SimpleX setup with dispvm

Yep, you is right. I actived the SOCKS proxy

Use SOCKS proxy (Android only)

This option makes the app connect via a SOCKS proxy that should be provided by some other app running on your device.

The most typical use for this is to run Orbot app that provides a SOCKS proxy to connect via Tor network, but it can be some other app and it can proxy connections via some other overlay network.

Use .onion hosts

Android

Use .onion hosts option is only available when Use SOCKS proxy is enabled. You can choose:
(…)

  • required: always use .onion hosts. Choose this option if your SOCKS proxy connects via Tor network and you want to avoid connections without Tor. In this case, if the SMP relay address does not include .onion host, the connection will fail.

We need to follow this relevant topic about the use of .onion hosts option independently of the use SOCKS proxy:

For while, we could use .onion hosts enabling “required” mode of SOCKS proxy in settings - SimpleX v 6.4.3.1 (117)


Reference

https://simplex.chat/docs/guide/app-settings.html#use-onion-hosts

The answear to my doubt about why it is more secure to connect to a .onion service whenever one is available, even if your system is configured to only use Tor is: the Rendezvous Point, a randomly selected node acts as a secure meeting point where no single node knows both ends.

To be short: the 6-hop rendezvous circuit with a blind middle point (the Rendezvous Point) makes it incredibly difficult for any single entity to link a client to a specific hidden service.

Reference

https://community.torproject.org/onion-services/overview/

I will continue working in the main topic later.