Summary
Anonymous Browsing
Debian Anonymous Browsing Packages
This metapackage will install packages useful for browsing anonymously in
Debian.
Description
For a better overview of the project's availability as a Debian package, each head row has a color code according to this scheme:
If you discover a project which looks like a good candidate for Debian Sanctuary
to you, or if you have prepared an unofficial Debian package, please do not hesitate to
send a description of that project to the Debian Sanctuary mailing list
Links to other tasks
|
Debian Sanctuary Anonymous Browsing packages
Official Debian packages with high relevance
corkscrew
tunnel TCP connections through HTTP proxies
|
Versions of package corkscrew |
Release | Version | Architectures |
trixie | 2.0-15 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 2.0-15 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie | 2.0-10 | amd64,armel,armhf,i386 |
stretch | 2.0-11 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
bullseye | 2.0-13 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster | 2.0-11 | amd64,arm64,armhf,i386 |
bookworm | 2.0-14 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
Debtags of package corkscrew: |
interface | commandline |
network | vpn |
role | program |
scope | utility |
security | privacy |
use | proxying |
|
License: DFSG free
|
corkscrew is a simple tool to tunnel TCP connections through an HTTP
proxy supporting the CONNECT method. It reads stdin and writes to
stdout during the connection, just like netcat.
It can be used for instance to connect to an SSH server running on
a remote 443 port through a strict HTTPS proxy.
|
|
gnunet
GNU's framework for secure peer-to-peer networking
|
Versions of package gnunet |
Release | Version | Architectures |
stretch | 0.10.1-4 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster | 0.10.1-5.1 | amd64,arm64,armhf,i386 |
bullseye | 0.13.1-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 0.19.3-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 0.20.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 0.20.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie | 0.10.1-2.1 | amd64,armel,armhf,i386 |
upstream | 0.22.2 |
Debtags of package gnunet: |
interface | commandline, daemon |
network | client, server, service |
role | program, shared-lib |
security | authentication |
suite | gnu |
use | chatting, downloading |
|
License: DFSG free
|
GNUnet is a framework for secure peer-to-peer networking that does not use any
centralized or otherwise trusted services. Its high-level goal is to provide a
strong free software foundation for a global network that provides security
and in particular respects privacy.
GNUnet started with an idea for anonymous censorship-resistant file-sharing,
but has grown to incorporate other applications as well as many generic
building blocks for secure networking applications. In particular, GNUnet now
includes the GNU Name System, a privacy-preserving, decentralized public key
infrastructure.
|
|
gnunet-fuse
secure, trust-based peer-to-peer framework (fuse filesystem client)
|
Versions of package gnunet-fuse |
Release | Version | Architectures |
trixie | 0.20.0-3 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie | 0.10.0-1 | amd64,armel,armhf,i386 |
stretch | 0.10.0-2 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster | 0.10.0-2 | amd64,arm64,armhf,i386 |
bullseye | 0.13.0-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 0.19.1-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
sid | 0.20.0-3 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
upstream | 0.22.0 |
|
License: DFSG free
|
GNUnet is a peer-to-peer framework which focuses on providing security. All
link-to-link messages in the network are confidential and authenticated. The
framework provides a transport abstraction layer and can currently encapsulate
the peer-to-peer traffic in UDP, TCP, or SMTP messages.
This package contains the fuse filesystem client. In order use GNUnet, you also
need gnunet either on your server or on your local machine.
|
|
gnunet-gtk
GNU's framework for secure peer-to-peer networking (GTK+ client)
|
Versions of package gnunet-gtk |
Release | Version | Architectures |
trixie | 0.20.0-4 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
bullseye | 0.13.1-2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 0.19.0-4 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
sid | 0.20.0-4 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
buster | 0.10.1-5 | amd64,arm64,armhf,i386 |
stretch | 0.10.1-5 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie | 0.10.1-1 | amd64,armel,armhf,i386 |
upstream | 0.22.0 |
Debtags of package gnunet-gtk: |
interface | commandline, x11 |
network | client |
role | program |
scope | application |
security | authentication |
suite | gnu |
uitoolkit | gtk |
use | chatting, downloading |
x11 | application |
|
License: DFSG free
|
GNUnet is a framework for secure peer-to-peer networking that does not use any
centralized or otherwise trusted services. Its high-level goal is to provide a
strong free software foundation for a global network that provides security
and in particular respects privacy.
