Fact-checked by Grok 2 weeks ago

Orbot


Orbot is a free, open-source mobile application developed by the Guardian Project that implements the Tor protocol to provide anonymity and secure internet access on Android and iOS devices.
Acting as a system-wide proxy and VPN service, Orbot encrypts users' internet traffic and routes it through the volunteer-operated relays of the Tor network, thereby concealing the origin of data packets and thwarting traffic analysis by network observers.
Key features include selective routing of individual apps through Tor, support for accessing and hosting onion services, and integration of Tor bridges to circumvent network restrictions imposed by governments or ISPs.
As part of the Guardian Project's broader initiative to create privacy-enhancing tools for mobile platforms, Orbot empowers users to protect against surveillance and censorship, with its source code maintained openly on GitHub for transparency and community contributions.

Overview

Description and Purpose

Orbot is a free, open-source proxy application designed for mobile devices, primarily Android, that integrates with the Tor network to route internet traffic from other applications, thereby enabling anonymous and secure online access. Developed by the Guardian Project, it functions as a system-level proxy, allowing users to select specific apps—such as web browsers, email clients, or messaging services—for anonymization without requiring those apps to have built-in Tor compatibility. The core purpose of Orbot is to enhance and circumvent internet censorship by directing device traffic through Tor's multi-layered system, which obfuscates the originating and encrypts data across volunteer-operated relays to resist and content blocking. This setup empowers users in restrictive environments to access blocked resources or communicate without revealing their location or identity to network observers, including governments or ISPs. Unlike the Tor Browser, which provides a self-contained, isolated browsing environment with hardened security features tailored to web navigation, Orbot emphasizes flexible proxying for arbitrary traffic, supporting per-app routing modes (e.g., VPN mode for broader compatibility or proxy for targeted use) to balance with usability on resource-constrained mobile platforms. An version extends similar functionality to Apple devices, though with platform-specific limitations on system-wide proxying.

Development and Licensing

Orbot was developed by the Guardian Project, a collective of software developers and advocates dedicated to creating open-source mobile security tools, in close collaboration with the Tor Project to enable Tor network access on Android devices. This partnership leverages the Tor Project's anonymity protocols while adapting them for mobile constraints, emphasizing a non-commercial approach driven by privacy advocacy rather than profit motives. The software is distributed under the BSD 3-Clause License, commonly referred to as the License in implementations like Orbot, which allows for free examination, modification, and redistribution of the source code. This licensing model supports independent code audits by security researchers and enables community forks or integrations, aligning with the project's ethos of transparency and verifiable trust in anonymity tools. Maintenance occurs through volunteer contributions from programmers, including lead developers such as Nathan Freitas and Hans-Christoph Steiner, with funding derived from grants to the Guardian Project rather than corporate sponsorships or user fees. This structure sustains regular patches and updates, preserving the application's integrity amid evolving mobile threats as of 2025, without reliance on proprietary elements that could compromise its open ethos.

History

Origins and Initial Development

Orbot's development began in 2009 as part of the Guardian Project's initiative to create secure communication tools for mobile devices, specifically adapting the network's for smartphones. This effort addressed the limitations of desktop-focused by enabling anonymous internet access on resource-constrained mobile platforms, where traditional VPNs and proxies often lacked sufficient protections. The Guardian Project, focused on open-source security apps, positioned Orbot as a bridge to route application traffic through relays without necessitating device rooting, a common barrier for mobile users at the time. The initial prototype integrated core components, including the Tor daemon, a custom controller, for HTTP proxying, and for event handling, into a unified package. Development occurred amid expanding smartphone adoption and heightened awareness of surveillance risks from governments and corporations, such as location tracking via cellular networks and data collection, which 's desktop version could not mitigate on mobile. The first public release followed in October 2009, marking Orbot's debut as a functional . Early iterations faced technical hurdles in adapting Tor's bandwidth-intensive protocols to Android's battery-limited and intermittent environments, requiring optimizations to prevent excessive drain or instability. By March 2010, highlighted Orbot's progress in official announcements, emphasizing its role in extending to mobile users while preserving Tor's multi-hop and circuit-based . These foundational steps established Orbot as a non-root solution, prioritizing usability for journalists, activists, and privacy-conscious individuals in censored regions.

