On Friday, January 23, 2015 03:13:34 PM Patrick Connolly wrote: > But someone else might be able to fill in on the specifics.
I guess I have some insight here (since I dropped the ball on it). The big outstanding issue is DNS. Tor runs its DNS resolver but we can't give Android a DNS port, only an IP address. Which means that we'd need a layer that can inspect raw UDP packets, redirect them to the Tor resolver, read the response, turn it into raw UDP packets, and then spoof its origin. It's a non-trivial amount of work (there's a fair amount of book-keeping and concurrency) and last I looked there was no elegant way to do this in the C codebase Orbot is using (tun2socks).
_______________________________________________ Guardian-dev mailing list Post: [email protected] List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To Unsubscribe Send email to: [email protected] Or visit: https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com You are subscribed as: [email protected]
