Delivery-Date: Thu, 16 Jul 2015 09:03:17 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id E356C1E04BA;
	Thu, 16 Jul 2015 09:03:15 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 2907836E16;
	Thu, 16 Jul 2015 13:03:10 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id BC96F36E07
 for <tor-talk@lists.torproject.org>; Thu, 16 Jul 2015 13:03:06 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id xcRstZ9WwJXd for <tor-talk@lists.torproject.org>;
 Thu, 16 Jul 2015 13:03:06 +0000 (UTC)
Received: from gil.mayfirst.org (gil.mayfirst.org [216.66.23.48])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id A367536E03
 for <tor-talk@lists.torproject.org>; Thu, 16 Jul 2015 13:03:06 +0000 (UTC)
Received: from gil.mayfirst.org (unknown [127.0.0.1])
 by gil.mayfirst.org (Postfix) with ESMTP id 9E2635EBF
 for <tor-talk@lists.torproject.org>; Thu, 16 Jul 2015 09:03:02 -0400 (EDT)
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender:
 nathanfreitas@gil.mayfirst.org) with ESMTPSA id 463EF5EB5
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45])
 by mailauth.nyi.internal (Postfix) with ESMTP id B8980204AD
 for <tor-talk@lists.torproject.org>; Thu, 16 Jul 2015 09:03:01 -0400 (EDT)
Received: from web1 ([10.202.2.211])
 by compute5.internal (MEProxy); Thu, 16 Jul 2015 09:03:01 -0400
Received: by web1.nyi.internal (Postfix, from userid 99)
 id 97017AE0A52; Thu, 16 Jul 2015 09:03:01 -0400 (EDT)
Message-Id: <1437051781.1620106.325315729.6ECD1D44@webmail.messagingengine.com>
X-Sasl-Enc: EJKPU3dqECG85kuWOUcwaPh/SljFcJplr367QTrIaGz/ 1437051781
From: Nathan Freitas <nathan@freitas.net>
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
X-Mailer: MessagingEngine.com Webmail Interface - ajax-63a5d8c6
Date: Thu, 16 Jul 2015 09:03:01 -0400
In-Reply-To: <512753.5549443131363334352d31343036383939313433@popretr.messagingengine.com>
References: <512753.5549443131363334352d31343036383939313433@popretr.messagingengine.com>
 <78d63f0d0ac58d6370a137797ee2082b@protonmail.ch>
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: Re: [tor-talk] HIDDEN SERVICE IN ANDROID TABLET
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Thu, Jul 16, 2015, at 03:30 AM, pmwinzi wrote:
> What is the best web server to host tor hidden service in android tablet?

Orbot can easily be configured to start and host a hidden service on any
port. Just enable the feature in Orbot's settings, and enter the port
you wish for it to be available at.

From there, you must run another app on your tablet that actual provides
a service. There are a variety of server type apps available out there
on F-Droid.org, Google Play or as source.

Another option, is to use Lil'Debi[0], or some other Linux-on-Android
type system, to install a full chroot environment, where you can apt-get
install anything you want, including Tor, apache, and so on. In that
setup, you could even run something like Globaleaks on the tablet.

[0] https://guardianproject.info/code/lildebi/
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

