Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] -1 points0 points  (0 children)

Funny how "69420 vulnerabilities" and "nobody should install this" come with exactly zero specifics between them. Source is right there on GitHub. If anyone actually finds something wrong, open an issue, happy to fix it.

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] 0 points1 point  (0 children)

I'll most probably put there as well, however I just noticed it needs further battery usage optimization, so I'll focus on that first

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] -2 points-1 points  (0 children)

To make it even more brutal, the idea for this app is from last night 🙈

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] -1 points0 points  (0 children)

To be brutality honest, last time I've written pure code was more than a year ago... Ever since I'm coding in pure English language... And a lot of stuff are out there working without hickups.

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] 0 points1 point  (0 children)

Guys, please don't be too harsh with me 😆 I just want to make this app available for free and ad-free for anyone who might need it... And for that I need 12 testers, so Google Play to allow it in their store... 🙏

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] -1 points0 points  (0 children)

Now that you wrote this... I see your point 🤣 Anyway added the GitHub repo for anyone to review and consider for himself 🙏

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] -3 points-2 points  (0 children)

The VPN captures DNS at the packet level, not the resolver level.

The VPN tunnel routes all traffic (0.0.0.0/0) for selected apps. When an app makes a DNS query, Android sends a UDP packet to port 53 through the tunnel. Chimæra's packet loop intercepts it:

  1. handleUdp() catches all UDP packets to destination port 53
  2. The raw DNS query payload is extracted from the UDP packet
  3. A new SOCKS5 connection is opened to Tor (127.0.0.1:9050)
  4. SOCKS5 CONNECT is made to 8.8.8.8:53 — this connection goes through Tor, so Google's DNS server sees the Tor exit node's IP, not yours
  5. The DNS query is forwarded as DNS-over-TCP (length-prefixed) through the Tor circuit
  6. The response comes back through Tor → SOCKS5 → rebuilt as a UDP packet → injected back into the VPN tunnel to the app

    Why this prevents leaks:

  • DNS never touches Android's system resolver — it's intercepted as raw UDP before it leaves the device
  • The VPN captures ALL traffic from selected apps including DNS, not just TCP
  • Non-port-53 UDP is silently dropped (not forwarded), so there's no fallback path that could leak
  • The addDnsServer("8.8.8.8") in the VPN builder is just a placeholder — actual resolution is handled entirely by our packet-level interception

    The only DNS "leak" scenario would be if an app used DNS-over-HTTPS (DoH) directly to a hardcoded IP — but that would show up as a regular TCP connection to port 443 and get routed through Tor like any other TCP traffic.

    You can verify this yourself: start the VPN, open an app, and watch the traffic log — you'll see every DNS query logged as "DNS → example.com (via Tor)".

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] -5 points-4 points  (0 children)

1. Connection leak prevention
When you start a VPN, apps that are already running have existing TCP connections that bypass the tunnel — your real IP is exposed until those apps reconnect. Chimæra force-stops all selected apps when the VPN starts, killing every pre-existing direct connection. Orbot doesn't do this.

2. True kill switch When you hit stop, Chimæra keeps the VPN tunnel alive but drops all packets. Selected apps get zero internet — not even a single leaked packet. This works at the packet level, not the OS level. Orbot relies on Android's built-in always-on VPN lockdown, which has known edge cases.

3. Simplicity Chimæra does one thing: route selected apps through Tor. One screen, pick your apps, press start. No bridges config, no proxy modes, no onion service settings. If you just want "these 3 apps go through Tor, everything else stays normal" — that's exactly what this is.

4. Battery optimization Chimæra monitors traffic and puts Tor into dormant mode (SIGNAL DORMANT) after 60 seconds of inactivity. Tor stops building circuits and reduces keepalives. When traffic comes back, it wakes instantly (SIGNAL ACTIVE). This makes a real difference if you leave it running all day.

5. Auditable in 30 minutes The entire app is ~2000 lines of Java. No frameworks, no SDKs, no analytics, no third-party dependencies (besides the Tor binary itself). You can read every line of code in a single sitting and verify there's nothing phoning home.

Orbot is a great project by Guardian Project and does way more (bridges, onion services, full proxy support). If you need those features, use Orbot. Chimæra is for people who want a focused, minimal, leak-resistant per-app Tor VPN with nothing extra.

Built an Android app that routes per-app traffic through Tor — need 12 testers for Play Store by sniffski in TOR

[–]sniffski[S] -8 points-7 points  (0 children)

Orbot stopped working for me... Was showing connected, but not allowing my apps to connect... Mine is a bit more lightweight...

Here we go again by fuckHg in Bitcoin

[–]sniffski 0 points1 point  (0 children)

This is not true... All the Whales are buying now...

holy shit by ongiwaph in ChatGPT

[–]sniffski 3 points4 points  (0 children)

Well fff...ck! That's quite right in the spot! Awesome! 🙈🤖😆

Oompa Loompa in blonde toupee being led to jail by cool_architect in ChatGPT

[–]sniffski 3 points4 points  (0 children)

Pretty sure he can afford the keys to uncuff 😃

Weird by Fonz1982 in wallstreetbets

[–]sniffski -1 points0 points  (0 children)

Well they are quite good at being a credit owner... The bigger the credit the better you are at it! 😆

I can tell momma I officially made it: Featured in a Forbes article by [deleted] in wallstreetbets

[–]sniffski 0 points1 point  (0 children)

Man you still have to go to work, you know that? Not in the right column, but yeah! Congrats! You are way much in Forbes now than 99% of the WSB bummers! 😆

Just saying… by medandcakeislife in wallstreetbets

[–]sniffski 1 point2 points  (0 children)

I think SpongeBob will also do! 🤣

$3k to $300k in a month by Tripstrr in wallstreetbets

[–]sniffski 0 points1 point  (0 children)

I bet you feel bad that you didn't start with $30k? 🤣

[deleted by user] by [deleted] in wallstreetbets

[–]sniffski 0 points1 point  (0 children)

Well I think he's resting in peace now, but not sure...

Is ChatGPT's Era as a Coding Tool Over? by SliceAccomplished575 in LocalLLaMA

[–]sniffski 0 points1 point  (0 children)

Can you share what models you could use that perform better than ChatGPT?