How to Install and Uninstall camo Package on Ubuntu 21.04 (Hirsute Hippo)

Last updated: December 23,2024

1. Install "camo" package

Please follow the step by step instructions below to install camo on Ubuntu 21.04 (Hirsute Hippo)

$ sudo apt update $ sudo apt install camo

2. Uninstall "camo" package

This guide covers the steps necessary to uninstall camo on Ubuntu 21.04 (Hirsute Hippo):

$ sudo apt remove camo $ sudo apt autoclean && sudo apt autoremove

3. Information about the camo package on Ubuntu 21.04 (Hirsute Hippo)

Package: camo
Architecture: all
Version: 2.3.0+dfsg-1.1
Priority: extra
Section: universe/web
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Zulip Debian Packaging Team
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 38
Depends: nodejs (>= 0.10.0), openssl
Filename: pool/universe/c/camo/camo_2.3.0+dfsg-1.1_all.deb
Size: 10440
MD5sum: 129d8215dea7f22519701f6fcee38686
SHA1: aa06f70e4ab9013a5b1a486a836eb6e82165fc86
SHA256: 202dfb3d3422ad6bddf825273a2613423c7322e4b3252b231263043a878e2f60
SHA512: b1a73bbcc94a624603497963bbdf9a1d4ffa98fe67fce2a4aadafc1b0f0b21caf40500e02065f1179550657d4188631011ac5afa8c4757412a88e7d4149f4ea4
Homepage: https://github.com/atmos/camo
Description-en: SSL/TLS image proxy to prevent mixed-content warnings
Camo is an image proxy to prevent mixed content warnings on secure
pages.
.
It should not be installed by an end-user; instead people who operate
websites that allow user-specified image embeds by URL can run this as
a daemon to proxy such images through their own servers and serve the
resulting content over SSL/TLS.
.
This provides integrity protection and last-mile confidentiality to
images, thus preventing a local network attacker from seeing the images
you request (allowing for possible disclosure of the content you're
viewing) or changing their content (to misinform, confuse, or shock).
.
It of course does not prevent an attacker from modifying the content or
noticing its access if the attacker is in the path between your
datacentre and the image source.
.
However, even in this case, it provides some security insofar as it
may prevent the attacker from knowing who is accessing the image.
.
Using a shared key, proxy URLs are encrypted with hmac so we can bust
caches/ban/rate limit if needed.
.
Features include:
* Proxy Google charts
* Proxy images under 5 MB
* Follow redirects to a configurable depth
* Proxy remote images with a content-type of image/*
* Disallows proxying to private IP ranges
Description-md5: 5adf0a8d6d096e3d96981325d5466fdd