this post was submitted on 13 Jan 2022
1 points (57.1% liked)

Privacy

33192 readers
263 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I know I can install orbot and select app by app to use socksv5 in the port 9050. But is there a way to have system wide onion routing in android without having to change the configuration for every app?

top 16 comments
sorted by: hot top controversial new old
[–] [email protected] 4 points 3 years ago (1 children)

NEVER route traffic from random applications through Tor. If they are not explicitly designed to work with Tor they might leak all sort of data or even be vulnerable to MiTM attacks from malicious exit nodes.

[–] [email protected] 0 points 3 years ago* (last edited 3 years ago) (2 children)

The thing is that you have to choose the lesser of two evils, on one side there is the NSA logging everything and on the other there are some malicious exit nodes between many that aren't.

I have most applications traffic blocked anyway, with Invizible Pro, and the rest of the apps over Tor.

[–] [email protected] 3 points 3 years ago* (last edited 3 years ago)

Assuming that the NSA isn't logging TOR traffic, and also assuming that entry/exit nodes aren't breached is silly. You're putting way to much trust in the theory of how TOR is designed and not in the reality. You need to take personal measures to make yourself safe and accept some level of intrusion.

[–] [email protected] 3 points 3 years ago

This is not correct. If anything, any global observer is likely to monitor Tor traffic much more closely than regular traffic and can perform both inspection and correlation to deanonimize users.

Use only applications that are safe to use with Tor. Ask the upstream developers if needed. Ask other people to help fixing existing applications.

[–] [email protected] 4 points 3 years ago* (last edited 3 years ago) (2 children)

In Orbot, you have a "VPN mode" toggle, when enabling it, it will create an Android VPN connection which "torify" the traffic of all apps you have selected in the "Tor-Enabled Apps" section. You can select all apps, but still need to remember to go add new apps each time you install them (I don't think there is an automated way to do it).

Unless this changed recently, Android only supports a single active VPN connection at a time, so unfortunately this Orbot mode cannot be used in conjunction with a standard VPN.

[–] [email protected] 1 points 3 years ago* (last edited 3 years ago)

Also if OP wants to make sure there is no traffic bypassing the VPN they should enable "Always-on VPN" and "Block connections without VPN" in the settings > VPN > Orbot options icon.

[–] [email protected] 1 points 3 years ago* (last edited 3 years ago)

I had NetGuard set as a VPN to avoid ads so I guess I'll have to choose.

[–] [email protected] 3 points 3 years ago (1 children)

You may consider Invizible Pro, available via f-droid.

[–] [email protected] 0 points 3 years ago (1 children)

Do I use the three modules or do I need to choose between TOR and I2P?

[–] [email protected] -3 points 3 years ago* (last edited 3 years ago)

Both darknets work separately. You have to choose between Tor and DNSCrypt depending on what you want.

For Tor, you have to individually add onion addresses if you want to use both DNSCrypt and Tor system coverage.

I only route 2 FOSS browsers dedicated to Tor and I2P usage, and nothing else.

[–] [email protected] 2 points 3 years ago
  • You need root.
  • Orbot tutorial
  • You can use ProtonVPN to route all your traffic through the Tor network. They have a couple options for it. I think you need a paid plan, this is however easiest and most reliable solution. Because Android has some restrictions.

It is NOT necessary to send everything through TOR, and things like streaming Netflix or torrent downloads are (IMO) a poor use of TOR. Keeü in mind that the moment the ISP noticed - unusual - traffic, he might start throttle our connection.

[–] [email protected] -3 points 3 years ago (1 children)

just why you want to route all traffic via tor? ask yourself why? ISP can see everything and you are funneling your traffic via monitored network, you will just point on yourself, nothing is for free, those nods got purpose, so again pls ask yourself why you like to do it? why you wanna hide yourself? and what you wanna hide?

[–] [email protected] 0 points 3 years ago (1 children)
[–] [email protected] 1 points 3 years ago (1 children)

did you just call a federal agent? and also i got so far most of dislikes collected here ever.

Im glad, its nice to know that some of you are giving so much of trust in the servise build and paid by us government. You have no and i will say again no clue who is running those services(and what is running on the same machines with your data), there are poeple who has a good intentions and would like to have an anon net. And there are the other people. Please do some investigation for youself, search who funded and build the base for tor movement, what was the ocassion and the ultimate goal.

im still amused by the title fed, ultimate lol.

[–] [email protected] 1 points 3 years ago (1 children)

You are the one who seems not knowing what he is talking about.

[–] [email protected] 1 points 3 years ago

I hope you are right.

Sincerely, your dedicated federal agent.