True, but this protocol I'm describing could use proxys by default (the proxy could be on the same machine by default for those without privacy concerns, or on a remote machine if one is willing to add a bit of complexity in order to gain more privacy). Definitely a different strategy than Tor, with some weaknesses, but much more "normal" and easier to slot into existing networking paradigms. Like all this orbot stuff wouldn't be necessary.