Configuring your Android environment to connect to the Proxy.sh VPN network using obfsproxy stealth mode is not so simple. Obfsproxy is not officially ported yet on Android - BACKUP your personal data first! Nonetheless, there is a library you can find on this page@ gitweb.torproject.org/n8fr8/orbot.git/tree/refs/heads/obfs, which you can try to compile, install and run, if you have the sufficient knowledge and time. Once you have installed and run obfsproxy on port 1050, simply edit the OpenVPN configuration file@ proxy.sh/config that you are going to use to connect to the Proxy.sh network, and add or alter the following lines to it: socks-proxy-retry socks-proxy 127.0.0.1 1050 remote <VPN_SERVER_IP> 888 route <Specific VPN_SERVER_IP> 255.255.255.255 net_gateway (Note that <VPN_SERVER_IP> must be replaced by the server IP and that the 'remote' line is most likely to already exist in your configuration file, so that is only the port - 888 - that must be updated.) Voila, that's pretty much it. Connect to the VPN network using this modified configuration file while keeping obfsproxy running and your traffic will be completely scrambled. System administrators and government agencies alike will no longer be able to identify that you are using OpenVPN (and of course, still won't be able to decrypt the traffic it generates).