<div dir="auto">If you have compiled SWORD with libcurl support for its transport, you can just leverage built in SOCKS support in libcurl. I don't know how you'd do this in a mobile app (you probably would need to expose it to the user in your UI), but it should work transparently to the user once the environment variables are set.<div dir="auto"><br></div><div dir="auto"><a href="https://blog.emacsos.com/use-socks5-proxy-in-curl.html">https://blog.emacsos.com/use-socks5-proxy-in-curl.html</a><br></div><div dir="auto"><br></div><div dir="auto">--Greg</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Sep 1, 2024, 12:58 Tobias Klein <<a href="mailto:contact@tklein.info">contact@tklein.info</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Thank you, Jaak and David,<br>
<br>
I have passed on your feedback to the user.<br>
<br>
See <br>
<a href="https://github.com/ezra-bible-app/ezra-bible-app/discussions/1093#discussioncomment-10512596" rel="noreferrer noreferrer" target="_blank">https://github.com/ezra-bible-app/ezra-bible-app/discussions/1093#discussioncomment-10512596</a><br>
<br>
Best regards,<br>
Tobias<br>
<br>
On 8/31/24 5:29 PM, Jaak Ristioja wrote:<br>
> Hi,<br>
><br>
> I'm assuming your SOCKS5 traffic flows through a sufficiently <br>
> encrypted network tunnel.<br>
><br>
> For Linux, there are programs which allow to run other programs and <br>
> direct their network traffic to some SOCKS5 proxy, e.g. proxychains-ng:<br>
><br>
> <a href="https://github.com/rofl0r/proxychains-ng/" rel="noreferrer noreferrer" target="_blank">https://github.com/rofl0r/proxychains-ng/</a><br>
><br>
> On Debian, Ubuntu and their derivates one can likely install it by using<br>
><br>
> sudo apt-get install proxychains4<br>
><br>
> Proxychains-ng needs to be configured via /etc/proxychains.conf, <br>
> ~/.proxychains/proxychains.conf or proxychains.conf in the current <br>
> working directory unless the -f command line option is used to specify <br>
> a different location. After configuration, one should be able to run <br>
> programs via commands like<br>
><br>
> proxychains4 your_program --with=any arguments<br>
><br>
> However, the problem with such tools is that they might not always <br>
> work as intended. For example when network traffic flows via paths <br>
> which tools like proxychains-ng do not know to intercept. Fpr example, <br>
> this is sometimes the case for DNS traffic (hostname to IP address <br>
> lookups) which is sometimes handled via external programs (e.g. DNS <br>
> cache service on local machine). So be sure to always thorougly test <br>
> (e.g. using network traffic analysis) whether this actually works <br>
> properly before actual use, and that nothing leaks. And test again <br>
> after ANY software updates or configuration changes. So be VERY VERY <br>
> CAREFUL when using things like proxychains-ng.<br>
><br>
> A safer option might be to use something like Tails, a Debian Linux <br>
> based operating system which forces all programs to network over a <br>
> local SOCKS proxy providing Tor. It might be possible to configure <br>
> Tails to use some other SOCKS5 proxy as well.<br>
><br>
> Regarding Tor, please note that in its simplest configuration Tor <br>
> attempts to connect to public Tor relays, making it possible for <br>
> eavesdroppers to detect Tor usage. A way around this (as suggested by <br>
> the Tor project) is to use (private) Tor bridges which use domain <br>
> fronting, traffic obfuscation and similar tricks. You might also find <br>
> some of these technologies useful for the tunneling the SOCKS5 traffic.<br>
><br>
><br>
> Best regards,<br>
> Jaak<br>
><br>
><br>
> PS: All security technologies and their implementations, including <br>
> proxychains-ng, Tails and Tor, have their weak points. So take care <br>
> when evaluating their fitness for your particular purpose.<br>
><br>
><br>
> On 31.08.24 14:20, Tobias Klein wrote:<br>
>> Hi Troy and all,<br>
>><br>
>> One of the Ezra users has asked the following:<br>
>><br>
>><br>
>> The websites for updating modules and downloading Bibles are either <br>
>> inaccessible or subject to censorship for people living in countries <br>
>> that restrict internet access.<br>
>><br>
>> Could the program be updated to support setting up a SOCKS5 or HTTP <br>
>> proxy, allowing users to access the internet through a proxy?<br>
>><br>
>><br>
>><br>
>> How do you assess this request from a SWORD library perspective?<br>
>><br>
>><br>
>> Best regards,<br>
>> Tobias<br>
>><br>
>><br>
>> _______________________________________________<br>
>> sword-devel mailing list: <a href="mailto:sword-devel@crosswire.org" target="_blank" rel="noreferrer">sword-devel@crosswire.org</a><br>
>> <a href="http://crosswire.org/mailman/listinfo/sword-devel" rel="noreferrer noreferrer" target="_blank">http://crosswire.org/mailman/listinfo/sword-devel</a><br>
>> Instructions to unsubscribe/change your settings at above page<br>
><br>
> _______________________________________________<br>
> sword-devel mailing list: <a href="mailto:sword-devel@crosswire.org" target="_blank" rel="noreferrer">sword-devel@crosswire.org</a><br>
> <a href="http://crosswire.org/mailman/listinfo/sword-devel" rel="noreferrer noreferrer" target="_blank">http://crosswire.org/mailman/listinfo/sword-devel</a><br>
> Instructions to unsubscribe/change your settings at above page<br>
_______________________________________________<br>
sword-devel mailing list: <a href="mailto:sword-devel@crosswire.org" target="_blank" rel="noreferrer">sword-devel@crosswire.org</a><br>
<a href="http://crosswire.org/mailman/listinfo/sword-devel" rel="noreferrer noreferrer" target="_blank">http://crosswire.org/mailman/listinfo/sword-devel</a><br>
Instructions to unsubscribe/change your settings at above page<br>
</blockquote></div>