This package contains the graphical client, using the GTK+ toolkit. In order
use GNUnet, you also need gnunet either on your server or on your local
machine.
|
|
iodine
tool for tunneling IPv4 data through a DNS server
|
Versions of package iodine |
Release | Version | Architectures |
sid | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
bookworm | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
jessie | 0.7.0-3 | amd64,armel,armhf,i386 |
stretch | 0.7.0-7 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster | 0.7.0-9 | amd64,arm64,armhf,i386 |
bullseye | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 0.7.0-10 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
upstream | 0.8.0 |
Debtags of package iodine: |
interface | commandline, daemon |
network | client, server, vpn |
role | program |
scope | utility |
works-with | network-traffic |
|
License: DFSG free
|
This is a piece of software that lets you tunnel IPv4 data through a DNS
server. This can be usable in different situations where internet access is
firewalled, but DNS queries are allowed.
|
|
macchanger
utility for manipulating the MAC address of network interfaces
|
Versions of package macchanger |
Release | Version | Architectures |
sid | 1.7.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
bookworm | 1.7.0-5.4 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye | 1.7.0-5.4 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster | 1.7.0-5.4 | amd64,arm64,armhf,i386 |
stretch | 1.7.0-5.3 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie | 1.7.0-5.3 | amd64,armel,armhf,i386 |
trixie | 1.7.0-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
Debtags of package macchanger: |
network | configuration |
role | program |
scope | utility |
suite | gnu |
use | configuring |
|
License: DFSG free
|
GNU MAC Changer is an utility that makes the maniputation of MAC addresses of
network interfaces easier. MAC addresses are unique identifiers on networks,
they only need to be unique, they can be changed on most network hardware.
MAC addresses have started to be abused by unscrupulous marketing firms,
government agencies, and others to provide an easy way to track a computer
across multiple networks. By changing the MAC address regularly, this kind
of tracking can be thwarted, or at least made a lot more difficult.
Features:
- set specific MAC address of a network interface
- set the MAC randomly
- set a MAC of another vendor
- set another MAC of the same vendor
- set a MAC of the same kind (eg: wireless card)
- display a vendor MAC list (today, 6200 items) to choose from
|
|
mat
??? missing short description for package mat :-(
|
Versions of package mat |
Release | Version | Architectures |
buster | 0.8.0-3+deb10u1 | all |
bookworm | 0.13.3-1 | all |
bullseye-security | 0.12.1-2+deb11u1 | all |
bullseye | 0.12.1-2+deb11u1 | all |
buster-backports | 0.10.0-1~bpo10+1 | all |
jessie | 0.5.2-3+deb8u1 | all |
jessie-security | 0.5.2-3+deb8u1 | all |
stretch | 0.6.1-4 | all |
buster-security | 0.8.0-3+deb10u1 | all |
|
License: DFSG free
|
|
|
obfs4proxy
pluggable transport proxy for Tor, implementing obfs4
|
Versions of package obfs4proxy |
Release | Version | Architectures |
buster-security | 0.0.7-4+deb10u1 | amd64,arm64,armhf,i386 |
jessie | 0.0.3-2 | amd64,armel,armhf,i386 |
sid | 0.0.14-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
trixie | 0.0.14-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
buster | 0.0.7-4 | amd64,arm64,armhf,i386 |
stretch-security | 0.0.7-1+deb8u1 | amd64,arm64,armel,armhf,i386 |
stretch | 0.0.7-1 | amd64,arm64,armel,armhf,i386,ppc64el |
jessie-security | 0.0.3-2+deb8u1 | amd64,armhf,i386 |
bookworm | 0.0.14-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-backports | 0.0.14-1~bpo11 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
|
License: DFSG free
|
obfs4proxy is a tool that attempts to circumvent censorship by
transforming the Tor traffic between the client and the bridge. This way
censors, who usually monitor traffic between the client and the bridge, will
see innocent-looking transformed traffic instead of the actual Tor traffic.
obfs4proxy implements the obfuscation protocols obfs2, obfs3, and obfs4.
