blob: d52bfe515c0c38c11dab87b7d3499be2d8d28b2c (
plain) (
tree)
|
|
SPELL=tor
VERSION=0.4.6.8
SECURITY_PATCH=16
SOURCE=${SPELL}-${VERSION}.tar.gz
SOURCE2=${SOURCE}.asc
SOURCE_URL[0]=https://www.torproject.org/dist/${SOURCE}
SOURCE2_URL[0]=${SOURCE_URL[0]}.asc
SOURCE_URL[1]=http://ftp.sourcemage.us/mirror/${SOURCE}
SOURCE2_URL[1]=${SOURCE_URL[1]}.asc
SOURCE_GPG=tor.gpg:${SOURCE2}:UPSTREAM_KEY
SOURCE2_IGNORE=signature
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
LICENSE[0]=BSD
WEB_SITE=http://www.torproject.org/
ENTERED=20050415
KEYWORDS="net"
SHORT="anonymous Internet communication system"
cat << EOF
Tor is a toolset for a wide range of organizations and people that want to
improve their safety and security on the Internet. Using Tor can help you
anonymize web browsing and publishing, instant messaging, IRC, SSH, and
more. Tor also provides a platform on which software developers can build
new applications with built-in anonymity, safety, and privacy features.
Your traffic is safer when you use Tor, because communications are bounced
around a distributed network of servers, called onion routers. Instead
of taking a direct route from source to destination, data packets on
the Tor network take a random pathway through several servers that
cover your tracks so no observer at any single point can tell where the
data came from or where it's going. This makes it hard for recipients,
observers, and even the onion routers themselves to figure out who and
where you are. Tor's technology aims to provide Internet users with
protection against "traffic analysis," a form of network surveillance
that threatens personal anonymity and privacy, confidential business
activities and relationships, and state security.
EOF
|