Major Releases and Updates

Orbot's initial stable release, version 1.0 in early 2011, established core Tor proxy functionality for Android, supporting SOCKS and HTTP proxies to route device traffic anonymously through the Tor network. Updates in the mid-2010s emphasized stability and integration, with version 15.x releases around 2016 introducing refinements to VPN-based routing for per-app Tor usage and addressing connectivity issues on evolving Android APIs. A 2018 update delivered major user interface overhauls, streamlining bridge configuration and bootstrap processes for faster Tor connections. iOS compatibility arrived later with the platform's dedicated Orbot app launch in February 2022, adapting the mechanism to iOS VPN APIs while incorporating 's embedded relay capabilities constrained by Apple's networking restrictions. In the 2020s, version 16.x and 17.x series prioritized security and compatibility, integrating 0.4.8.x updates with hardening against known exploits; enhancements included expanded obfuscation bridges such as and obfs4 for circumvention, alongside fixes for + behaviors like restricted foreground services and . Performance gains featured reduced RAM footprints via optimized pluggable transports and experimental 16KB page size support in beta builds, enabling smoother operation on resource-limited devices.

Technical Details

Integration with Tor Network

Orbot embeds a native Tor client library, implemented via the TorService module, which operates as a local daemon process on Android devices to interface directly with the Tor network. This daemon fetches the latest network consensus from directory authorities, enabling selection of relays based on bandwidth weights, stability flags, and policy compliance; entry guards are preferentially chosen to mitigate traffic analysis risks, followed by middle relays for obfuscation and exit relays validated against destination requirements. Circuits are constructed as three-hop paths—entry, middle, and exit—using layered onion encryption, where each hop decrypts and forwards only the subsequent relay's address, ensuring no single relay observes the full path. Traffic ingress to these circuits occurs via the daemon's exposed SOCKS5 proxy (typically on port 9050) and HTTP proxy, which encapsulate application data into cells for transmission; SOCKS5 supports UDP association for compatible protocols, while both proxies enforce stream isolation to separate circuits by destination or application. DNS resolution is routed exclusively over streams to the designated resolvers, preventing leakage of domain queries to external networks and preserving anonymity against local observers. Circuit reliability in Orbot mirrors the network's aggregate performance, with build times typically ranging from 1 to 10 seconds depending on client-relay and freshness; empirical measurements indicate over 90% success rates for establishment under normal conditions, though environments introduce variability from intermittent and power constraints. To accommodate device limitations, Orbot configures conservative parameters such as a 5 limit on MaxMemInQueues, reducing buildup during unstable links and prioritizing rebuilds over exhaustive retries, thereby optimizing for efficiency without compromising core protocol integrity.

App Routing and Proxy Mechanisms

Orbot utilizes Android's VpnService API to emulate a local VPN interface, enabling the interception and selective routing of network traffic from designated applications through the Tor network without necessitating device root privileges or enforcing system-wide proxying. This mechanism allows Orbot to capture IP packets at the virtual network layer for chosen apps, encapsulating them within Tor circuits for anonymized transmission, while permitting non-selected apps to bypass the proxy entirely and connect directly to the internet. Users configure per-app routing via Orbot's settings interface, where toggles enable or disable proxying for individual applications, ensuring that only specified traffic is routed to prevent inadvertent data exposure from unproxied apps. In this mode, Orbot establishes SOCKS5 or HTTP proxies internally for compatible apps, but leverages the VPN emulation for transparent handling of those lacking native proxy support, directing their outbound connections through entry nodes. This selective approach isolates proxied app traffic from direct , reducing correlation risks between apps, though it relies on Android's app sandboxing and does not inherently segregate Tor circuits per app unless additional isolation settings are enabled. By avoiding full-device VPN enforcement, Orbot minimizes disruptions to non-Tor-dependent services, such as those sensitive to latency introduced by 's .

Supported Platforms and Compatibility

Orbot primarily supports Android operating systems, with the latest versions requiring Android 7.0 or higher for optimal performance, though earlier releases have historically accommodated devices running Android 4.1 and above. The application functions as a system-wide proxy or VPN, routing traffic through the Tor network, but compatibility can be affected by device-specific hardware limitations, such as insufficient RAM or processing power on very low-end smartphones, which may lead to unstable connections or failure to maintain circuits. Secondary support exists for iOS devices via the Apple App Store, where Orbot operates as a Tor-powered VPN for and later versions, marking an expansion into the ecosystem following its initial focus. This implementation, developed by the Guardian Project, enables device-wide routing but is constrained by Apple's stricter app sandboxing and VPN APIs, limiting seamless integration compared to . On Android, compatibility challenges arise from evolving OS restrictions on background services, particularly in versions 14 and 15, where the system may terminate Orbot processes to enforce battery optimization and doze modes, necessitating user intervention for restarts. Additionally, network changes, such as switching between and cellular data, often require manual reconnection of the proxy, as automatic handling can fail due to these platform-level policies. Orbot lacks native support for alternative mobile operating systems like Huawei's , though partial compatibility may occur on Android-derived forks via sideloaded APKs, relying instead on the broader ecosystem for any cross-platform anonymity needs.

