung Benutzer-/Systemdaten auf einer Ebene durchsickern lässt, die weder Tor noch Torsocks kontrollieren können. Eine 100%ige Garantie kann nicht gegeben werden, dass Anwendungen mit Tor sicher arbeiten.

Debian packages in contrib or non-free

torbrowser-launcher
helps download and run the Tor Browser Bundle
Versions of package torbrowser-launcher
ReleaseVersionArchitectures
bookworm0.3.6-2 (contrib)amd64,i386
stretch-backports-sloppy0.3.2-14~bpo9+1 (contrib)amd64,i386
buster-backports0.3.3-6~bpo10+1 (contrib)amd64,i386
bullseye0.3.3-6 (contrib)amd64,i386
bullseye-backports0.3.6-2~bpo11+1 (contrib)amd64,i386
jessie0.1.9-1+deb8u3 (contrib)amd64,i386
trixie0.3.7-1 (contrib)amd64,i386
sid0.3.7-1 (contrib)amd64,i386
Popcon: 1269 users (137 upd.)*
Versions and Archs
License: DFSG free, but needs non-free components
Git

Tor Browser Launcher is intended to make the Tor Browser Bundle (TBB) easier to maintain and use for GNU/Linux users. torbrowser-launcher handles downloading the most recent version of TBB for you, in your language and for your architecture. It also adds a "Tor Browser" application launcher to your operating system's menu.

When you first launch Tor Browser Launcher, it will download TBB from https://www.torproject.org/ and extract it to ~/.local/share/torbrowser, and then execute it. Cache and configuration files will be stored in ~/.cache/torbrowser and ~/.config/torbrowser. Each subsequent execution after installation will simply launch the most recent TBB, which is updated using Tor Browser's own update feature.

*Popularitycontest results: number of people who use this package regularly (number of people who upgraded this package recently) out of 237085