How to Install and Uninstall apt-transport-tor Package on Ubuntu 21.04 (Hirsute Hippo)

Last updated: May 10,2024

1. Install "apt-transport-tor" package

Please follow the step by step instructions below to install apt-transport-tor on Ubuntu 21.04 (Hirsute Hippo)

$ sudo apt update $ sudo apt install apt-transport-tor

2. Uninstall "apt-transport-tor" package

This is a short guide on how to uninstall apt-transport-tor on Ubuntu 21.04 (Hirsute Hippo):

$ sudo apt remove apt-transport-tor $ sudo apt autoclean && sudo apt autoremove

3. Information about the apt-transport-tor package on Ubuntu 21.04 (Hirsute Hippo)

Package: apt-transport-tor
Architecture: all
Version: 0.4
Multi-Arch: foreign
Priority: optional
Section: universe/admin
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: APT Development Team
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 26
Depends: apt (>= 1.3~rc1)
Recommends: apt (>= 1.6~alpha6), tor
Filename: pool/universe/a/apt-transport-tor/apt-transport-tor_0.4_all.deb
Size: 7008
MD5sum: bf841573aea9181d88f1506a42cde156
SHA1: 4cba83daf49419871fd34ab75dbab83a79f49fe7
SHA256: d8b190c6c926824a85d407ec341916a32f299b87f48ce7f497c4ca6c0a712808
SHA512: f18f98e5be4c9b6d0985a6dd6d596a943461293d753b99fbca89631e71d47aec9f41cca38f317527b9ac077cd07ae3c789edcca7e8e543521bfe8589ec98e503
Description-en: APT transport for anonymous package downloads via Tor
Provides support in APT for downloading packages anonymously via the Tor
network.
.
APT already includes mechanisms for guaranteeing the authenticity of the
packages you download. However, an adversary sniffing your network traffic
can still see what software you are installing.
.
Install apt-transport-tor, edit your sources.list to include only tor://
URLs, and you can make it very difficult for anyone intercepting your
network traffic to be able to tell that you are installing Debian packages,
or which packages you are installing.
.
Please note that this approach is only as secure as Tor itself - this
software cannot protect you from an attacker who has access to your local
machine. In addition, attackers may be able to correlate your network
traffic with the packets coming out of an exit node, so do be careful.
Description-md5: 4d820afa6e1369d26ffa4a285e6a8503