Features

Core Anonymization Tools

Orbot enables Tor-based anonymity primarily through its proxy activation mechanism, which routes selected or all device traffic via the Tor network to encrypt connections and obscure the user's IP address from destinations. Users activate this with a simple start command in the app interface, establishing a SOCKS5 proxy on localhost port 9050 or enabling VPN mode for transparent proxying without requiring root access on Android 8.0 and later. This one-tap enablement supports both full-device coverage and per-app selection, allowing granular control over which applications' traffic is anonymized while others use standard connections. To counter network and , Orbot integrates support for bridges with pluggable transports, notably obfs4, which disguises handshakes as innocuous to bypass firewalls. Built-in bridge lists include obfs4 configurations, and users can refresh them via an "Ask for Bridges" option that queries the Project's distribution service for current, unblocked relays. This feature proved effective in regions like and , where standard entry points are blocked, as obfs4 adds authentication and padding to resist active probing. Orbot adheres to Tor's exit policy, where the final relay (exit node) decrypts traffic before reaching the , exposing unencrypted content to potential monitoring; the app does not alter this but relies on users applying or onion services for protection. Tor's no-logs policy extends to Orbot, with neither retaining connection or traffic contents, a design verified through independent code audits of the Tor core, including those by Cure53 in 2018 and 2021 that confirmed absence of logging mechanisms.

Configuration and Customization Options

Orbot offers users a range of options to adapt the application to varying models, such as selective or enhanced resistance. In proxy mode, it exposes standard ports—including on 9050 and HTTP on 8118—allowing manual setup in browsers or applications that support proxy , thereby enabling targeted anonymization without affecting all device . VPN mode, conversely, facilitates per-app , where users designate specific applications to tunnel through while exempting others to conserve battery and data, a suited to users prioritizing over comprehensive coverage. Advanced settings include an "Advanced Tor Configuration" interface for torrc overrides, such as increasing the default MaxMemInQueues from 5 MB to higher values like 10 MB to mitigate circuit-building failures on memory-limited devices, though this requires a restart and risks stability trade-offs. Users can request new identities or circuits via Tor's control protocol, accessible indirectly through Orbot's service management, which refreshes paths to address potential correlation risks or stalled connections. Circuit visualization is available in logs or status displays, aiding verification of multi-hop paths, while bandwidth-related tweaks, like queue limits, indirectly cap throughput to prevent overload on mobile hardware. For censored networks, custom bridges with pluggable transports like obfs4 are configurable via the bridges menu, obtainable through 's bridge distribution or bots; these obfuscate traffic to evade detection, proving effective in regions with active blocking but demanding iterative updates as censors adapt, thus elevating setup complexity over default direct connections. In practice, such bridges assist connectivity in high-censorship areas like , where standard relays are filtered, yet empirical tests show frequent obsolescence, necessitating private or variants for sustained access. Legacy integration with Orfox involved chaining, but contemporary setups favor or manual in modern browsers to leverage these options without deprecated dependencies.

Security and Privacy Analysis

Strengths in Anonymity and Encryption

Orbot employs the network's protocol, which encapsulates data in multiple layers of across at least three relays, ensuring that no single relay knows both the origin and destination of traffic. This design hides the user's from destination sites and resists correlation attacks by distributing knowledge of the traffic path, providing stronger protection against than single-hop proxies like VPNs, where a central possesses full visibility into user endpoints. Empirical evidence from metrics underscores the protocol's effectiveness, with over 2 million daily users worldwide relying on it for as of 2025, including surges in adoption during periods of heightened . Orbot, as a of this system, extends these benefits to devices without introducing centralized logging of addresses or traffic history, as verified by its open-source and operational claims. Independent assessments highlight Tor's utility for high-risk users, such as journalists in repressive regimes, where endorses its use to safeguard source communications and evade monitoring, with documented increases in traffic correlating to political crackdowns. The protocol's resistance to stems from its multi-hop structure, where each relay peels away one layer without decrypting the full payload, inherently complicating deanonymization efforts compared to VPNs that rely on endpoint trust.

