Anonymizing overlay network for TCP (The Onion Router)
Tor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "%{toruser}" user and a "%{torgroup}" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is very small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity. Authors: -------- - R. Dingledine <arma@seul.org>
- Links to home:tbr:sailfish / tor
Source Files (show unmerged sources)
Filename | Size | Changed | Actions |
---|---|---|---|
tor-0.2.4.23.tar.gz | 00029770062.84 MB | 1407439724over 9 years ago | |
tor-0.2.4.23.tar.gz.asc | 0000000836836 Bytes | 1407778472over 9 years ago | |
tor.changes | 0000113421111 KB | 1407778476over 9 years ago | |
tor.keyring | 0000195540191 KB | 1407778478over 9 years ago | |
tor.service | 0000000321321 Bytes | 1407778480over 9 years ago | |
tor.spec | 00000046334.52 KB | 1407854614over 9 years ago | |
tor.tmpfiles | 000000003232 Bytes | 1407843442over 9 years ago |