Oh shit, I need to try that out.
I really wonder if one can use both InviZible Pro and Tor Browser on the same profile, because you can’t do that with Orbot.
You can use Orbot + Tor Browser on DivestOS with lockdown enabled.
Tor Browser and Briar are specially exempted.
The past issue where Tor Browser caused Orbot to restart in same or across profiles has also been fixed in TBB 13.5.
Orbot still doesn’t support stream isolation and InviZible Pro does, doesn’t that make InviZible Pro a better choice? Or is there something else that gives Orbot an edge?
We should consider InviZible Pro even more that we i2p guide and eepsite. @jonah
Orbot is going to be probably replaced by Tor VPN when it is out.
InviZible Pro should replace Orbot just because of stream isolation alone.
![]()
my stance on Invizible has changed since my early comment in this thread and I definitely think it is a good option for Tor on Android especially with the default enabled stream isolation it has featured for a few months now.
I am still a little concerned about Wifi/Mobile data both on when Invizible in VPN mode · Issue #249 · Gedsh/InviZible · GitHub however
I think that this response makes sense: Wifi/Mobile data both on when Invizible in VPN mode · Issue #249 · Gedsh/InviZible · GitHub
But still, ideally, this should be optional.
Voted!
I love this app as it allows me not to switch between apps. Also, unique feature is i2p.
As I noticed it is developed in Ukraine (link, look on the bottom and use translator) so it shouldn’t raise concerns about backdoor.
Also Wireshark didn’t catch anything sketchy after test, so I think it is totally safe.
invizablePro has far more moves than Orbot, starting with dnscrypt over multiple anonymizers which was the only way to get around the carrier DNS lock on a prepaid government plan phone we had during COVID, they do those government contracts cheap to monitor collect and sell user data, and don’t allow any VPN or proxy connections because of the monitoring. Only things I found that could shake it was invizablePro Dnscrypt-proxy with anonymizers then once off our through Tor, or TLS tunnel dnstt DNS tunnel slowly, or port 80 tls tunnel on free servers. But, with root, it’s got 30x more moves. Can run in proxy mode with root leaving room for VPN over the top, also can ttl 64 spoof for avoiding carrier hotspot usage detection, and since bpf in kernel post android 12 broke old magisk modules that messed with IP tables, and alot of tricks for carrier hotspot or usage don’t work now because of this, you can tell invizablePro to use its own in app IP tables for the connection, which you can then mangle or apply rules to, bypassing android kernel restrictions on things. Probably the most versatile and useful connection management tools on android.
I love it, It can be also use alongside with rethinkdns firewall, invisible as proxy rethink catches that through socks5. Had problem to connect robot, but with invisible worked, now have so many options both with firewall and proxy