Debian Sanctuary Project
Summary
Anonymous Browsing
Debian Anonymous Browsing Packages

This metapackage will install packages useful for browsing anonymously in Debian.

Description

For a better overview of the project's availability as a Debian package, each head row has a color code according to this scheme:

If you discover a project which looks like a good candidate for Debian Sanctuary to you, or if you have prepared an unofficial Debian package, please do not hesitate to send a description of that project to the Debian Sanctuary mailing list

Links to other tasks

Debian Sanctuary Anonymous Browsing packages

Official Debian packages with high relevance

corkscrew
tunnel TCP connections through HTTP proxies
Versions of package corkscrew
ReleaseVersionArchitectures
trixie2.0-15amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
sid2.0-15amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
jessie2.0-10amd64,armel,armhf,i386
stretch2.0-11amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bullseye2.0-13amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster2.0-11amd64,arm64,armhf,i386
bookworm2.0-14amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
Debtags of package corkscrew:
interfacecommandline
networkvpn
roleprogram
scopeutility
securityprivacy
useproxying
Popcon: 18 users (2 upd.)*
Versions and Archs
License: DFSG free
Git

corkscrew is a simple tool to tunnel TCP connections through an HTTP proxy supporting the CONNECT method. It reads stdin and writes to stdout during the connection, just like netcat.

It can be used for instance to connect to an SSH server running on a remote 443 port through a strict HTTPS proxy.

gnunet
GNU's framework for secure peer-to-peer networking
Versions of package gnunet
ReleaseVersionArchitectures
stretch0.10.1-4amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
buster0.10.1-5.1amd64,arm64,armhf,i386
bullseye0.13.1-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm0.19.3-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie0.20.0-6amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
sid0.20.0-6amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
jessie0.10.1-2.1amd64,armel,armhf,i386
upstream0.22.2
Debtags of package gnunet:
interfacecommandline, daemon
networkclient, server, service
roleprogram, shared-lib
securityauthentication
suitegnu
usechatting, downloading
Popcon: 35 users (10 upd.)*
Newer upstream!
License: DFSG free

GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. Its high-level goal is to provide a strong free software foundation for a global network that provides security and in particular respects privacy.

GNUnet started with an idea for anonymous censorship-resistant file-sharing, but has grown to incorporate other applications as well as many generic building blocks for secure networking applications. In particular, GNUnet now includes the GNU Name System, a privacy-preserving, decentralized public key infrastructure.

gnunet-fuse
secure, trust-based peer-to-peer framework (fuse filesystem client)
Versions of package gnunet-fuse
ReleaseVersionArchitectures
trixie0.20.0-3amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
jessie0.10.0-1amd64,armel,armhf,i386
stretch0.10.0-2amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
buster0.10.0-2amd64,arm64,armhf,i386
bullseye0.13.0-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm0.19.1-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
sid0.20.0-3amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
upstream0.22.0
Popcon: 4 users (1 upd.)*
Newer upstream!
License: DFSG free

GNUnet is a peer-to-peer framework which focuses on providing security. All link-to-link messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the peer-to-peer traffic in UDP, TCP, or SMTP messages.

This package contains the fuse filesystem client. In order use GNUnet, you also need gnunet either on your server or on your local machine.

gnunet-gtk
GNU's framework for secure peer-to-peer networking (GTK+ client)
Versions of package gnunet-gtk
ReleaseVersionArchitectures
trixie0.20.0-4amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
bullseye0.13.1-2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm0.19.0-4amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
sid0.20.0-4amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
buster0.10.1-5amd64,arm64,armhf,i386
stretch0.10.1-5amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie0.10.1-1amd64,armel,armhf,i386
upstream0.22.0
Debtags of package gnunet-gtk:
interfacecommandline, x11
networkclient
roleprogram
scopeapplication
securityauthentication
suitegnu
uitoolkitgtk
usechatting, downloading
x11application
Popcon: 5 users (1 upd.)*
Newer upstream!
License: DFSG free

GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. Its high-level goal is to provide a strong free software foundation for a global network that provides security and in particular respects privacy.

This package contains the graphical client, using the GTK+ toolkit. In order use GNUnet, you also need gnunet either on your server or on your local machine.

