Summary
Anonymous Browsing
Debian Anonymous Browsing Packages
This metapackage will install packages useful for browsing anonymously in
Debian.
Description
For a better overview of the project's availability as a Debian package, each head row has a color code according to this scheme:
If you discover a project which looks like a good candidate for Debian Sanctuary
to you, or if you have prepared an unofficial Debian package, please do not hesitate to
send a description of that project to the Debian Sanctuary mailing list
Links to other tasks
|
Debian Sanctuary Anonymous Browsing packages
Official Debian packages with high relevance
corkscrew
Getunnelte TCP-Verbindungen über HTTP-Proxys
|
Versions of package corkscrew |
Release | Version | Architectures |
trixie | 2.0-15 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 2.0-15 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie | 2.0-10 | amd64,armel,armhf,i386 |
stretch | 2.0-11 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
bullseye | 2.0-13 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster | 2.0-11 | amd64,arm64,armhf,i386 |
bookworm | 2.0-14 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
Debtags of package corkscrew: |
interface | commandline |
network | vpn |
role | program |
scope | utility |
security | privacy |
use | proxying |
|
License: DFSG free
|
Corkscrew ist ein einfaches Werkzeug zum Tunneln von TCP-Verbindungen
durch einen HTTP-Proxy, welches die CONNECT-Methode unterstützt. Es
liest von Stdin und schreibt Stdout durch die Verbindung - so wie
Netcat.
Es kann beispielsweise zur Verbindung eines SSH-Servers über den
Port 443 des entfernten Rechners durch ein reines HTTPS-Proxy benutzt
werden.
|
|
gnunet
GNU's framework for secure peer-to-peer networking
|
Versions of package gnunet |
Release | Version | Architectures |
stretch | 0.10.1-4 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster | 0.10.1-5.1 | amd64,arm64,armhf,i386 |
bullseye | 0.13.1-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 0.19.3-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 0.20.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 0.20.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie | 0.10.1-2.1 | amd64,armel,armhf,i386 |
upstream | 0.22.2 |
Debtags of package gnunet: |
interface | commandline, daemon |
network | client, server, service |
role | program, shared-lib |
security | authentication |
suite | gnu |
use | chatting, downloading |
|
License: DFSG free
|
GNUnet is a framework for secure peer-to-peer networking that does not use any
centralized or otherwise trusted services. Its high-level goal is to provide a
strong free software foundation for a global network that provides security
and in particular respects privacy.
GNUnet started with an idea for anonymous censorship-resistant file-sharing,
but has grown to incorporate other applications as well as many generic
building blocks for secure networking applications. In particular, GNUnet now
includes the GNU Name System, a privacy-preserving, decentralized public key
infrastructure.
|
|
gnunet-fuse
secure, trust-based peer-to-peer framework (fuse filesystem client)
|
Versions of package gnunet-fuse |
Release | Version | Architectures |
trixie | 0.20.0-3 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie | 0.10.0-1 | amd64,armel,armhf,i386 |
stretch | 0.10.0-2 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster | 0.10.0-2 | amd64,arm64,armhf,i386 |
bullseye | 0.13.0-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 0.19.1-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
sid | 0.20.0-4 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
upstream | 0.22.0 |
|
License: DFSG free
|
GNUnet is a peer-to-peer framework which focuses on providing security. All
link-to-link messages in the network are confidential and authenticated. The
framework provides a transport abstraction layer and can currently encapsulate
the peer-to-peer traffic in UDP, TCP, or SMTP messages.
This package contains the fuse filesystem client. In order use GNUnet, you also
need gnunet either on your server or on your local machine.
|
|
gnunet-gtk
GNU's framework for secure peer-to-peer networking (GTK+ client)
|
Versions of package gnunet-gtk |
Release | Version | Architectures |
sid | 0.20.0-4 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
bullseye | 0.13.1-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 0.19.0-4 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 0.20.0-4 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
buster | 0.10.1-5 | amd64,arm64,armhf,i386 |
stretch | 0.10.1-5 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie | 0.10.1-1 | amd64,armel,armhf,i386 |
upstream | 0.22.0 |
Debtags of package gnunet-gtk: |
interface | commandline, x11 |
network | client |
role | program |
scope | application |
security | authentication |
suite | gnu |
uitoolkit | gtk |
use | chatting, downloading |
x11 | application |
|
License: DFSG free
|
GNUnet is a framework for secure peer-to-peer networking that does not use any
centralized or otherwise trusted services. Its high-level goal is to provide a
strong free software foundation for a global network that provides security
and in particular respects privacy.
