How to Install and Uninstall tor Package on Kali Linux

Last updated: November 22,2024

1. Install "tor" package

This guide let you learn how to install tor on Kali Linux

$ sudo apt update $ sudo apt install tor

2. Uninstall "tor" package

In this section, we are going to explain the necessary steps to uninstall tor on Kali Linux:

$ sudo apt remove tor $ sudo apt autoclean && sudo apt autoremove

3. Information about the tor package on Kali Linux

Package: tor
Version: 0.4.8.10-1
Installed-Size: 5781
Maintainer: Peter Palfrader
Architecture: amd64
Depends: libc6 (>= 2.34), libcap2 (>= 1:2.10), libevent-2.1-7 (>= 2.1.8-stable), liblzma5 (>= 5.1.1alpha+20120614), libseccomp2 (>= 0.0.0~20120605), libssl3 (>= 3.0.0), libsystemd0, libzstd1 (>= 1.5.5), zlib1g (>= 1:1.1.4), adduser, runit-helper (>= 2.14.0~), lsb-base
Recommends: logrotate, tor-geoipdb, torsocks
Suggests: mixmaster, torbrowser-launcher, socat, apparmor-utils, nyx, obfs4proxy
Conflicts: libssl0.9.8 (<< 0.9.8g-9)
Breaks: runit (<< 2.1.2-51~)
Size: 2049344
SHA256: ef82af19baa0d22002f1cc98555a6140be85fcaddfb934afa027bd690322a121
SHA1: 5ebf4f62988681c98dc3bdb786b06fae8ce6c39e
MD5sum: 152b689aa48b4a7d9777ef0147e9cd90
Description: anonymizing overlay network for TCP
Tor is a connection-based low-latency anonymous communication system.
.
Clients choose a source-routed path through a set of relays, and
negotiate a "virtual circuit" through the network, in which each relay
knows its predecessor and successor, but no others. Traffic flowing
down the circuit is decrypted at each relay, which reveals the
downstream relay.
.
Basically, Tor provides a distributed network of relays. Users bounce
their TCP streams (web traffic, ftp, ssh, etc) around the relays, and
recipients, observers, and even the relays themselves have difficulty
learning which users connected to which destinations.
.
This package enables only a Tor client by default, but it can also be
configured as a relay and/or a hidden service easily.
.
Client applications can use the Tor network by connecting to the local
socks proxy interface provided by your Tor instance. If the application
itself does not come with socks support, you can use a socks client
such as torsocks.
.
Note that Tor does no protocol cleaning on application traffic. There
is a danger that application protocols and associated programs can be
induced to reveal information about the user. Tor depends on Torbutton
and similar protocol cleaners to solve this problem. For best
protection when web surfing, the Tor Project recommends that you use
the Tor Browser Bundle, a standalone tarball that includes static
builds of Tor, Torbutton, and a modified Firefox that is patched to fix
a variety of privacy bugs.
Description-md5:
Homepage: https://www.torproject.org/
Tag: implemented-in::c, interface::daemon, network::client, network::routing,
network::server, role::program, security::cryptography,
security::privacy, use::proxying, use::routing
Section: net
Priority: optional
Filename: pool/main/t/tor/tor_0.4.8.10-1_amd64.deb