Delivery-Date: Thu, 24 Jul 2014 05:27:14 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 4A7091E054F
	for <archiver@seul.org>; Thu, 24 Jul 2014 05:27:12 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id D83FC2E752;
	Thu, 24 Jul 2014 09:27:05 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 629A62E2D1
 for <tor-talk@lists.torproject.org>; Thu, 24 Jul 2014 09:20:24 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id A0HED6uiUmnY for <tor-talk@lists.torproject.org>;
 Thu, 24 Jul 2014 09:20:24 +0000 (UTC)
Received: from mail.mvdan.cc (mvdan.cc [176.58.100.67])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 35E8A263C7
 for <tor-talk@lists.torproject.org>; Thu, 24 Jul 2014 09:20:24 +0000 (UTC)
Received: from localhost (unknown [84.88.85.1])
 (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits))
 (No client certificate requested) (Authenticated sender: mvdan)
 by mail.mvdan.cc (Postfix) with ESMTPSA id 04BE91FB41
 for <tor-talk@lists.torproject.org>; Thu, 24 Jul 2014 09:20:20 +0000 (UTC)
Date: Thu, 24 Jul 2014 11:20:19 +0200
From: Daniel =?iso-8859-1?Q?Mart=ED?= <mvdan@mvdan.cc>
To: tor-talk@lists.torproject.org
Message-ID: <20140724092019.GA14085@carbon.lan>
References: <53D0A151.6030801@tengu.ch> <20140724065208.GA4908@carbon>
 <53D0B99F.8030101@tengu.ch>
MIME-Version: 1.0
In-Reply-To: <53D0B99F.8030101@tengu.ch>
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: Re: [tor-talk] Android app: Torrific
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1311040062033595313=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


--===============1311040062033595313==
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="gBBFr7Ir9EOA20Yy"
Content-Disposition: inline


--gBBFr7Ir9EOA20Yy
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Thu, Jul 24, 2014 at 09:45:35 +0200, CJ wrote:
> I was wanting to add the app to f-droid once it's in "beta" state, alpha
> is maybe a bit early (though it shouldn't block the whole network
> anymore now with latest release) ;).

We had apps like davdroid in alpha stage for a long time, it's just a
matter of making it clear that the app is not yet deemed stable.

> Thanks for the license headup, and for pushing it to f-droid =E2=80=94 me=
ans it
> may be of some interests indeed :).

I just pushed it, should be available tomorrow morning at the latest.

Just out of curiosity though, wouldn't it be easier to just add this
feature into Orbot? Like an extra option or toggle switch to enable the
blocking of traffic that wouldn't go through Tor.

--=20
Daniel Mart=C3=AD - mvdan@mvdan.cc - http://mvdan.cc/
PGP: A9DA 13CD F7A1 4ACD D3DE  E530 F4CA FFDB 4348 041C

--gBBFr7Ir9EOA20Yy
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=NKzW
-----END PGP SIGNATURE-----

--gBBFr7Ir9EOA20Yy--

--===============1311040062033595313==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============1311040062033595313==--

