Package Details: tor-browser-bin 14.0.2-1

Git Clone URL: https://aur.archlinux.org/tor-browser-bin.git (read-only, click to copy)
Package Base: tor-browser-bin
Description: Tor Browser Bundle: anonymous browsing using Firefox and Tor
Upstream URL: https://www.torproject.org/projects/torbrowser.html
Licenses: MPL-2.0
Conflicts: tor-browser
Provides: tor-browser
Submitter: FabioLolix
Maintainer: grufo (jugs)
Last Packager: grufo
Votes: 1282
Popularity: 1.76
First Submitted: 2023-09-24 17:45 (UTC)
Last Updated: 2024-11-17 05:13 (UTC)

Pinned Comments

grufo commented on 2019-08-15 02:22 (UTC)

Before running makepkg, you must do this (as normal user):

$ gpg --auto-key-locate nodefault,wkd --locate-keys torbrowser@torproject.org

If you want to update tor-browser from AUR without AUR helpers you can run in a terminal:

$ tor-browser -u

Latest Comments

« First ‹ Previous 1 .. 48 49 50 51 52 53 54 55 56 57 58 .. 77 Next › Last »

<deleted-account> commented on 2015-03-24 18:04 (UTC)

@tecnopado: that is a horrible hack. NEVER skip gpgcheck for something as sensitive as Tor or TBB. Anyone reading this: do NOT use @tecnopado's advice. In addition to @blackhole's advice you can also $ gpg --edit-key 0x4E2C6E8793298290 gpg> trust <select option 5 to fully trust (this assumes that you have met the keyholder in person and can guarantee it is from that person)> gpg> save

pcxz commented on 2015-03-23 16:32 (UTC)

@blackhole Thx work ok.

edvinonan commented on 2015-03-17 19:07 (UTC)

usa este comando, a mi tambien me paso lo mismo. gpg --keyserver keys.mozilla.org --recv-keys 0x4E2C6E8793298290

tecnopado commented on 2015-03-10 14:36 (UTC)

for the issue whit pgp key i've solved by "the noobs/lazy way" .. yaourt -G tor-browser-en → /tmp/yaourt-tmp-<USERNAME>/aur-tor-browser-en/ → makepkg -si --skippgpcheck

MagicAndWires commented on 2015-03-03 21:41 (UTC)

To add to blackholes comment, you can verify the key fingerprint against https://www.torproject.org/docs/signing-keys.html.en to make sure you've got the right one.

blackhole commented on 2015-02-25 23:02 (UTC)

As USER: gpg --keyserver pgp.mit.edu --recv-keys 0x4E2C6E8793298290 you can verify with: gpg --fingerprint 0x4E2C6E8793298290

dzen commented on 2015-02-24 20:29 (UTC)

work for me 1)unpack tarball 2)gpg --keyserver pool.sks-keyservers.net --recv-keys 416F061063FEE659 3)makepkg -i

fosnss commented on 2015-02-16 06:51 (UTC)

How to fix: tor-browser-linux64-4.0.3_it.tar.xz ... FAILED (the public key 8738A680B84B3031A630F2DB416F061063FEE659 is not trusted) To verify signatures for packages https://www.torproject.org/docs/verifying-signatures.html.en