It is written in Go and is compliant with the Tor pluggable transports
specification, and its modular architecture allows it to support multiple
pluggable transports.
This package contains both the client and the bridge in a single program.
|
|
obfsproxy
pluggable transport proxy for Tor
|
Versions of package obfsproxy |
Release | Version | Architectures |
jessie | 0.2.12-1 | all |
stretch | 0.2.13-2+deb9u1 | all |
buster | 0.2.13-3 | all |
|
License: DFSG free
|
obfsproxy is a tool that attempts to circumvent censorship by
transforming the Tor traffic between the client and the bridge. This way
censors, who usually monitor traffic between the client and the bridge, will
see innocent-looking transformed traffic instead of the actual Tor traffic.
It is written in Python and is compliant with the Tor pluggable transports
specification, and its modular architecture allows it to support multiple
pluggable transports.
|
|
onioncat
??? missing short description for package onioncat :-(
|
Versions of package onioncat |
Release | Version | Architectures |
stretch | 0.2.2+svn569-2 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie | 0.2.2+svn559-2 | amd64,armel,armhf,i386 |
|
License: DFSG free
|
|
|
onionshare
Share a file over Tor Hidden Services anonymously and securely
|
Versions of package onionshare |
Release | Version | Architectures |
trixie | 2.6.2-4 | all |
jessie | 0.6-3 (contrib) | all |
bullseye | 2.2-3+deb11u2 | all |
sid | 2.6.2-4 | all |
stretch-backports | 1.3-1~bpo9+1 | all |
buster | 1.3.2-1 | all |
bookworm | 2.6-5~deb12u1 | all |
|
License: DFSG free
|
OnionShare lets you securely and anonymously share a file of any size with
someone. It works by starting a web server, making it accessible as a Tor
hidden service, and generating an unguessable URL to access and download
the file. It doesn't require setting up a server on the Internet somewhere
or using a third party filesharing service. You host the file on your own
computer and use a Tor hidden service to make it temporarily accessible
over the Internet. The other user just needs to use the Tor Browser and
TO Enter the URL to download the file from you.
|
|
openvpn
virtual private network daemon
|
Versions of package openvpn |
Release | Version | Architectures |
buster | 2.4.7-1+deb10u1 | amd64,arm64,armhf,i386 |
jessie | 2.3.4-5+deb8u2 | amd64,armel,armhf,i386 |
jessie-security | 2.3.4-5+deb8u2 | amd64,armel,armhf,i386 |
stretch | 2.4.0-6+deb9u3 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
stretch-security | 2.4.0-6+deb9u4 | amd64,arm64,armel,armhf,i386 |
stretch-backports | 2.4.7-1~bpo9+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster-backports | 2.5.1-2~bpo10+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
bullseye | 2.5.1-3 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-backports | 2.6.3-1+deb12u2~bpo11+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 2.6.3-1+deb12u2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm-security | 2.6.3-1+deb12u2 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 2.6.12-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 2.6.12-1 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
Debtags of package openvpn: |
interface | commandline, daemon |
network | server, vpn |
role | program |
security | cryptography |
use | routing |
|
License: DFSG free
|
OpenVPN is an application to securely tunnel IP networks over a
single UDP or TCP port. It can be used to access remote sites, make
secure point-to-point connections, enhance wireless security, etc.
OpenVPN uses all of the encryption, authentication, and certification
features provided by the OpenSSL library (any cipher, key size, or
HMAC digest).
OpenVPN may use static, pre-shared keys or TLS-based dynamic key exchange. It
also supports VPNs with dynamic endpoints (DHCP or dial-up clients), tunnels
over NAT or connection-oriented stateful firewalls (such as Linux's iptables).
|
|
privoxy
Privacy enhancing HTTP Proxy
|
Versions of package privoxy |
Release | Version | Architectures |
bookworm | 3.0.34-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye | 3.0.32-2+deb11u1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster | 3.0.28-2+deb10u2 | amd64,arm64,armhf,i386 |
stretch-security | 3.0.26-3+deb9u3 | amd64,arm64,armel,armhf,i386 |
stretch | 3.0.26-3 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
jessie-security | 3.0.21-7+deb8u1 | amd64,armel,armhf,i386 |
jessie | 3.0.21-7+deb8u1 | amd64,armel,armhf,i386 |
sid | 3.0.34-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
trixie | 3.0.34-6 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
Debtags of package privoxy: |
interface | daemon, web |
network | server |
role | program |
security | privacy |
use | proxying |
web | server |
|
License: DFSG free
|
Privoxy is a web proxy with advanced filtering capabilities for
protecting privacy, filtering web page content, managing cookies,
controlling access, and removing ads, banners, pop-ups and other
obnoxious Internet junk. Privoxy has a very flexible configuration
and can be customized to suit individual needs and tastes. Privoxy
has application for both stand-alone systems and multi-user networks.
