How to Install and Uninstall apt-transport-tor Package on Ubuntu 21.10 (Impish Indri)

Last updated: May 09,2024

1. Install "apt-transport-tor" package

Please follow the steps below to install apt-transport-tor on Ubuntu 21.10 (Impish Indri)

$ sudo apt update $ sudo apt install apt-transport-tor

2. Uninstall "apt-transport-tor" package

This guide let you learn how to uninstall apt-transport-tor on Ubuntu 21.10 (Impish Indri):

$ sudo apt remove apt-transport-tor $ sudo apt autoclean && sudo apt autoremove

3. Information about the apt-transport-tor package on Ubuntu 21.10 (Impish Indri)

Package: apt-transport-tor
Architecture: all
Version: 0.5
Multi-Arch: foreign
Priority: optional
Section: universe/admin
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: APT Development Team
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 26
Depends: apt (>= 1.3~rc1)
Recommends: apt (>= 1.7~alpha1), tor
Filename: pool/universe/a/apt-transport-tor/apt-transport-tor_0.5_all.deb
Size: 7648
MD5sum: 6b8759f8aa5aae1cd8fc68ae4e1958a9
SHA1: 235081eecfa4f8ac3ba062cd74e559511f7b18f0
SHA256: 5fd657d9c34de5a63485ad1c8975e9a07111140055cd942093b26f7fdee742da
SHA512: 2b8e0799cb3814b878b142dfc13f7c9f4f11a476f86fab31c62c0db36f4af849e4972a20f4d2a074abcbbbffab7da0d38af39c51c7de5b0484585491ded12095
Description-en: APT transport for anonymous package downloads via Tor
Provides support in APT for downloading packages anonymously via the Tor
network.
.
APT already includes mechanisms for guaranteeing the authenticity of the
packages you download. However, an adversary sniffing your network traffic
can still see what software you are installing.
.
Install apt-transport-tor, edit your sources.list to include only tor://
URLs, and you can make it very difficult for anyone intercepting your
network traffic to be able to tell that you are installing Debian packages,
or which packages you are installing.
.
Please note that this approach is only as secure as Tor itself - this
software cannot protect you from an attacker who has access to your local
machine. In addition, attackers may be able to correlate your network
traffic with the packets coming out of an exit node, so do be careful.
Description-md5: 4d820afa6e1369d26ffa4a285e6a8503