Known Vulnerabilities and Mobile-Specific Risks

Orbot has faced scrutiny over permission requests in updates, notably in June 2017 when version updates sought access to device ID and caller information alongside photo//files, prompting user concerns about unnecessary escalation of privileges that could enable tracking or leaks, though developers maintained these were for enhanced functionality and no was evidenced. This incident underscored mobile OS-level trust dependencies, where Android's permission model allows apps broad hardware access post-grant, potentially conflicting with Tor's anonymity goals despite subsequent restrictions in on device identifiers requiring privileged phone state reads. Stability vulnerabilities include frequent crashes triggered by network changes, such as transitions between WiFi and cellular data, which disrupt the Tor daemon and require manual restarts to restore connectivity, as documented in developer reports from 2016 onward. Additionally, Orbot has displayed false positives in connection status, claiming full linkage to the Tor network (e.g., in version 15.2.0-rc8) even during underlying disconnects or clock desyncs, risking unproxied traffic exposure if users proceed under the misapprehension of protection; mitigations like auxiliary firewalls (e.g., Orwall) can prevent leaks but demand extra configuration. Mobile deployment amplifies leak vectors beyond network proxying: Android's sandbox permits apps—whether routed through Orbot's VPN mode or not—to query sensors like accelerometers and gyroscopes for device fingerprinting, generating unique signatures transmittable over Tor or via local side-channels, evading IP anonymization. Google Play Services integration in many apps further enables pre-proxy metadata collection (e.g., location hints or advertising IDs), as Orbot lacks root-level enforcement to block such non-network accesses without custom ROMs. Historical DNS resolution leaks in VPN mode, where queries bypassed Tor to ISP resolvers, were reported but addressed in patches, highlighting gaps in transparent proxying on stock Android. The persistent Tor daemon contributes to elevated battery consumption, potentially prompting user interruptions that expose traffic during daemon downtime.

Usage and Adoption

Installation and Basic Operation

Orbot is installed on Android devices primarily through the Store or the open-source app repository, with files also available from the official repository maintained by the Guardian Project. Upon installation, users must grant permissions for the app to establish a and access , as Orbot operates as a system-level leveraging Android's . No root access is required for basic functionality. Basic operation begins with launching the app and tapping the "Start" or power button icon to initiate a connection to the Tor network. This triggers the bootstrap process, during which Orbot contacts Tor directory authorities—hardcoded servers that provide the network consensus listing active relays—and downloads cryptographic descriptors to build initial circuits for anonymized routing. Successful bootstrapping, typically completing in 10-30 seconds on a stable connection, is indicated by a green onion icon and a "Connected" status; users can view progress and errors via the app's built-in log viewer accessible from the menu. To route traffic, enable VPN mode in settings, which intercepts and proxies selected data packets through Tor; by default, Orbot allows per-app selection via the "Tor-Enabled Apps" interface, where users toggle individual applications to use the SOCKS or HTTP proxy ports (typically 9050 or 8118) or full VPN interception. For daily use, maintain the by keeping Orbot running in the background, though Android battery optimization may pause it; manual reactivation is often needed after device reboots or network switches, as automatic reconnection is not universally reliable across all versions. Common pitfalls include bootstrap failures due to unstable or mobile data, which hinder directory downloads, and incorrect device clock settings that invalidate TLS certificates during authority handshakes—users should verify time synchronization via . In censored networks, bootstrap may stall without bridges, requiring manual configuration of obfs4 or obfuscation, though this extends beyond basic operation. Battery drain increases with VPN mode active, and not all apps respect routing without explicit selection.

User Demographics and Global Impact

Orbot's user base, as reflected in Store data, exceeds millions of installations, with over 197,500 ratings averaging 4.0 stars as of late 2025, primarily among users seeking enhanced and circumvention capabilities. Adoption metrics indicate a concentration in regions with stringent controls, where bridge usage—facilitated by Orbot—is disproportionately high; for instance, and consistently rank among the top countries for bridge connections, driven by government blocks on direct relay access. This demographic skew favors technically inclined individuals and activists prioritizing over convenience, as evidenced by Orbot's integration into toolkits for evading in these locales. Globally, Orbot contributes to censorship circumvention by routing mobile traffic through the Tor network, enabling access to restricted sites during crackdowns, such as Russia's 2022 blocking of independent media or Iran's protest-related internet restrictions in the same year. Documented cases highlight its role in sustaining information flows akin to earlier events like the Arab Spring, where Tor proxies aided dissident communications, though Orbot's post-2010 development amplified mobile-specific utility in subsequent uprisings. However, its impact remains constrained: mobile Tor traffic, including Orbot-routed sessions, accounts for only a minor portion of the network's total volume—far below desktop dominance—due to inherent latency and bandwidth limitations that deter widespread adoption beyond niche, high-stakes use. This trade-off causally limits scalability, as slower speeds and battery drain reduce viability for casual users, confining Orbot's effects to targeted empowerment in repressive environments rather than broad societal transformation.

