On Friday, January 23, 2015 03:13:34 PM Patrick Connolly wrote:
> But someone else might be able to fill in on the specifics. 

I guess I have some insight here (since I dropped the ball on it). 

The big outstanding issue is DNS. Tor runs its DNS resolver but we can't 
give Android a DNS port, only an IP address. Which means that we'd 
need a layer that can inspect raw UDP packets, redirect them to the 
Tor resolver, read the response, turn it into raw UDP packets, and then 
spoof its origin. It's a non-trivial amount of work (there's a fair amount 
of book-keeping and concurrency) and last I looked there was no 
elegant way to do this in the C codebase Orbot is using (tun2socks).
_______________________________________________
Guardian-dev mailing list

Post: [email protected]
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev

To Unsubscribe
        Send email to:  [email protected]
        Or visit: 
https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com

You are subscribed as: [email protected]

Reply via email to