This package contains the graphical client, using the GTK+ toolkit. In order
use GNUnet, you also need gnunet either on your server or on your local
machine.
|
|
iodine
tool for tunneling IPv4 data through a DNS server
|
Versions of package iodine |
Release | Version | Architectures |
sid | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
bookworm | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
jessie | 0.7.0-3 | amd64,armel,armhf,i386 |
stretch | 0.7.0-7 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster | 0.7.0-9 | amd64,arm64,armhf,i386 |
bullseye | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
upstream | 0.8.0 |
Debtags of package iodine: |
interface | commandline, daemon |
network | client, server, vpn |
role | program |
scope | utility |
works-with | network-traffic |
|
License: DFSG free
|
This is a piece of software that lets you tunnel IPv4 data through a DNS
server. This can be usable in different situations where internet access is
firewalled, but DNS queries are allowed.
|
|
macchanger
utility for manipulating the MAC address of network interfaces
|
Versions of package macchanger |
Release | Version | Architectures |
sid | 1.7.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
bookworm | 1.7.0-5.4 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye | 1.7.0-5.4 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster | 1.7.0-5.4 | amd64,arm64,armhf,i386 |
stretch | 1.7.0-5.3 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie | 1.7.0-5.3 | amd64,armel,armhf,i386 |
trixie | 1.7.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
Debtags of package macchanger: |
network | configuration |
role | program |
scope | utility |
suite | gnu |
use | configuring |
|
License: DFSG free
|
GNU MAC Changer is an utility that makes the maniputation of MAC addresses of
network interfaces easier. MAC addresses are unique identifiers on networks,
they only need to be unique, they can be changed on most network hardware.
MAC addresses have started to be abused by unscrupulous marketing firms,
government agencies, and others to provide an easy way to track a computer
across multiple networks. By changing the MAC address regularly, this kind
of tracking can be thwarted, or at least made a lot more difficult.
Features:
- set specific MAC address of a network interface
- set the MAC randomly
- set a MAC of another vendor
- set another MAC of the same vendor
- set a MAC of the same kind (eg: wireless card)
- display a vendor MAC list (today, 6200 items) to choose from
|
|
mat
??? missing short description for package mat :-(
|
Versions of package mat |
Release | Version | Architectures |
buster | 0.8.0-3+deb10u1 | all |
bookworm | 0.13.3-1 | all |
bullseye-security | 0.12.1-2+deb11u1 | all |
bullseye | 0.12.1-2+deb11u1 | all |
buster-backports | 0.10.0-1~bpo10+1 | all |
jessie | 0.5.2-3+deb8u1 | all |
jessie-security | 0.5.2-3+deb8u1 | all |
stretch | 0.6.1-4 | all |
buster-security | 0.8.0-3+deb10u1 | all |
|
License: DFSG free
|
|
|
obfs4proxy
pluggable transport proxy for Tor, implementing obfs4
|
Versions of package obfs4proxy |
Release | Version | Architectures |
buster-security | 0.0.7-4+deb10u1 | amd64,arm64,armhf,i386 |
jessie | 0.0.3-2 | amd64,armel,armhf,i386 |
sid | 0.0.14-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
trixie | 0.0.14-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
buster | 0.0.7-4 | amd64,arm64,armhf,i386 |
stretch-security | 0.0.7-1+deb8u1 | amd64,arm64,armel,armhf,i386 |
stretch | 0.0.7-1 | amd64,arm64,armel,armhf,i386,ppc64el |
jessie-security | 0.0.3-2+deb8u1 | amd64,armhf,i386 |
bookworm | 0.0.14-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-backports | 0.0.14-1~bpo11 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
|
License: DFSG free
|
obfs4proxy is a tool that attempts to circumvent censorship by
transforming the Tor traffic between the client and the bridge. This way
censors, who usually monitor traffic between the client and the bridge, will
see innocent-looking transformed traffic instead of the actual Tor traffic.
obfs4proxy implements the obfuscation protocols obfs2, obfs3, and obfs4.
It is written in Go and is compliant with the Tor pluggable transports
specification, and its modular architecture allows it to support multiple
pluggable transports.
This package contains both the client and the bridge in a single program.
|
|
obfsproxy
pluggable transport proxy for Tor
|
Versions of package obfsproxy |
Release | Version | Architectures |
jessie | 0.2.12-1 | all |
stretch | 0.2.13-2+deb9u1 | all |
buster | 0.2.13-3 | all |
|
License: DFSG free
|
obfsproxy is a tool that attempts to circumvent censorship by
transforming the Tor traffic between the client and the bridge. This way
censors, who usually monitor traffic between the client and the bridge, will
see innocent-looking transformed traffic instead of the actual Tor traffic.