Criticisms and Controversies

Performance and Usability Limitations

Orbot's integration with the Tor network inherently imposes performance overheads from multi-hop routing through volunteer relays, resulting in significantly reduced browsing speeds and increased latency compared to direct internet connections. Tests indicate speed reductions of around 37% on Android devices, though real-world user experiences often describe it as unusably slow for bandwidth-intensive tasks like video streaming or large file downloads, where circuit bandwidth limitations and relay congestion exacerbate delays. Efforts to evade geo-restrictions via Tor exit nodes prove inconsistent, frequently failing to access region-specific content such as Netflix libraries due to variable node locations and service-side detection. Usability challenges arise particularly in mobile environments, where Orbot proves sensitive to network fluctuations like transitions between Wi-Fi and cellular data. Such changes can disrupt Tor circuits, leading to connection timeouts or errors that necessitate manual restarts, proxy clearing in access point names, or app-specific reconfiguration to resume functionality. Forum and user reports document recurring issues with apps failing to proxy traffic correctly, requiring repeated interventions that undermine seamless operation. Resource consumption further limits practicality, especially on older or low-end hardware, where Orbot's processes contribute to elevated CPU utilization and drain. Empirical measurements show an additional 4 percentage points of usage over 12 hours on networks without traffic padding, though isolated cases report drastic spikes prompting force-closure to avert malfunction. These demands can interrupt sessions prematurely through depletion or throttling, particularly during prolonged use. Orbot, by routing mobile traffic through the Tor network, has been credited with enabling dissidents, journalists, and whistleblowers to communicate securely in repressive environments, such as during protests in censored nations where direct internet access is monitored or restricted. For instance, Edward Snowden utilized Tor to disclose classified information in 2013, highlighting its role in protecting sources from retaliation. Privacy advocates argue that such anonymity tools are essential for upholding free expression against state surveillance, positioning Orbot as a vital extension of Tor for mobile users in regions like Iran or China, where it circumvents blocks on the underlying network. Critics, including agencies, contend that Orbot's facilitates untraceable criminal activities, such as drug trafficking and child exploitation on sites accessible via hidden services. U.S. Department of Justice reports document 's role in hosting anonymous marketplaces for illicit goods, complicating investigations into offenses like distribution. Analyses of traffic indicate that approximately 6.7% of daily users connect to hidden services linked to illegal content, underscoring causal connections between network and persistent online harms. Realists emphasize that while benign uses exist, the network's design inherently shields offenders, as evidenced by challenges in de-anonymizing perpetrators despite advanced techniques. Legally, Orbot faces restrictions in authoritarian states that detect and block connections, including via its Great Firewall and through bridge detection, mandating alternative obfuscation methods for access. has pursued bans on to curb dissent and crime alike. In the United States, of the grants the Tor Project immunity from liability for user-generated harms on the network, as affirmed in a 2019 district court ruling shielding it from claims over transactions, though this protection fuels debates on whether it unduly burdens accountability for anonymous offenses. absolutists defend such legal safeguards as necessary to prevent chilling effects on legitimate speech, while opponents highlight empirical links to enforcement failures, advocating targeted reforms without dismantling core anonymity features.

Reception

Critical Reviews and Ratings

Orbot holds a 4.0 out of 5 rating on the Google Play Store, derived from approximately 197,500 user reviews as of October 2025. Positive feedback centers on its no-cost provision of Tor-based anonymity, enabling secure browsing and effective evasion of internet censorship in restricted regions. However, recurring criticisms highlight operational instability, such as frequent connection drops and slow performance attributable to Tor's multi-hop routing, rendering it unsuitable as a primary daily VPN. On the , Orbot scores 3.6 out of 5 from 26 ratings. Reviews commend its enhancements for targeted but note diminished functionality compared to the version, stemming from iOS sandboxing limitations that restrict full integration. A May 2025 Wizcase review praises Orbot for robust in communications and against trackers, yet critiques its impracticality for bandwidth-intensive tasks like streaming due to inherent . Across platforms, ratings reflect a pattern where specialized uses—such as accessing blocked sites—earn high approval, while general draws lower scores for reliability issues.

