rdns dev here
To add to points made above:
Today, Tor can only tunnel TCP (they are working on UDP as HTTP/3 requires it but I don't think it has happened yet?). Make sure to block all UDP in Rethink from Configure -> Firewall -> Universal firewall rules -> Block UDP except DNS and NTP.
If you want to make sure that your traffic always uses Orbot, then set it up as a SOCKS proxy from Configure -> Proxy -> toggle ON Setup SOCKS5 proxy.
Rethink's built-in Orbot integration will stop flowing traffic through Orbot if it detects that Orbot's side of the proxy (the local side that's facing Rethink, not the remote proxy that's facing Tor / its bridges) has been "closed" (which could mean many things, including user switching off Orbot or Orbot getting killed by the OS).
Orbot may drain more battery than necessary. If you've got accounts with some of the privacy respecting WireGuard VPN providers (not a recommendation, but some examples: Mullvad, Proton, or Windscribe), you could import their configurations in Rethink from Configure -> Proxy -> Setup WireGuard and use that instead. In Advanced mode, Rethink can run multiple WireGuard upstreams at once, and can split-tunnel apps between them. In the upcoming version, v055o
, Rethink will have the capability to hop one WireGuard over another.