It is written in Python and is compliant with the Tor pluggable transports
specification, and its modular architecture allows it to support multiple
pluggable transports.
|
|
onioncat
??? missing short description for package onioncat :-(
|
Versions of package onioncat |
Release | Version | Architectures |
stretch | 0.2.2+svn569-2 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie | 0.2.2+svn559-2 | amd64,armel,armhf,i386 |
|
License: DFSG free
|
|
|
onionshare
Share a file over Tor Hidden Services anonymously and securely
|
Versions of package onionshare |
Release | Version | Architectures |
trixie | 2.6.2-4 | all |
jessie | 0.6-3 (contrib) | all |
bullseye | 2.2-3+deb11u2 | all |
sid | 2.6.2-4 | all |
stretch-backports | 1.3-1~bpo9+1 | all |
buster | 1.3.2-1 | all |
bookworm | 2.6-5~deb12u1 | all |
|
License: DFSG free
|
OnionShare lets you securely and anonymously share a file of any size with
someone. It works by starting a web server, making it accessible as a Tor
hidden service, and generating an unguessable URL to access and download
the file. It doesn't require setting up a server on the Internet somewhere
or using a third party filesharing service. You host the file on your own
computer and use a Tor hidden service to make it temporarily accessible
over the Internet. The other user just needs to use the Tor Browser and
TO Enter the URL to download the file from you.
|
|
openvpn
Daemon für virtuelle private Netze
|
Versions of package openvpn |
Release | Version | Architectures |
buster | 2.4.7-1+deb10u1 | amd64,arm64,armhf,i386 |
jessie | 2.3.4-5+deb8u2 | amd64,armel,armhf,i386 |
jessie-security | 2.3.4-5+deb8u2 | amd64,armel,armhf,i386 |
stretch | 2.4.0-6+deb9u3 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
stretch-security | 2.4.0-6+deb9u4 | amd64,arm64,armel,armhf,i386 |
stretch-backports | 2.4.7-1~bpo9+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster-backports | 2.5.1-2~bpo10+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
bullseye | 2.5.1-3 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-backports | 2.6.3-1+deb12u2~bpo11+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 2.6.3-1+deb12u2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm-security | 2.6.3-1+deb12u2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 2.6.12-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 2.6.12-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
Debtags of package openvpn: |
interface | commandline, daemon |
network | server, vpn |
role | program |
security | cryptography |
use | routing |
|
License: DFSG free
|
Mit der Anwendung OpenVPN können Sie IP-Netzwerke über einen einzelnen
UDP- oder TCP-Port sicher tunneln. Sie kann benutzt werden, um auf
entfernte Rechner zuzugreifen, sichere Punkt-zu-Punkt-Verbindungen
einzurichten, die Sicherheit von Funknetzen zu verbessern, usw.
OpenVPN nutzt alle in der OpenSSL-Bibliothek enthaltenen
Verschlüsselungs-, Authentifizierungs- und Zertifizierungs-Funktionen
(alle Chiffren, Schlüsselgrößen oder HMAC-Signatur).
OpenVPN kann statischen, vorher vereinbarten oder TLS-basierten
dynamischen Schlüsselaustausch einsetzen. Sie unterstützt auch VPNs mit
dynamischen Endpunkten (DHCP oder DFÜ-Clients), Tunnel über NAT oder
verbindungsorientierte, zustandsgesteuerte Firewalls (z.B. unter Linux die
iptables).
|
|
privoxy
HTTP-Proxy zur Verbesserung der Privatsphäre
|
Versions of package privoxy |
Release | Version | Architectures |
jessie-security | 3.0.21-7+deb8u1 | amd64,armel,armhf,i386 |
sid | 3.0.34-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie | 3.0.21-7+deb8u1 | amd64,armel,armhf,i386 |
stretch-security | 3.0.26-3+deb9u3 | amd64,arm64,armel,armhf,i386 |
bookworm | 3.0.34-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 3.0.34-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
buster | 3.0.28-2+deb10u2 | amd64,arm64,armhf,i386 |
stretch | 3.0.26-3 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
bullseye | 3.0.32-2+deb11u1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
Debtags of package privoxy: |
interface | daemon, web |
network | server |
role | program |
security | privacy |
use | proxying |
web | server |
|
License: DFSG free
|
Privoxy ist ein Web-Proxy mit fortschrittlichen Filterfähigkeiten zum
Schutz der Privatsphäre, Filterung von Webinhalten, Cookieverwaltung,
Zugriffskontrolle und Entfernung von Werbung, Bannern, Pop-ups und anderem
unbeliebten Internet-Müll. Privoxy ist sehr flexibel konfigurierbar und
kann an individuelle Bedürfnisse und den eigenen Geschmack angepasst
werden. Privoxy kann sowohl in eigenständigen Systemen als auch in
Mehrbenutzernetzwerken angewendet werden.