Privoxy is based on Internet Junkbuster (tm).
|
|
tor
anonymizing overlay network for TCP
|
Versions of package tor |
Release | Version | Architectures |
bookworm-backports | 0.4.8.12-1~bpo12+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
stretch-backports-sloppy | 0.4.4.5-1~bpo9+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
trixie | 0.4.8.13-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 0.4.8.13-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
jessie-security | 0.2.5.16-1 | amd64,armel,armhf,i386 |
buster | 0.3.5.16-1 | amd64,arm64,armhf,i386 |
bullseye-backports | 0.4.7.13-1~bpo11+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
jessie | 0.2.5.16-1 | amd64,armel,armhf,i386 |
stretch-backports | 0.3.5.10-1~bpo9+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
buster-security | 0.3.5.16-1+deb10u1 | amd64,arm64,armhf,i386 |
stretch | 0.2.9.16-1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
stretch-security | 0.2.9.15-1 | amd64,arm64,armel,armhf,i386 |
bookworm | 0.4.7.16-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster-backports-sloppy | 0.4.7.10-1~bpo10+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
bookworm-security | 0.4.7.16-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-security | 0.4.5.16-1 | amd64,arm64,armhf,i386 |
bullseye | 0.4.5.16-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bullseye-backports-sloppy | 0.4.8.12-1~bpo11+1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
buster-backports | 0.4.5.10-1~bpo10+1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
Debtags of package tor: |
interface | daemon |
network | client, routing, server |
role | program |
security | cryptography, privacy |
use | proxying, routing |
|
License: DFSG free
|
Tor is a connection-based low-latency anonymous communication system.
Clients choose a source-routed path through a set of relays, and
negotiate a "virtual circuit" through the network, in which each relay
knows its predecessor and successor, but no others. Traffic flowing
down the circuit is decrypted at each relay, which reveals the
downstream relay.
Basically, Tor provides a distributed network of relays. Users bounce
their TCP streams (web traffic, ftp, ssh, etc) around the relays, and
recipients, observers, and even the relays themselves have difficulty
learning which users connected to which destinations.
This package enables only a Tor client by default, but it can also be
configured as a relay and/or a hidden service easily.
Client applications can use the Tor network by connecting to the local
socks proxy interface provided by your Tor instance. If the application
itself does not come with socks support, you can use a socks client
such as torsocks.
Note that Tor does no protocol cleaning on application traffic. There
is a danger that application protocols and associated programs can be
induced to reveal information about the user. Tor depends on Torbutton
and similar protocol cleaners to solve this problem. For best
protection when web surfing, the Tor Project recommends that you use
the Tor Browser Bundle, a standalone tarball that includes static
builds of Tor, Torbutton, and a modified Firefox that is patched to fix
a variety of privacy bugs.
