So, I have my #Vanadium browser homepage set to check.torproject.org, and proxy set to use #Orbot. Twice now I have opened Vanadium to be greeted by my real IP address and "Sorry, you are not using Tor". That's twice out of hundreds of uses, but once would be too many. Other times the page stops loading half-way with "A network change was detected" and goes on to load the check page correctly via Tor. I have the same homepage on Tor Browser and have never seen this problem. Its much slower, though. I'm using #GrapheneOS on a Pixel, if it matters. My non-expert guess is this is some kind of race-condition bug in Vanadium. Your thoughts, and how should I proceed investigating further? #AskNostr nostr:nprofile1qqsyawyrzrttfmv4cmtx5w2m85702kdct7hv3amfrkhagpdf9cz46mgprpmhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0qyghwumn8ghj7mn0wd68ytnhd9hx2tcpydmhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef08ankcmmzv9kr6ctvds20l3q3 nostr:nprofile1qqs2c0m2lct4j0mpsyz38kkf58j5f6rmnn53kf7n0wywck8m42gpf2sprdmhxue69uhhg6r9vehhyetnwshxummnw3erztnrdakj77r0yne
chromium is historically bad with proxies. In this case I'd try to disable dot (secure dns) in the vanadium config. Also be sure you are running orbot in vpn mode (with "advanced mode" disabled, cause as I'm aware vanadium has no proxy integration, you need to route traffic trough android vpn. Another check you could do is see if orbot is setted as "vpn always on", it could prevent ip leaks in some cases
I have not tested this. nostr:nprofile1qqsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgprpmhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0afj73p can you provide some insight here?
That npub was burned, I don't use that one anymore. (Check GrapheneOS forum profile for npub so you don't click a sketchy from me.) It's not something we come across, but we are aware Orbot has some problems, that's why a Tor VPN app is being redone (not by us) in the future. We are aware of leaks caused by some VPN apps and we keep making patches to fix it but they end up breaking said apps and force us to revert. It's predominantly an app issue, look at the posts on my old npub about Mullvad to get what I mean here. Latest build added a second-generation leak prevention mechanism but for it's for multicast leaks: https://grapheneos.org/releases#2024092900 I'd contain Tor usage in its own profile so I don't see this happen. I guess if it happens right when Orbot is connecting, give it a few seconds after connecting before doing something?
Under global wireless settings, make sure Orbot is set to "Always On" Then zero traffic should be going through anything but tor, regardless of any browser settings. If it's still doing it, then it's a bug in Orbot, not the browser. Did you get Orbot from F-Droid Guardian Repo? is it apk?
VPN is set to "Orbot", which I believe is what you mean. Yes, its the F-droid Guardian Project version, 17.2.1
There's an "always on setting", for ALL global vpns in the network settings. It's the gear icon under the network settings looking at Orbot. It would be the same one for a regular VPN, you can test with a free one if you got no subscription. like calyx or something