Screenshots of package gnunet-gtk
iodine
tool for tunneling IPv4 data through a DNS server
Maintainer: gregor herrmann
Versions of package iodine
ReleaseVersionArchitectures
sid0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
bookworm0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
jessie0.7.0-3amd64,armel,armhf,i386
stretch0.7.0-7amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
buster0.7.0-9amd64,arm64,armhf,i386
bullseye0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie0.7.0-10amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
upstream0.8.0
Debtags of package iodine:
interfacecommandline, daemon
networkclient, server, vpn
roleprogram
scopeutility
works-withnetwork-traffic
Popcon: 336 users (9 upd.)*
Newer upstream!
License: DFSG free
Git

This is a piece of software that lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed.

macchanger
utility for manipulating the MAC address of network interfaces
Versions of package macchanger
ReleaseVersionArchitectures
sid1.7.0-6amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
bookworm1.7.0-5.4amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye1.7.0-5.4amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster1.7.0-5.4amd64,arm64,armhf,i386
stretch1.7.0-5.3amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie1.7.0-5.3amd64,armel,armhf,i386
trixie1.7.0-6amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
Debtags of package macchanger:
networkconfiguration
roleprogram
scopeutility
suitegnu
useconfiguring
Popcon: 107 users (52 upd.)*
Versions and Archs
License: DFSG free
Git

GNU MAC Changer is an utility that makes the maniputation of MAC addresses of network interfaces easier. MAC addresses are unique identifiers on networks, they only need to be unique, they can be changed on most network hardware. MAC addresses have started to be abused by unscrupulous marketing firms, government agencies, and others to provide an easy way to track a computer across multiple networks. By changing the MAC address regularly, this kind of tracking can be thwarted, or at least made a lot more difficult.

Features:

  • set specific MAC address of a network interface
  • set the MAC randomly
  • set a MAC of another vendor
  • set another MAC of the same vendor
  • set a MAC of the same kind (eg: wireless card)
  • display a vendor MAC list (today, 6200 items) to choose from
Screenshots of package macchanger
mat
??? missing short description for package mat :-(
Versions of package mat
ReleaseVersionArchitectures
buster0.8.0-3+deb10u1all
bookworm0.13.3-1all
bullseye-security0.12.1-2+deb11u1all
bullseye0.12.1-2+deb11u1all
buster-backports0.10.0-1~bpo10+1all
jessie0.5.2-3+deb8u1all
jessie-security0.5.2-3+deb8u1all
stretch0.6.1-4all
buster-security0.8.0-3+deb10u1all
Popcon: 5 users (0 upd.)*
Versions and Archs
License: DFSG free
Git
Screenshots of package mat
obfs4proxy
pluggable transport proxy for Tor, implementing obfs4
Versions of package obfs4proxy
ReleaseVersionArchitectures
buster-security0.0.7-4+deb10u1amd64,arm64,armhf,i386
jessie0.0.3-2amd64,armel,armhf,i386
sid0.0.14-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
trixie0.0.14-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
buster0.0.7-4amd64,arm64,armhf,i386
stretch-security0.0.7-1+deb8u1amd64,arm64,armel,armhf,i386
stretch0.0.7-1amd64,arm64,armel,armhf,i386,ppc64el
jessie-security0.0.3-2+deb8u1amd64,armhf,i386
bookworm0.0.14-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye-backports0.0.14-1~bpo11amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
Popcon: 172 users (61 upd.)*
Versions and Archs
License: DFSG free
Git

obfs4proxy is a tool that attempts to circumvent censorship by transforming the Tor traffic between the client and the bridge. This way censors, who usually monitor traffic between the client and the bridge, will see innocent-looking transformed traffic instead of the actual Tor traffic.

obfs4proxy implements the obfuscation protocols obfs2, obfs3, and obfs4.

It is written in Go and is compliant with the Tor pluggable transports specification, and its modular architecture allows it to support multiple pluggable transports.

This package contains both the client and the bridge in a single program.

obfsproxy
pluggable transport proxy for Tor
Versions of package obfsproxy
ReleaseVersionArchitectures
jessie0.2.12-1all
stretch0.2.13-2+deb9u1all
buster0.2.13-3all
Popcon: 3 users (0 upd.)*
Versions and Archs
License: DFSG free
Git

obfsproxy is a tool that attempts to circumvent censorship by transforming the Tor traffic between the client and the bridge. This way censors, who usually monitor traffic between the client and the bridge, will see innocent-looking transformed traffic instead of the actual Tor traffic.

It is written in Python and is compliant with the Tor pluggable transports specification, and its modular architecture allows it to support multiple pluggable transports.

onioncat
??? missing short description for package onioncat :-(
Versions of package onioncat
ReleaseVersionArchitectures
stretch0.2.2+svn569-2amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie0.2.2+svn559-2amd64,armel,armhf,i386
Popcon: 0 users (0 upd.)*
Versions and Archs
License: DFSG free
Git
onionshare
Share a file over Tor Hidden Services anonymously and securely
Versions of package onionshare
ReleaseVersionArchitectures
trixie2.6.2-4all
jessie0.6-3 (contrib)all
bullseye2.2-3+deb11u2all
sid2.6.2-4all
stretch-backports1.3-1~bpo9+1all
buster1.3.2-1all
bookworm2.6-5~deb12u1all
Popcon: 30 users (8 upd.)*
Versions and Archs
License: DFSG free
Git

OnionShare lets you securely and anonymously share a file of any size with someone. It works by starting a web server, making it accessible as a Tor hidden service, and generating an unguessable URL to access and download the file. It doesn't require setting up a server on the Internet somewhere or using a third party filesharing service. You host the file on your own computer and use a Tor hidden service to make it temporarily accessible over the Internet. The other user just needs to use the Tor Browser and TO Enter the URL to download the file from you.