Comparative Analysis with Alternatives

Orbot, as a mobile implementation of the Tor network, offers distinct advantages in anonymity over commercial VPNs through its decentralized routing across multiple volunteer-operated relays, which resists centralized censorship more effectively than VPN providers reliant on proprietary servers. For instance, Tor's use of bridges and pluggable transports enables circumvention of national firewalls, a capability less reliable in VPNs due to blockable IP ranges and provider cooperation with authorities. However, Orbot exhibits significantly slower connection speeds—often 10-20 times slower than VPNs—owing to multi-hop onion routing, making it unsuitable for bandwidth-intensive tasks like streaming, whereas VPNs prioritize throughput via single-hop encryption. Open-source code for Orbot and Tor allows independent audits, contrasting with proprietary VPNs where unverified logging claims persist despite no-warrant assurances, enhancing trust in Orbot's anonymity guarantees absent a profit-driven operator. In comparison to desktop Tor Browser, Orbot provides device-wide proxying for apps but faces heightened vulnerability to and DNS leaks inherent to mobile operating systems, such as 's boot-time network access or app crashes disrupting the VPN interface. Tor enforces stricter isolation via a sandboxed browser environment, minimizing leaks from system services, whereas Orbot's VPN mode cannot fully prevent traffic bypassing during restarts or without additional firewalls. experts note this mobile-specific weakness stems from OS-level integrations, rendering Orbot less robust for high-stakes despite shared core protocols. Against , an alternative anonymity network focused on internal services, Orbot excels in clearnet access with stronger resistance to via entry guards, but lags in hidden service latency where I2P's garlic routing yields faster, more scalable performance for intra-network activities. Orbot avoids I2P's detectability issues—where ISPs can identify I2P usage more readily—but inherits Tor's exit node risks, exposing users to potential malicious relays for outbound connections, unlike I2P's end-to-end encrypted tunnels. Empirically, Orbot's decentralized design precludes single-point failures like VPN kill-switch malfunctions, yet demands user caution against exit traffic interception, a risk mitigated in direct connections but amplified in multi-hop paths.

