summaryrefslogtreecommitdiff
path: root/debian/control
diff options
context:
space:
mode:
authorDavid Kalnischkies <david@kalnischkies.de>2016-08-26 09:35:42 +0200
committerDavid Kalnischkies <david@kalnischkies.de>2016-08-26 09:35:42 +0200
commitea2de30794af69d5936dcfae033f80ca94299095 (patch)
tree9f9dde23a2aa1cdc8b292085d1617b06c1519a97 /debian/control
parent921faf9c3970b09a2cc2cd5aae6fd4eb4b6a4442 (diff)
parenta907e8c65f67936cfc0504e796d7f266f62cec5e (diff)
Merge remote-tracking branch 'origin/debian'
The future "upstream" is APT itself, which leaves the packaging as the new master branch of this repository. The merge just ensures we keep all of the history straight rather than renaming branches.
Diffstat (limited to 'debian/control')
-rw-r--r--debian/control28
1 files changed, 28 insertions, 0 deletions
diff --git a/debian/control b/debian/control
new file mode 100644
index 0000000..4ac2252
--- /dev/null
+++ b/debian/control
@@ -0,0 +1,28 @@
+Source: apt-transport-tor
+Section: admin
+Priority: optional
+Maintainer: Tim Retout <diocles@debian.org>
+Build-Depends: debhelper (>= 9), dh-autoreconf, libapt-pkg-dev, libcurl4-gnutls-dev
+Standards-Version: 3.9.5.0
+Homepage: https://github.com/diocles/apt-transport-tor
+
+Package: apt-transport-tor
+Architecture: any
+Depends: ${shlibs:Depends}, ${misc:Depends}, tor
+Description: APT transport for anonymous package downloads via Tor
+ Provides support in APT for downloading packages anonymously via the Tor
+ network.
+ .
+ APT already includes mechanisms for guaranteeing the authenticity of the
+ packages you download. However, an adversary sniffing your network traffic
+ can still see what software you are installing.
+ .
+ Install apt-transport-tor, edit your sources.list to include only tor://
+ URLs, and you can make it very difficult for anyone intercepting your
+ network traffic to be able to tell that you are installing Debian packages,
+ or which packages you are installing.
+ .
+ Please note that this approach is only as secure as Tor itself - this
+ software cannot protect you from an attacker who has access to your local
+ machine. In addition, attackers may be able to correlate your network
+ traffic with the packets coming out of an exit node, so do be careful.