Privoxy basiert auf dem Internet Junkbuster (tm).
|
|
tor
Anonymisierende Netzwerkschicht für TCP
|
Versions of package tor |
Release | Version | Architectures |
bullseye | 0.4.5.16-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster-security | 0.3.5.16-1+deb10u1 | amd64,arm64,armhf,i386 |
buster | 0.3.5.16-1 | amd64,arm64,armhf,i386 |
buster-backports-sloppy | 0.4.7.10-1~bpo10+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
stretch-backports | 0.3.5.10-1~bpo9+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster-backports | 0.4.5.10-1~bpo10+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
bookworm-backports | 0.4.8.12-1~bpo12+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 0.4.8.13-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 0.4.8.13-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
stretch-backports-sloppy | 0.4.4.5-1~bpo9+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
stretch | 0.2.9.16-1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
stretch-security | 0.2.9.15-1 | amd64,arm64,armel,armhf,i386 |
bullseye-security | 0.4.5.16-1 | amd64,arm64,armhf,i386 |
jessie | 0.2.5.16-1 | amd64,armel,armhf,i386 |
jessie-security | 0.2.5.16-1 | amd64,armel,armhf,i386 |
bookworm | 0.4.7.16-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm-security | 0.4.7.16-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-backports | 0.4.7.13-1~bpo11+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-backports-sloppy | 0.4.8.12-1~bpo11+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
Debtags of package tor: |
interface | daemon |
network | client, routing, server |
role | program |
security | cryptography, privacy |
use | proxying, routing |
|
License: DFSG free
|
Tor ist ein verbindungsbasiertes, anonymes Kommunikationssystem mit
geringer Latenz.
Clients wählen von der Quelle aus über eine gewisse Anzahl an Knoten eine
Route aus und stellen eine »virtuelle Verbindung« darüber her, wobei jeder
Knoten jeweils nur seinen Vorgänger und Nachfolger kennt. Daten, die diese
Verbindung passieren, werden an jedem Knoten mit einem symmetrischen
Schlüssel entschlüsselt, wodurch der nächste Knoten bekannt wird.
Im Grunde stellt Tor ein verteiltes Netzwerk von Knoten bereit. Benutzer
schicken ihre TCP-Streams (Webdatenverkehr, ftp, ssh, usw.) über diese
Knoten. Empfänger, Beobachter und selbst die Knoten können diese Streams
nicht zurückverfolgen.
Dieses Paket aktiviert standardmäßig einen Tor-Client, kann aber auch einen
Knoten und/oder einen versteckten Dienst konfigurieren.
Clientanwendungen können das Tor-Netzwerk nutzen, indem sie sich mit der
lokalen SOCKS-Proxy-Schnittstelle verbinden, die von Ihrer Tor-Instanz
bereitgestellt wird. Wenn die Anwendung selbst SOCKS nicht unterstützt,
können sie einen SOCKS-Client wie etwa torsocks benutzen.
Beachten Sie, dass Tor keine Protokollsäuberung für den Verkehr der
Anwendung durchführt. Es besteht die Gefahr, dass Anwendungsprotokolle und
dazugehörige Programme dazu gebracht werden können, Informationen über den
Benutzer preiszugeben. Zur Lösung dieses Problems ist Tor abhängig von
Torbutton und ähnlichen Protokollsäuberungsprogrammen. Für einen
bestmöglichen Schutz beim Surfen im Web empfiehlt das Tor-Projekt das »Tor
Browser Bundle«. Das ist ein eigenständiger Tarball, der statisch gelinkte
Versionen von Tor, Torbutton und eine modifizierte Version von Firefox, die
diverse Probleme bezüglich der Privatsphäre behebt, umfasst.
|
|
tor-arm
|
Versions of package tor-arm |
Release | Version | Architectures |
buster | 2.1.0-2 | all |
bookworm | 2.1.0-2.2 | all |
jessie | 1.4.5.0-1 | all |
stretch | 1.4.5.0-1.1 | all |
bullseye | 2.1.0-2.1 | all |
Debtags of package tor-arm: |
role | program |
use | monitor |
|
License: DFSG free
|
Dies ist ein Übergangspaket. Es kann sicher entfernt werden.
