Error handling for torified apps requiring UDP / protocols not supported by tor
Currently UDP streams of torified Apps are routed over Openvpn. This is breaks the anonymization feature. Instead we should
- inspect all packets for it's uid, not only TCP packets
- unconditionally handle DNS Requests over openvpn
- drop all UDP (discuss alternatively: all non-TCP packets?) packets that belong to a torified app
- in case a UDP (alternatively: non-packet packet) from a torified app was detected, inform the user in an AlertDialogFragment that the torified app requires a protocol Tor doesn't support and shouldn't be routed over tor, as will likely be malfunctioning. Offer an direct option to remove the app from the list of torified apps