References

  1. [1]
    Orbot: Proxy with Tor - Guardian Project
    Orbot is a free VPN and proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides ...Afrikaans · Slovenčina · Kiswahili · Eesti
  2. [2]
    Orbot - Tor for Mobile
    Orbot allows any app to connect to an onion service, and for your phone to host an onion service itself! Stay Connected. Orbot offers access to a variety of ...Download · Ay · Bo · BrMissing: software | Show results with:software
  3. [3]
    Orbot | Tor Project | Support
    Orbot is a free app from The Guardian Project that empowers other apps on your device to use the internet more securely. Orbot uses Tor to encrypt your ...Missing: software | Show results with:software
  4. [4]
    The Github home of Orbot: Tor on Android (Also available on gitlab!)
    Orbot is a crucial component of the Guardian Project, an initiative that leads an effort to develop a secure and anonymous smartphone. This platform is ...Guardianproject/orbot · Issues 162 · Pull requests 7 · Actions
  5. [5]
    Orbot | Tor Project | Support
    Orbot is a free app from The Guardian Project that empowers other apps on your device to use the internet more securely. Orbot uses Tor to encrypt your ...
  6. [6]
    Tor at the Heart: Orbot and Orfox
    Dec 2, 2016 · Orbot is an app for Android that contains the core Tor service and provides connectivity to the Tor network for any app to utilize.
  7. [7]
    MOBILE TOR - Tor Browser User Manual
    Orbot is a free proxy app that empowers other apps to use the Tor network. Orbot uses Tor to encrypt your Internet traffic. Then you can use it with other apps ...
  8. [8]
  9. [9]
    Orbot on the App Store
    Rating 3.6 (26) · Free · Utilities/ToolsOrbot is the original free and open-source Tor-powered VPN for iOS and macOS. Orbot helps you access the internet with more safety and privacy.
  10. [10]
    Guardian Project's Nathan Freitas to keynote LibrePlanet 2021
    Feb 17, 2021 · Founded by Freitas, Guardian Project is most known for its Orbot app, which allows the anonymity-preserving proxy Tor to be easily used on ...<|separator|>
  11. [11]
    guardianproject / Tor on Mobile / orbot - GitLab
    May 10, 2019 · BSD 3-Clause "New" or "Revised" License. Created on. May 10 ... develop a secure and anonymous smartphone. This platform is designed ...
  12. [12]
    Releases · guardianproject/orbot-android - GitHub
    The Github home of Orbot: Tor on Android (Also available on gitlab!) - Releases · guardianproject/orbot-android.
  13. [13]
    Our Story - Guardian Project
    1. Orbot (2009 - Present). A Tor proxy for Android, allowing users to browse the internet anonymously by routing traffic through the Tor network. · 2. ChatSecure ...Missing: 2010 | Show results with:2010
  14. [14]
    Tor on Android | The Tor Project
    Mar 4, 2010 · Orbot is a single Android package that provides a new Tor controller, Privoxy as our trusty little HTTP proxy, libevent, and Tor itself.
  15. [15]
    Guardian Project Blog
    Orbot: Initial Release (repost). Posted on February 10, 2010 | n8fr8. This was originally posted in October 2009. I'd like to make this post ...
  16. [16]
    Orbot 1.0.5.2 now available - Guardian Project
    May 17, 2011 · Our flagship app, Orbot: Tor on Android, has been updated to version 1.0.5.2. It is available in the Android Market, or through direct ...
  17. [17]
    guardianproject/orbot-apple: Orbot VPN app for iOS - GitHub
    Torifies your iOS / macOS device running iOS 15 or macOS 11 and newer. Find links to official releases, beta tests etc. here.
  18. [18]
    TorService: Tor library for Android - Guardian Project
    The included libtor.so binaries can also be used directly as a tor daemon. This is used in Orbot, TorServices, OnionShare, and more. Features. Native Android ...
  19. [19]
    FAQs - Orbot
    Open the Orbot, press the big button, and after a few seconds establishing a connection to Tor you will see a message that says 100% connected, and the button ...
  20. [20]
    Welcome to Tor Metrics - Tor Project
    Users, advocates, relay operators, and journalists can better understand the Tor network through data and analysis made available by Tor Metrics.Users · Relay Search · Servers · TrafficMissing: 2025 | Show results with:2025
  21. [21]
    Orbot: Tor on Android for Android - Download the APK from Uptodown
    Rating 4.3 (36) · Free · AndroidGet the latest version. 17.7.0-RC-1-tor-0.4.8.19. Oct 21, 2025 · Older versions. Video about Orbot: Tor on Android 1 ... Date, Oct 21, 2025. Content Rating, +3.
  22. [22]
    Tor Mobile | Tor Project | Support
    We recommend iOS apps Onion Browser and Orbot for a secure connection to Tor. Onion Browser and Orbot are open source, use Tor routing, and are developed by ...
  23. [23]
    [BUG] App is regularly killed by the OS due to changes to ... - GitHub
    Mar 12, 2025 · In Android 15, as of 17.4.1-BETA-4-tor-0.4.8.13, Orbot stops running on a regular basis, and it may fail to automatically start later as well ...Missing: compatibility | Show results with:compatibility
  24. [24]
    Android Orbot with "Private DNS" enabled - Tor Project Forum
    Nov 29, 2023 · a) On Android, Orbot is basically a VPN app, and “Private DNS” has priority over VPN settings. When “Private DNS” is enabled, all DNS queries ...Missing: background | Show results with:background
  25. [25]
    Orbot Huawei phones - General Discussion - Tor Project Forum
    Apr 15, 2023 · At first we thought orbot had a bug or getting hacked and stopped protecting. Huawei have changed this menu item into LAUNCH ON HUAWEI PHONES.
  26. [26]
    Censorship | Tor Project | Support
    However, because it has a bandwidth limitation, this option will be quite slow. You can select meek-azure from Tor Browser's built-in bridges dropdown. For ...
  27. [27]
  28. [28]
    How can we help? | Tor Project | Support
    On Android, The Guardian Project also provides the Orbot app to route other apps on your Android device over the Tor network. There is no official version ...
  29. [29]
    How to use bridges in Orbot? - Tor Stack Exchange
    Dec 1, 2016 · On the page opened, click on "Get Bridges" option. Scroll down to the "Advanced Options" box, and select "obfs4" on "Do you need a Pluggable ...
  30. [30]
    A closer look at the Great Firewall of China - Tor Blog
    Oct 6, 2014 · I used the same 6 bridges on Orbot and on my desktop and they worked for my entire stay. It was easy to set up, although Orbot could do with ...