|
|
tor-geoipdb
|
Versions of package tor-geoipdb |
Release | Version | Architectures |
bookworm | 0.4.7.16-1 | all |
bullseye-backports | 0.4.7.13-1~bpo11+1 | all |
buster-backports-sloppy | 0.4.7.10-1~bpo10+1 | all |
bullseye-security | 0.4.5.16-1 | all |
bullseye | 0.4.5.16-1 | all |
buster-backports | 0.4.5.10-1~bpo10+1 | all |
stretch-backports-sloppy | 0.4.4.5-1~bpo9+1 | all |
buster-security | 0.3.5.16-1+deb10u1 | all |
buster | 0.3.5.16-1 | all |
stretch-backports | 0.3.5.10-1~bpo9+1 | all |
stretch | 0.2.9.16-1 | all |
stretch-security | 0.2.9.15-1 | all |
jessie-security | 0.2.5.16-1 | all |
jessie | 0.2.5.16-1 | all |
sid | 0.4.8.13-2 | all |
trixie | 0.4.8.13-2 | all |
bookworm-backports | 0.4.8.12-1~bpo12+1 | all |
bullseye-backports-sloppy | 0.4.8.12-1~bpo11+1 | all |
bookworm-security | 0.4.7.16-1 | all |
Debtags of package tor-geoipdb: |
role | app-data |
security | privacy |
|
License: DFSG free
|
This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses
to countries.
Bridge relays (special Tor relays that aren't listed in the main Tor
directory) use this information to report which countries they see
connections from. These statistics enable the Tor network operators to
learn when certain countries start blocking access to bridges.
Clients can also use this to learn what country each relay is in, so
Tor controllers like arm or Vidalia can use it, or if they want to
configure path selection preferences.
|
|
torsocks
Nutzung SOCKS-freundlicher Anwendungen mit Tor
|
Versions of package torsocks |
Release | Version | Architectures |
stretch | 2.2.0-1+deb9u1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie | 2.0.0-3 | amd64,armel,armhf,i386 |
buster | 2.3.0-2 | amd64,arm64,armhf,i386 |
sid | 2.4.0-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
trixie | 2.4.0-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
bookworm | 2.4.0-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye | 2.3.0-3 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
Debtags of package torsocks: |
role | program |
security | privacy |
|
License: DFSG free
|
Torsocks ermöglicht es Ihnen, den Netzwerkverkehr einzelner
SOCKS-freundlicher Anwendungen über das Tor-Netzwerk umzuleiten. Außerdem
wird sichergestellt, dass DNS-Abfragen korrekt verarbeitet werden, und
blockiert explizit den gesamten UDP-Datenverkehr aus der betreffenden
Anwendung.
Es ist möglich, dass eine bestimmte Anwendung Benutzer-/Systemdaten auf
einer Ebene durchsickern lässt, die weder Tor noch Torsocks kontrollieren
können. Eine 100%ige Garantie kann nicht gegeben werden, dass Anwendungen
mit Tor sicher arbeiten.
|
|
Debian packages in contrib or non-free
torbrowser-launcher
helps download and run the Tor Browser Bundle
|
Versions of package torbrowser-launcher |
Release | Version | Architectures |
jessie | 0.1.9-1+deb8u3 (contrib) | amd64,i386 |
bullseye-backports | 0.3.6-2~bpo11+1 (contrib) | amd64,i386 |
stretch-backports-sloppy | 0.3.2-14~bpo9+1 (contrib) | amd64,i386 |
buster-backports | 0.3.3-6~bpo10+1 (contrib) | amd64,i386 |
bookworm | 0.3.6-2 (contrib) | amd64,i386 |
sid | 0.3.7-2 (contrib) | amd64,i386 |
bullseye | 0.3.3-6 (contrib) | amd64,i386 |
trixie | 0.3.7-2 (contrib) | amd64,i386 |
|
License: DFSG free, but needs non-free components
|
Tor Browser Launcher is intended to make the Tor Browser Bundle (TBB) easier
to maintain and use for GNU/Linux users. torbrowser-launcher handles
downloading the most recent version of TBB for you, in your language and for
your architecture. It also adds a "Tor Browser" application launcher to your
operating system's menu.
When you first launch Tor Browser Launcher, it will download TBB from
https://www.torproject.org/ and extract it to ~/.local/share/torbrowser,
and then execute it.
Cache and configuration files will be stored in ~/.cache/torbrowser and
~/.config/torbrowser.
Each subsequent execution after installation will simply launch the most
recent TBB, which is updated using Tor Browser's own update feature.
|
|