summaryrefslogtreecommitdiffstats
path: root/net/tor/DETAILS
blob: 850b19c7ab7efd466f1154cd8783e17fa51618d5 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
           SPELL=tor
         VERSION=0.4.6.7
  SECURITY_PATCH=16
          SOURCE=${SPELL}-${VERSION}.tar.gz
         SOURCE2=${SOURCE}.asc
   SOURCE_URL[0]=https://www.torproject.org/dist/${SOURCE}
  SOURCE2_URL[0]=${SOURCE_URL[0]}.asc
   SOURCE_URL[1]=http://ftp.sourcemage.us/mirror/${SOURCE}
  SOURCE2_URL[1]=${SOURCE_URL[1]}.asc
      SOURCE_GPG=tor.gpg:${SOURCE2}:UPSTREAM_KEY
  SOURCE2_IGNORE=signature
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
      LICENSE[0]=BSD
        WEB_SITE=http://www.torproject.org/
         ENTERED=20050415
        KEYWORDS="net"
           SHORT="anonymous Internet communication system"
cat << EOF
Tor is a toolset for a wide range of organizations and people that want to
improve their safety and security on the Internet. Using Tor can help you
anonymize web browsing and publishing, instant messaging, IRC, SSH, and
more. Tor also provides a platform on which software developers can build
new applications with built-in anonymity, safety, and privacy features.

Your traffic is safer when you use Tor, because communications are bounced
around a distributed network of servers, called onion routers. Instead
of taking a direct route from source to destination, data packets on
the Tor network take a random pathway through several servers that
cover your tracks so no observer at any single point can tell where the
data came from or where it's going. This makes it hard for recipients,
observers, and even the onion routers themselves to figure out who and
where you are. Tor's technology aims to provide Internet users with
protection against "traffic analysis," a form of network surveillance
that threatens personal anonymity and privacy, confidential business
activities and relationships, and state security.
EOF