Screenshots of package onionshare
openvpn
virtual private network daemon
Maintainer: Bernhard Schmidt
Versions of package openvpn
ReleaseVersionArchitectures
buster2.4.7-1+deb10u1amd64,arm64,armhf,i386
jessie2.3.4-5+deb8u2amd64,armel,armhf,i386
jessie-security2.3.4-5+deb8u2amd64,armel,armhf,i386
stretch2.4.0-6+deb9u3amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
stretch-security2.4.0-6+deb9u4amd64,arm64,armel,armhf,i386
stretch-backports2.4.7-1~bpo9+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
buster-backports2.5.1-2~bpo10+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bullseye2.5.1-3amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye-backports2.6.3-1+deb12u2~bpo11+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm2.6.3-1+deb12u2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm-security2.6.3-1+deb12u2amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie2.6.12-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
sid2.6.12-1amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
Debtags of package openvpn:
interfacecommandline, daemon
networkserver, vpn
roleprogram
securitycryptography
userouting
Popcon: 22267 users (226 upd.)*
Versions and Archs
License: DFSG free
Git

OpenVPN is an application to securely tunnel IP networks over a single UDP or TCP port. It can be used to access remote sites, make secure point-to-point connections, enhance wireless security, etc.

OpenVPN uses all of the encryption, authentication, and certification features provided by the OpenSSL library (any cipher, key size, or HMAC digest).

OpenVPN may use static, pre-shared keys or TLS-based dynamic key exchange. It also supports VPNs with dynamic endpoints (DHCP or dial-up clients), tunnels over NAT or connection-oriented stateful firewalls (such as Linux's iptables).

The package is enhanced by the following packages: openvpn-dco-dkms
privoxy
Privacy enhancing HTTP Proxy
Maintainer: Roland Rosenfeld
Versions of package privoxy
ReleaseVersionArchitectures
bookworm3.0.34-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye3.0.32-2+deb11u1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster3.0.28-2+deb10u2amd64,arm64,armhf,i386
stretch-security3.0.26-3+deb9u3amd64,arm64,armel,armhf,i386
stretch3.0.26-3amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
jessie-security3.0.21-7+deb8u1amd64,armel,armhf,i386
jessie3.0.21-7+deb8u1amd64,armel,armhf,i386
sid3.0.34-6amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
trixie3.0.34-6amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
Debtags of package privoxy:
interfacedaemon, web
networkserver
roleprogram
securityprivacy
useproxying
webserver
Popcon: 900 users (3 upd.)*
Versions and Archs
License: DFSG free
Git

Privoxy is a web proxy with advanced filtering capabilities for protecting privacy, filtering web page content, managing cookies, controlling access, and removing ads, banners, pop-ups and other obnoxious Internet junk. Privoxy has a very flexible configuration and can be customized to suit individual needs and tastes. Privoxy has application for both stand-alone systems and multi-user networks.

Privoxy is based on Internet Junkbuster (tm).

Screenshots of package privoxy
tor
anonymizing overlay network for TCP
Maintainer: Peter Palfrader
Versions of package tor
ReleaseVersionArchitectures
bookworm-backports0.4.8.12-1~bpo12+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
stretch-backports-sloppy0.4.4.5-1~bpo9+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
trixie0.4.8.13-2amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
sid0.4.8.13-2amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
jessie-security0.2.5.16-1amd64,armel,armhf,i386
buster0.3.5.16-1amd64,arm64,armhf,i386
bullseye-backports0.4.7.13-1~bpo11+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
jessie0.2.5.16-1amd64,armel,armhf,i386
stretch-backports0.3.5.10-1~bpo9+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
buster-security0.3.5.16-1+deb10u1amd64,arm64,armhf,i386
stretch0.2.9.16-1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
stretch-security0.2.9.15-1amd64,arm64,armel,armhf,i386
bookworm0.4.7.16-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster-backports-sloppy0.4.7.10-1~bpo10+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
bookworm-security0.4.7.16-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye-security0.4.5.16-1amd64,arm64,armhf,i386
bullseye0.4.5.16-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bullseye-backports-sloppy0.4.8.12-1~bpo11+1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
buster-backports0.4.5.10-1~bpo10+1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
Debtags of package tor:
interfacedaemon
networkclient, routing, server
roleprogram
securitycryptography, privacy
useproxying, routing
Popcon: 5889 users (72 upd.)*
Versions and Archs
License: DFSG free
Git

Tor is a connection-based low-latency anonymous communication system.

Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay.

Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations.

This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily.

Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks.

Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.

The package is enhanced by the following packages: obfsproxy redsocks
Screenshots of package tor
tor-arm
过渡软件包
Versions of package tor-arm
ReleaseVersionArchitectures
stretch1.4.5.0-1.1all
jessie1.4.5.0-1all
buster2.1.0-2all
bullseye2.1.0-2.1all
bookworm2.1.0-2.2all
Debtags of package tor-arm:
roleprogram
usemonitor
Popcon: 1 users (0 upd.)*
Versions and Archs
License: DFSG free
Git

这是过渡用软件包。它可以被安全地移除。

tor-geoipdb
GeoIP database for Tor
Maintainer: Peter Palfrader
Versions of package tor-geoipdb
ReleaseVersionArchitectures
bookworm-security0.4.7.16-1all
buster-backports-sloppy0.4.7.10-1~bpo10+1all
jessie-security0.2.5.16-1all
stretch-backports0.3.5.10-1~bpo9+1all
buster0.3.5.16-1all
buster-security0.3.5.16-1+deb10u1all
jessie0.2.5.16-1all
bullseye-backports0.4.7.13-1~bpo11+1all
sid0.4.8.13-2all
trixie0.4.8.13-2all
stretch-backports-sloppy0.4.4.5-1~bpo9+1all
buster-backports0.4.5.10-1~bpo10+1all
bookworm-backports0.4.8.12-1~bpo12+1all
bullseye-backports-sloppy0.4.8.12-1~bpo11+1all
bullseye0.4.5.16-1all
bullseye-security0.4.5.16-1all
stretch-security0.2.9.15-1all
bookworm0.4.7.16-1all
stretch0.2.9.16-1all
Debtags of package tor-geoipdb:
roleapp-data
securityprivacy
Popcon: 48 users (1 upd.)*
Versions and Archs
License: DFSG free
Git

This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses to countries.

Bridge relays (special Tor relays that aren't listed in the main Tor directory) use this information to report which countries they see connections from. These statistics enable the Tor network operators to learn when certain countries start blocking access to bridges.

Clients can also use this to learn what country each relay is in, so Tor controllers like arm or Vidalia can use it, or if they want to configure path selection preferences.

torsocks
use SOCKS-friendly applications with Tor
Versions of package torsocks
ReleaseVersionArchitectures
jessie2.0.0-3amd64,armel,armhf,i386
buster2.3.0-2amd64,arm64,armhf,i386
bullseye2.3.0-3amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
bookworm2.4.0-1amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x
trixie2.4.0-2amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
sid2.4.0-2amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x
stretch2.2.0-1+deb9u1amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x
Debtags of package torsocks:
roleprogram
securityprivacy
Popcon: 4842 users (167 upd.)*
Versions and Archs
License: DFSG free
Git

Torsocks allows you to redirect network traffic of individual SOCKS-friendly applications through the Tor network. It also ensures DNS queries are handled correctly and explicitly blocks all UDP traffic from the application in question. It is possible that a given application can leak user/system data at a level that neither Tor nor torsocks can control, a 100% guarantee of being safe to operate with Tor can not be given for applications.

Debian packages in contrib or non-free

torbrowser-launcher
helps download and run the Tor Browser Bundle
Versions of package torbrowser-launcher
ReleaseVersionArchitectures
buster-backports0.3.3-6~bpo10+1 (contrib)amd64,i386
bullseye0.3.3-6 (contrib)amd64,i386
jessie0.1.9-1+deb8u3 (contrib)amd64,i386
bookworm0.3.6-2 (contrib)amd64,i386
trixie0.3.7-2 (contrib)amd64,i386
bullseye-backports0.3.6-2~bpo11+1 (contrib)amd64,i386
stretch-backports-sloppy0.3.2-14~bpo9+1 (contrib)amd64,i386
sid0.3.7-2 (contrib)amd64,i386
Popcon: 1364 users (115 upd.)*
Versions and Archs
License: DFSG free, but needs non-free components
Git

Tor Browser Launcher is intended to make the Tor Browser Bundle (TBB) easier to maintain and use for GNU/Linux users. torbrowser-launcher handles downloading the most recent version of TBB for you, in your language and for your architecture. It also adds a "Tor Browser" application launcher to your operating system's menu.

When you first launch Tor Browser Launcher, it will download TBB from https://www.torproject.org/ and extract it to ~/.local/share/torbrowser, and then execute it. Cache and configuration files will be stored in ~/.cache/torbrowser and ~/.config/torbrowser. Each subsequent execution after installation will simply launch the most recent TBB, which is updated using Tor Browser's own update feature.

*Popularitycontest results: number of people who use this package regularly (number of people who upgraded this package recently) out of 248469