I know I can install orbot and select app by app to use socksv5 in the port 9050. But is there a way to have system wide onion routing in android without having to change the configuration for every app?

  • @nlfx@lemmy.ml
    link
    fedilink
    4
    edit-2
    2 years ago

    In Orbot, you have a “VPN mode” toggle, when enabling it, it will create an Android VPN connection which “torify” the traffic of all apps you have selected in the “Tor-Enabled Apps” section. You can select all apps, but still need to remember to go add new apps each time you install them (I don’t think there is an automated way to do it).

    Unless this changed recently, Android only supports a single active VPN connection at a time, so unfortunately this Orbot mode cannot be used in conjunction with a standard VPN.

    • @nachtigall@feddit.de
      link
      fedilink
      1
      edit-2
      2 years ago

      Also if OP wants to make sure there is no traffic bypassing the VPN they should enable “Always-on VPN” and “Block connections without VPN” in the settings > VPN > Orbot options icon.

    • @ajr@lemmy.mlOP
      link
      fedilink
      12 years ago

      I had NetGuard set as a VPN to avoid adds so I guess I’ll have to choose.

  • @federico3@lemmy.ml
    link
    fedilink
    22 years ago

    NEVER route traffic from random applications through Tor. If they are not explicitly designed to work with Tor they might leak all sort of data or even be vulnerable to MiTM attacks from malicious exit nodes.

    • @ajr@lemmy.mlOP
      link
      fedilink
      1
      edit-2
      2 years ago

      The thing is that you have to choose the lesser of two evils, on one side if you don’t use Tor there is the NSA logging everything and on the other there are some malicious exit nodes between many that aren’t.

      I have most applications traffic blocked anyway, with Invizible Pro, and the rest of the apps are routed through Tor using a VPN.

      • Jesse
        link
        fedilink
        2
        edit-2
        2 years ago

        Assuming that the NSA isn’t logging TOR traffic, and also assuming that entry/exit nodes aren’t breached is silly. You’re putting way to much trust in the theory of how TOR is designed and not in the reality. You need to take personal measures to make yourself safe and accept some level of intrusion.

      • @federico3@lemmy.ml
        link
        fedilink
        12 years ago

        This is not correct. If anything, any global observer is likely to monitor Tor traffic much more closely than regular traffic and can perform both inspection and correlation to deanonimize users.

        Use only applications that are safe to use with Tor. Ask the upstream developers if needed. Ask other people to help fixing existing applications.

  • CHEF-KOCH
    link
    fedilink
    12 years ago
    • You need root.
    • Orbot tutorial
    • You can use ProtonVPN to route all your traffic through the Tor network. They have a couple options for it. I think you need a paid plan, this is however easiest and most reliable solution. Because Android has some restrictions.

    It is NOT necessary to send everything through TOR, and things like streaming Netflix or torrent downloads are (IMO) a poor use of TOR. Keeü in mind that the moment the ISP noticed - unusual - traffic, he might start throttle our connection.

    • @ajr@lemmy.mlOP
      link
      fedilink
      02 years ago

      Do I use the three modules or do I need to choose between TOR and I2P?

      • @TheAnonymouseJoker@lemmy.mlM
        link
        fedilink
        02 years ago

        Both darknets work separately. You have to choose between Tor and DNSCrypt depending on what you want.

        For Tor, you have to individually add onion addresses if you want to use both DNSCrypt and Tor system coverage.

  • bunkrra
    link
    fedilink
    -32 years ago

    just why you want to route all traffic via tor? ask yourself why? ISP can see everything and you are funneling your traffic via monitored network, you will just point on yourself, nothing is for free, those nods got purpose, so again pls ask yourself why you like to do it? why you wanna hide yourself? and what you wanna hide?

      • bunkrra
        link
        fedilink
        12 years ago

        did you just call a federal agent? and also i got so far most of dislikes collected here ever.

        Im glad, its nice to know that some of you are giving so much of trust in the servise build and paid by us government. You have no and i will say again no clue who is running those services(and what is running on the same machines with your data), there are poeple who has a good intentions and would like to have an anon net. And there are the other people. Please do some investigation for youself, search who funded and build the base for tor movement, what was the ocassion and the ultimate goal.

        im still amused by the title fed, ultimate lol.