I know I can install orbot and select app by app to use socksv5 in the port 9050. But is there a way to have system wide onion routing in android without having to change the configuration for every app?

  • ajr@lemmy.mlOP
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    3 years ago

    The thing is that you have to choose the lesser of two evils, on one side if you don’t use Tor there is the NSA logging everything and on the other there are some malicious exit nodes between many that aren’t.

    I have most applications traffic blocked anyway, with Invizible Pro, and the rest of the apps are routed through Tor using a VPN.

    • federico3@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      3 years ago

      This is not correct. If anything, any global observer is likely to monitor Tor traffic much more closely than regular traffic and can perform both inspection and correlation to deanonimize users.

      Use only applications that are safe to use with Tor. Ask the upstream developers if needed. Ask other people to help fixing existing applications.

    • Jesse@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      3 years ago

      Assuming that the NSA isn’t logging TOR traffic, and also assuming that entry/exit nodes aren’t breached is silly. You’re putting way to much trust in the theory of how TOR is designed and not in the reality. You need to take personal measures to make yourself safe and accept some level of intrusion.