Delivery-Date: Mon, 04 Aug 2014 09:15:50 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id E377E1E0404;
	Mon,  4 Aug 2014 09:15:48 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 1843B30482;
	Mon,  4 Aug 2014 13:15:44 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 9707F30478
 for <tor-talk@lists.torproject.org>; Mon,  4 Aug 2014 13:15:39 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 1U6fuNDA9JPj for <tor-talk@lists.torproject.org>;
 Mon,  4 Aug 2014 13:15:39 +0000 (UTC)
Received: from services.tengu.ch (services.tengu.ch [46.4.46.73])
 by eugeni.torproject.org (Postfix) with ESMTP id 65BC72FED8
 for <tor-talk@lists.torproject.org>; Mon,  4 Aug 2014 13:15:39 +0000 (UTC)
Received: by services.tengu.ch (Postfix, from userid 103)
 id 6717D1006A9; Mon,  4 Aug 2014 15:15:36 +0200 (CEST)
Received: from [10.27.10.42] (c2cpc3.camptocamp.com [128.179.66.4])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by services.tengu.ch (Postfix) with ESMTPSA id 1E3CC10052E
 for <tor-talk@lists.torproject.org>; Mon,  4 Aug 2014 15:15:36 +0200 (CEST)
Message-ID: <53DF8783.8090203@tengu.ch>
Date: Mon, 04 Aug 2014 15:15:47 +0200
From: CJ <tor@tengu.ch>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
 rv:31.0) Gecko/20100101 Icedove/31.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <53D0A151.6030801@tengu.ch>
In-Reply-To: <53D0A151.6030801@tengu.ch>
Subject: Re: [tor-talk] Android app: orWall
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hello,

After all, it wasn't that bad I had to rename it: we will add support
for i2p socks and tunnels shortly, meaning orwall may become something
like a Personal Privacy Routing App (well, ok, not routing "as is",
because we'll still use iptable in order to force app traffic through
tor or any i2p tunnel) :).

For information: current version is 0.13 Beta (yesss!), and it's pretty
stable and nice.
Support for Tethering (through Tor of course) and other network-related
things have been added, and are working fine.

Coming soon (hopefully): it should be added to f-droid repository (I
opened a thread on the submission queue), and, as soon as ciphernet
library has some more support regarding tor configuration (in order to
get orbot ports, mostly), we will integrate orbot support in a far
better way than now, allowing, among other things, to automatically
update its configuration if orbot ports change.
This will also help in order to get i2p support via a new api/library
being developed right now.

So. I'm pretty happy seeing this app getting some interest.
I'm also happy we can find a name satisfying anybody (though I wasn't
that sure about "orwall" at the beginning).
And I hope this app will be, once, listed somewhere as a
"privacy-aware-helper" app ;).

Don't hesitate to test it, report bugs, ask for features and so.
Just keep in mind its aim is to provide a userfriendly interface to
iptables in order to manage connections through
tor/local-privacy-services, not an iptables "multipurpose" interface ;).

Cheers,

C.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

