Delivery-Date: Thu, 25 Feb 2016 14:19:19 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id E68AE1E0551;
	Thu, 25 Feb 2016 14:19:17 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9175F39867;
	Thu, 25 Feb 2016 19:19:11 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 795F139867
 for <tor-talk@lists.torproject.org>; Thu, 25 Feb 2016 19:19:08 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 3YuucbfcISC7 for <tor-talk@lists.torproject.org>;
 Thu, 25 Feb 2016 19:19:08 +0000 (UTC)
Received: from paulo.mayfirst.org (paulo.mayfirst.org [209.234.253.240])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 612E9396D2
 for <tor-talk@lists.torproject.org>; Thu, 25 Feb 2016 19:19:08 +0000 (UTC)
Received: from paulo.mayfirst.org (unknown [127.0.0.1])
 by paulo.mayfirst.org (Postfix) with ESMTP id A80253F43
 for <tor-talk@lists.torproject.org>; Thu, 25 Feb 2016 14:19:05 -0500 (EST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender:
 nathanfreitas@paulo.mayfirst.org) with ESMTPSA id 9B12F3F40
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailauth.nyi.internal (Postfix) with ESMTP id 9F24121B05
 for <tor-talk@lists.torproject.org>; Thu, 25 Feb 2016 14:19:04 -0500 (EST)
Received: from web5 ([10.202.2.215])
 by compute3.internal (MEProxy); Thu, 25 Feb 2016 14:19:04 -0500
Received: by web5.nyi.internal (Postfix, from userid 99)
 id 78947A65F27; Thu, 25 Feb 2016 14:19:04 -0500 (EST)
Message-Id: <1456427944.3007953.531986386.4AE82536@webmail.messagingengine.com>
X-Sasl-Enc: DLruDi1kDNe98WR1Y7DBxzQluHaN7FEcFFsYwB6c80Xu 1456427944
From: Nathan Freitas <nathan@freitas.net>
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
X-Mailer: MessagingEngine.com Webmail Interface - ajax-aeec9b65
In-Reply-To: <512753.6e6311c83801f5ea7683e92e4b940db58be077f0@popretr.messagingengine.com>
References: <e9ff5d0e4ad4bf16988a4bed77722a3a@riseup.net>
 <89CC9625-7402-4C45-9115-2ADB8B62B539@gmail.com>
 <512753.6e6311c83801f5ea7683e92e4b940db58be077f0@popretr.messagingengine.com>
 <CAD--ZDV8=wT+O4LUxsrR-L8SALOdxgQX3BtHEcFx3YWqK2Ykwg@mail.gmail.com>
Date: Thu, 25 Feb 2016 14:19:04 -0500
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: Re: [tor-talk] Not able to download Tor to droid
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Wed, Feb 24, 2016, at 05:03 PM, Nathaniel Suchy wrote:
> If you stop Tor (Orbot) and then start it again the issue should be
> fixed.
> On a side note why isn't Tor built into Orfox on Android? 

We chose not to do this, because you can use Orbot standalone for many
other apps. You don't want every app on your phone that wants to use Tor
to have to run their own instance, as it would eat up battery and
network. We are seeing more and more apps, like Facebook, DuckDuckGo,
OpenKeychain, Conversations, ChatSecure, etc support proxying through
Tor with Orbot.

In addition, Android provides a very good inter-app
communication/coordination mechanism through intents and remote
services, that isn't really possible in a cross-platform way on
desktops. 

On iPhone there
> is an open source project OnionBrowser where the Tor Binary is built in.
> I am curious why the Orbot/Orfox team hasn't done the same.

Onion Browser has to build in Tor because iOS doesn't allow for
background services generally.

+n
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

