apt-transport-tor 0.5 source package in Ubuntu
Changelog
apt-transport-tor (0.5) unstable; urgency=medium * Document localhost vs 127.0.0.1 default proxy setting The change itself was in apt (>= 1.7) already (Closes: #895908) * List v3 instead of v2 onion addresses in README The old v2 addresses will stop working soon. (Closes: #990002) -- David Kalnischkies <email address hidden> Mon, 21 Jun 2021 12:14:55 +0200
Upload details
- Uploaded by:
- APT Development Team
- Uploaded to:
- Sid
- Original maintainer:
- APT Development Team
- Architectures:
- all
- Section:
- misc
- Urgency:
- Medium Urgency
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
apt-transport-tor_0.5.dsc | 1.7 KiB | 61bcd8ecbb1336514bff5defc15ecba43e9bd4ad394e31419d8b3a7e09705143 |
apt-transport-tor_0.5.tar.xz | 11.4 KiB | 262d73ad407d2bc5019b97bc3831cb9603b55b2809b18f2f9bb8091def089c5a |
Available diffs
- diff from 0.4 to 0.5 (2.5 KiB)
No changes file available.
Binary packages built by this source
- apt-transport-tor: APT transport for anonymous package downloads via Tor
Provides support in APT for downloading packages anonymously via the Tor
network.
.
APT already includes mechanisms for guaranteeing the authenticity of the
packages you download. However, an adversary sniffing your network traffic
can still see what software you are installing.
.
Install apt-transport-tor, edit your sources.list to include only tor://
URLs, and you can make it very difficult for anyone intercepting your
network traffic to be able to tell that you are installing Debian packages,
or which packages you are installing.
.
Please note that this approach is only as secure as Tor itself - this
software cannot protect you from an attacker who has access to your local
machine. In addition, attackers may be able to correlate your network
traffic with the packets coming out of an exit node, so do be careful.