![]() ![]() Run the Orbot application and press the main button for at least 2 seconds – from this point all your wifi clients will be connected through your Android device (phone/tablet) directly to the Tor network.Similarly if you use bluetooth tethering. Be aware that if you want to use USB tethering (instead of wifi tethering), use ‘ usb0‘ device instead of ‘ wlan0‘.iptables -A FORWARD -p udp -dport 53 -j ACCEPT.iptables -t nat -A PREROUTING -i wlan0 -p tcp -syn -j REDIRECT -to-ports 9040.iptables -t nat -A PREROUTING -i wlan0 -p udp -dport 53 -j REDIRECT -to-ports 5400.On the local Android device, you can create the file tor_tunnel.sh with the above-mentioned 3 rules and put it to the startup scripts. ![]() As root, add the following iptables rules (to redirect all DNS requests to the secure Tor DNS server, all TCP connections to the Tor SOCKS proxy and reject all ICMP requests – in order not to reveal your true IP address):.Change the value of pref_transparent_tethering from false to true (use vim or sed).data/data//shared_prefs/_preferences.xmlīy default, the parameter pref_transport should have value 9040 and pref_dnsport 5400. # egrep "(pref_dnsport|pref_transport|pref_transparent_tethering)" Focus on the Tor configuration file /data/data//shared_prefs/_preferences.xml and check the value of pref_dnsport, pref_transportand pref_transparent_tethering parameters:.Run Terminal Emulator as root (type ‘su’ or ‘sudo’) or connect to your Android device using SSH. ![]()
0 Comments
Leave a Reply. |