tor

Описание:Anonymizing overlay network for TCP
Домашняя страница:https://www.torproject.org/ https://gitlab.torproject.org/tpo/core/tor/
Расположение:Portage
Легенда:
  • + - стабильный
  • ~ - нестабильный
  • M - замаскированный
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9999 diff - - - - - - - - - - - - -
0.4.8.7 diff - ~ ~ ~ - - ~ ~ ~ - - ~ ~
0.4.8.6 diff - ~ ~ ~ - - ~ ~ ~ - - ~ ~
0.4.7.15 diff - ~ ~ ~ - - ~ ~ ~ - - ~ ~
0.4.7.14 diff - + ~ ~ - - ~ + + - - ~ +
0.4.7.13-r1 - + + ~ - - ~ + + - - ~ +

USE флаги

  • caps - Use Linux capabilities library to control privilege
  • doc - Add extra documentation (API, Javadoc, etc). It is recommended to enable per package instead of globally
  • lzma - Support for LZMA (de)compression algorithm
  • man - Build and install man pages
  • scrypt - Use app-crypt/libscrypt for the scrypt algorithm
  • seccomp - Enable seccomp (secure computing mode) to perform system call filtering at runtime to increase security of programs
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • server - Enable tor's relay module so it can operate as a relay/bridge/authority
  • systemd - Enable use of systemd-specific libraries and features like socket activation or session tracking
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • tor-hardening - Compile tor with hardening on vanilla compilers/linkers
  • verify-sig - Verify upstream signatures on distfiles
  • zstd - Enable support for ZSTD compression

Советы по безопасности

Дата Опасность Заголовок
больше 1 года средняя Tor: Multiple Vulnerabilities
больше 3 лет средняя Tor: Multiple vulnerabilities
больше 4 лет низкая Tor: Multiple vulnerabilities

Экспортировать в Atom

Спасибо!