|  | @@ -109,9 +109,9 @@ Summary: Anonymizing overlay network for TCP (The onion router)
 | 
	
		
			
				|  |  |  URL: https://www.torproject.org/
 | 
	
		
			
				|  |  |  Group: System Environment/Daemons
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -License: BSD-like
 | 
	
		
			
				|  |  | -Vendor: R. Dingledine <arma@seul.org>
 | 
	
		
			
				|  |  | -Packager: Andrew Lewman <phobos@rootme.org>
 | 
	
		
			
				|  |  | +License: 3-clause BSD
 | 
	
		
			
				|  |  | +Vendor: The Tor Project (https://torproject.org)
 | 
	
		
			
				|  |  | +Packager: Andrew Lewman <andrew@torproject.org>
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  %if %{is_suse}
 | 
	
		
			
				|  |  |  Requires: openssl >= 0.9.6
 | 
	
	
		
			
				|  | @@ -139,17 +139,17 @@ a "%{torgroup}" group, and set tor up to run as a daemon when the system
 | 
	
		
			
				|  |  |  is rebooted.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  Applications connect to the local Tor proxy using the SOCKS
 | 
	
		
			
				|  |  | -protocol. The local proxy chooses a path through a set of relays, in
 | 
	
		
			
				|  |  | +protocol. The tor client chooses a path through a set of relays, in
 | 
	
		
			
				|  |  |  which each relay knows its predecessor and successor, but no
 | 
	
		
			
				|  |  |  others. Traffic flowing down the circuit is unwrapped by a symmetric
 | 
	
		
			
				|  |  |  key at each relay, which reveals the downstream relay.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  Warnings: Tor does no protocol cleaning.  That means there is a danger
 | 
	
		
			
				|  |  |  that application protocols and associated programs can be induced to
 | 
	
		
			
				|  |  | -reveal information about the initiator. Tor depends on Privoxy and
 | 
	
		
			
				|  |  | +reveal information about the initiator. Tor depends on Privoxy or 
 | 
	
		
			
				|  |  |  similar protocol cleaners to solve this problem. This is alpha code,
 | 
	
		
			
				|  |  |  and is even more likely than released code to have anonymity-spoiling
 | 
	
		
			
				|  |  | -bugs. The present network is very small -- this further reduces the
 | 
	
		
			
				|  |  | +bugs. The present network is small -- this further reduces the
 | 
	
		
			
				|  |  |  strength of the anonymity provided. Tor is not presently suitable
 | 
	
		
			
				|  |  |  for high-stakes anonymity.
 | 
	
		
			
				|  |  |  
 | 
	
	
		
			
				|  | @@ -285,6 +285,9 @@ exit 0
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  %changelog
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | +* Sun Feb 22 2009 Andrew Lewman <andrew@torproject.org>
 | 
	
		
			
				|  |  | +- update the description, vendor, and packager
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  |  * Thu Sep 11 2008 Andrew Lewman <phobos@rootme.org>
 | 
	
		
			
				|  |  |  - See r16867 
 | 
	
		
			
				|  |  |  - http://archives.seul.org/or/cvs/Sep-2008/msg00156.html
 |