Delivery-Date: Wed, 04 Feb 2015 17:10:02 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,UNPARSEABLE_RELAY,URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 4DF101E0AEC
	for <archiver@seul.org>; Wed,  4 Feb 2015 17:10:00 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9A6FD339B8;
	Wed,  4 Feb 2015 22:09:56 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id E5713336D7
 for <tor-talk@lists.torproject.org>; Wed,  4 Feb 2015 22:09:52 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id M-Wzjj5B0h64 for <tor-talk@lists.torproject.org>;
 Wed,  4 Feb 2015 22:09:52 +0000 (UTC)
Received: from paulo.mayfirst.org (paulo.mayfirst.org [209.234.253.240])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id B7AA8336C7
 for <tor-talk@lists.torproject.org>; Wed,  4 Feb 2015 22:09:52 +0000 (UTC)
Received: from paulo.mayfirst.org (localhost [127.0.0.1])
 by paulo.mayfirst.org (Postfix) with ESMTP id 67E513F0B
 for <tor-talk@lists.torproject.org>; Wed,  4 Feb 2015 17:09:49 -0500 (EST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender:
 nathanfreitas@paulo.mayfirst.org) with ESMTPSA id 550523F04
Received: from compute2.internal (compute2.nyi.internal [10.202.2.42])
 by mailauth.nyi.internal (Postfix) with ESMTP id E22C420807
 for <tor-talk@lists.torproject.org>; Wed,  4 Feb 2015 17:09:48 -0500 (EST)
Received: from web5 ([10.202.2.215])
 by compute2.internal (MEProxy); Wed, 04 Feb 2015 17:09:48 -0500
Received: by web5.nyi.internal (Postfix, from userid 99)
 id A5171A61E1D; Wed,  4 Feb 2015 17:09:48 -0500 (EST)
Message-Id: <1423087788.273528.223220277.057103D2@webmail.messagingengine.com>
X-Sasl-Enc: oeAanlZJ/iDF9spC9MVrVRHXhkEE5Rfp6SR+N/lG96gl 1423087788
From: Nathan Freitas <nathan@freitas.net>
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
X-Mailer: MessagingEngine.com Webmail Interface - ajax-b6284d51
X-Forwarded-Message-Id: <1423087352.272266.223218301.7A2A4EB1@webmail.messagingengine.com>
Date: Wed, 04 Feb 2015 17:09:48 -0500
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: [tor-talk] Orbot+VPN alpha preview
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

We have a new alpha build of Orbot that uses the Android VPN API to
route all Android device traffic over Tor without root. This is
obviously focused on circumvention and not anonymity, allowing people to
use apps over Tor that are blocked in specific countries or contexts.

We are also considering how to warn users of non-HTTPS traffic, and
allow them to enable a "secure traffic only" mode that only allows port
443 over Tor.

Any feedback and/or test results is appreciated.

----- Original message -----
From: Nathan of Guardian <nathan@guardianproject.info>
To: Lobsang Gyatso <lobsangsither@gmail.com>
Subject: Fwd: Re: [guardian-dev] OrbotVPN
Date: Wed, 04 Feb 2015 17:02:32 -0500

Orbot v15 alpha preview - with integrated browser and VPN mode!

----- Original message -----
From: Nathan of Guardian <nathan@guardianproject.info>
To: guardian-dev@lists.mayfirst.org
Subject: Re: [guardian-dev] OrbotVPN
Date: Wed, 04 Feb 2015 17:02:03 -0500



On Wed, Feb 4, 2015, at 03:03 PM, Nathan of Guardian wrote:
> > I have integrated your code and changes into my v15-dev branch, which
> > can be found at:
> > 
> > https://github.com/n8fr8/orbot/tree/v15-dev
> > or https://gitweb.torproject.org/n8fr8/orbot.git/log/?h=v15-dev
> > 

... and now, here is a v15 alpha preview build for testing. This is
ALPHA software, especially the VPN support, so obviously it may be
unstable and/or could leak DNS or other information still at this point.
So far, from my smoke tests on two devices, it seems to be pretty
stable.

Download here:
https://guardianproject.info/releases/Orbot-v15.0.0-ALPHA-2.apk
(sig:
https://guardianproject.info/releases/Orbot-v15.0.0-ALPHA-2.apk.asc)

Many thanks to SandroB and the Psiphon team for their contributions to
this work.

This includes a slightly updated user interface, as well, with simple
"Open Browser" and "VPN On/Off" toggle button on the main screen. 

"Open Browser" will launch the now-built-in Orweb browser if VPN is off,
and the system/default browser if VPN is on. When VPN is on, all apps
should go through Tor. You can tell if it is working, by say streaming
music or a YouTube video, and watching the traffic stats. You can also
test sites like dnsleaktest.com in the main system browser.

You will need to disable root/transproxy mode for this all to work, and
at this point, we have unofficially deprecated any "root" functions in
Orbot.

Please let us know how it goes, if you experience any instability or if
the Tor routing doesn't appear to be working.

+n


-- 
  Nathan of Guardian
  nathan@guardianproject.info


-- 
  Nathan of Guardian
  nathan@guardianproject.info
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