|
|
tor-arm
|
Versions of package tor-arm |
Release | Version | Architectures |
stretch | 1.4.5.0-1.1 | all |
jessie | 1.4.5.0-1 | all |
buster | 2.1.0-2 | all |
bullseye | 2.1.0-2.1 | all |
bookworm | 2.1.0-2.2 | all |
Debtags of package tor-arm: |
role | program |
use | monitor |
|
License: DFSG free
|
这是过渡用软件包。它可以被安全地移除。
|
|
tor-geoipdb
|
Versions of package tor-geoipdb |
Release | Version | Architectures |
bookworm-security | 0.4.7.16-1 | all |
buster-backports-sloppy | 0.4.7.10-1~bpo10+1 | all |
jessie-security | 0.2.5.16-1 | all |
stretch-backports | 0.3.5.10-1~bpo9+1 | all |
buster | 0.3.5.16-1 | all |
buster-security | 0.3.5.16-1+deb10u1 | all |
jessie | 0.2.5.16-1 | all |
bullseye-backports | 0.4.7.13-1~bpo11+1 | all |
sid | 0.4.8.13-2 | all |
trixie | 0.4.8.13-2 | all |
stretch-backports-sloppy | 0.4.4.5-1~bpo9+1 | all |
buster-backports | 0.4.5.10-1~bpo10+1 | all |
bookworm-backports | 0.4.8.12-1~bpo12+1 | all |
bullseye-backports-sloppy | 0.4.8.12-1~bpo11+1 | all |
bullseye | 0.4.5.16-1 | all |
bullseye-security | 0.4.5.16-1 | all |
stretch-security | 0.2.9.15-1 | all |
bookworm | 0.4.7.16-1 | all |
stretch | 0.2.9.16-1 | all |
Debtags of package tor-geoipdb: |
role | app-data |
security | privacy |
|
License: DFSG free
|
This package provides a GeoIP database for Tor, i.e. it maps IPv4 addresses
to countries.
Bridge relays (special Tor relays that aren't listed in the main Tor
directory) use this information to report which countries they see
connections from. These statistics enable the Tor network operators to
learn when certain countries start blocking access to bridges.
Clients can also use this to learn what country each relay is in, so
Tor controllers like arm or Vidalia can use it, or if they want to
configure path selection preferences.
|
|
torsocks
use SOCKS-friendly applications with Tor
|
Versions of package torsocks |
Release | Version | Architectures |
jessie | 2.0.0-3 | amd64,armel,armhf,i386 |
buster | 2.3.0-2 | amd64,arm64,armhf,i386 |
bullseye | 2.3.0-3 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
bookworm | 2.4.0-1 | amd64,arm64,armel,armhf,i386,mips64el,mipsel,ppc64el,s390x |
trixie | 2.4.0-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
sid | 2.4.0-2 | amd64,arm64,armel,armhf,i386,mips64el,ppc64el,riscv64,s390x |
stretch | 2.2.0-1+deb9u1 | amd64,arm64,armel,armhf,i386,mips,mips64el,mipsel,ppc64el,s390x |
Debtags of package torsocks: |
role | program |
security | privacy |
|
License: DFSG free
|
Torsocks allows you to redirect network traffic of individual SOCKS-friendly
applications through the Tor network. It also ensures DNS queries are handled
correctly and explicitly blocks all UDP traffic from the application in
question.
It is possible that a given application can leak user/system data at a level
that neither Tor nor torsocks can control, a 100% guarantee of being safe to
operate with Tor can not be given for applications.
|
|
Debian packages in contrib or non-free
torbrowser-launcher
helps download and run the Tor Browser Bundle
|
Versions of package torbrowser-launcher |
Release | Version | Architectures |
buster-backports | 0.3.3-6~bpo10+1 (contrib) | amd64,i386 |
bullseye | 0.3.3-6 (contrib) | amd64,i386 |
jessie | 0.1.9-1+deb8u3 (contrib) | amd64,i386 |
bookworm | 0.3.6-2 (contrib) | amd64,i386 |
trixie | 0.3.7-2 (contrib) | amd64,i386 |
bullseye-backports | 0.3.6-2~bpo11+1 (contrib) | amd64,i386 |
stretch-backports-sloppy | 0.3.2-14~bpo9+1 (contrib) | amd64,i386 |
sid | 0.3.7-2 (contrib) | amd64,i386 |
|
License: DFSG free, but needs non-free components
|
Tor Browser Launcher is intended to make the Tor Browser Bundle (TBB) easier
to maintain and use for GNU/Linux users. torbrowser-launcher handles
downloading the most recent version of TBB for you, in your language and for
your architecture. It also adds a "Tor Browser" application launcher to your
operating system's menu.
When you first launch Tor Browser Launcher, it will download TBB from
https://www.torproject.org/ and extract it to ~/.local/share/torbrowser,
and then execute it.
Cache and configuration files will be stored in ~/.cache/torbrowser and
~/.config/torbrowser.
Each subsequent execution after installation will simply launch the most
recent TBB, which is updated using Tor Browser's own update feature.
|
|