I know I can install orbot and select app by app to use socksv5 in the port 9050. But is there a way to have system wide onion routing in android without having to change the configuration for every app?
I know I can install orbot and select app by app to use socksv5 in the port 9050. But is there a way to have system wide onion routing in android without having to change the configuration for every app?
NEVER route traffic from random applications through Tor. If they are not explicitly designed to work with Tor they might leak all sort of data or even be vulnerable to MiTM attacks from malicious exit nodes.
The thing is that you have to choose the lesser of two evils, on one side if you don’t use Tor there is the NSA logging everything and on the other there are some malicious exit nodes between many that aren’t.
I have most applications traffic blocked anyway, with Invizible Pro, and the rest of the apps are routed through Tor using a VPN.
This is not correct. If anything, any global observer is likely to monitor Tor traffic much more closely than regular traffic and can perform both inspection and correlation to deanonimize users.
Use only applications that are safe to use with Tor. Ask the upstream developers if needed. Ask other people to help fixing existing applications.
Assuming that the NSA isn’t logging TOR traffic, and also assuming that entry/exit nodes aren’t breached is silly. You’re putting way to much trust in the theory of how TOR is designed and not in the reality. You need to take personal measures to make yourself safe and accept some level of intrusion.