  31. [31]
    Tor (network) - Wikipedia
    Tor ; Developer · The Tor Project ; Initial release, 20 September 2002; 23 years ago (2002-09-20) ; Stable release(s) [±] ; Preview release(s) [±].The Tor Project · Onion routing · Paul Syverson
  32. [32]
    Tor vs. VPN: What's the Difference and Which Is Better? - CNET
    May 16, 2024 · Generally, VPNs are more user-friendly and deliver faster internet speeds when compared with Tor, while Tor makes communications tough to trace ...
  33. [33]
  34. [34]
    Over 2 million people rely on Tor daily—here's why - LinkedIn
    Mar 12, 2025 · Tor Browser has a significant global user base with over 2 million users accessing the network daily. Usage patterns vary significantly by ...
  35. [35]
    Tor Stats 2025 | 99firms
    Over two million people use Tor daily. · The US government has played a big part in the development of the Tor Project. · Half of all dark web domains are, in ...Missing: metrics | Show results with:metrics
  36. [36]
    Four ways journalists can protect sources using the “deep web”
    Feb 25, 2021 · Reporters Without Borders recommends journalists use Tor when interacting with sources in repressive regimes. The software was used during ...
  37. [37]
    The dilemma of the dark web: protecting neo-Nazis and dissidents ...
    Aug 23, 2017 · “Facebook has a Tor instance for people in repressive regimes,” says ... “We see Tor use go up whenever a dictatorship takes over or a coup occurs ...
  38. [38]
    Tor vs. VPN: Which Should You Use? - TheBestVPN.com
    Aug 11, 2025 · VPNs hide your IP and encrypt messages, while Tor provides anonymity. VPNs are more practical for everyday use, but Tor is for high-stakes ...
  39. [39]
    Is Orbot android TOR client compromised (permissions to device ID ...
    Jun 8, 2017 · During today's apps update, ORBOT update asks for aditional permissions: a) photo/media/files, and b) Device ID and caller information.Missing: vulnerabilities | Show results with:vulnerabilities
  40. [40]
    Device identifiers - Android Open Source Project
    Android 10 changes the permissions for device identifiers so that all device identifiers are now protected by the READ_PRIVILEGED_PHONE_STATE permission.Missing: Orbot 2017
  41. [41]
    Orbot often crashes when Network situation changes #48 - GitHub
    Sep 10, 2016 · Whenever Orbot has such problems, I have to force kill and restart it in order to get it back to work. I wish I could provide some logs, but I ...Missing: Tor switch
  42. [42]
    Mission Improbable: Hardening Android for Security And Privacy
    NOTE: To keep Orbot up to date, you will have to go into F-Droid Repositories option, and click Guardian Project Official Releases. Installation: F-Droid apps.
  43. [43]
    Haven't we met before? - Detecting Device Fingerprinting Activity on ...
    Jun 5, 2024 · This paper examines the prevalence of device fingerprinting in Android apps, a technique for apps to uniquely identify the device an app is executed on.
  44. [44]
    Using Orbot on Android to protect IP address instead of VPN
    Jul 20, 2023 · Looks like Orbot/VPN really only protects you from your ISP watching your web traffic. What are some other trustworthy free VPN's to consider, ...
  45. [45]
    Bug #5581: Orbot leaks DNS in VPN mode
    Orbot leaks DNS in VPN mode ... I have checked it with a leak test and my IP address is from a Tor exit node but the DNS IPs come from my service provider.
  46. [46]
    [BUG] Sudden vast battery consumption · Issue #1091 - GitHub
    Feb 17, 2024 · The moment I Force Stop Orbot, the phone begins to function normally again. I had Kindness mode running as well. Not sure if it is correlated.Missing: daemon | Show results with:daemon
  47. [47]
  48. [48]
  49. [49]
    Orbot - Keep Apps Safe.
    ### Summary of Orbot
  50. [50]
    Connection failure with Orbot - General Discussion - Tor Project Forum
    Jan 6, 2022 · Since the 2 last updates of Orbot, the VPN does not work. The connexion is charging and never goes to the end. The key finally appears, the ...Orbot blocks certain applications - Tor Project ForumClosing Tor Browser on android stops Orbot as wellMore results from forum.torproject.orgMissing: switch | Show results with:switch
  51. [51]
    Bug #3796: bootstrapping/connection problems - Orbot
    Tor needs an accurate clock to work correctly. Please check your time and date settings! NOTICE: I learned some more directory information, but not enough to ...
  52. [52]
    How to: Use Tor on Android and iPhone | Surveillance Self-Defense
    Nov 8, 2023 · On Android, download Tor Browser from Google Play. On iPhone, use Onion Browser (with or without Orbot). On Android, tap "Connect" to start. On ...
  53. [53]
    Orbot: Tor for Android - Apps on Google Play
    Rating 4.0 (197,549) · Free · AndroidOrbot is a free VPN and proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic.
  54. [54]
    Users - Tor Metrics
    Users. We estimate the number of users by analyzing the requests induced by clients to relays and bridges. Relay users · Bridge users by ...Missing: 2025 | Show results with:2025
  55. [55]
    Orbot: Over 20 Million Served, Ready for the Next Billion
    May 16, 2018 · Since we release Orbot roughly 8 years ago, it has been installed more than 20 million times, by people from hundreds of different countries and ...
  56. [56]
    Circumventing Censorship for Russian Users - Localization Lab
    Mar 4, 2022 · Most recently, Russia's parliament passed a new censorship law ... Orbot (Android): a free and open-source proxy app that uses Tor to ...
  57. [57]
    How to help #KeepItOn in Iran - Access Now
    Jan 10, 2018 · There are a number of tools available to help people in Iran circumvent shutdowns, as well as to document the interference with communications.
  58. [58]
    [PDF] Tor censorship attempts in Russia, Iran, Turkmenistan
    Dec 28, 2023 · So, we have unlisted relays called “bridges” and there is a cat-and-mouse game where users try to get a bridge that the censor didn't already ...Missing: custom | Show results with:custom
  59. [59]
    Orbot Review 2025 — Is the Free App Secure and Anonymous?
    Rating 4.1 (3) May 24, 2025 · No, Orbot lets you use the internet safely and anonymously on your smartphone. Just keep in mind that for apps that require you to log in like ...
  60. [60]
  61. [61]
    Cannot connect to data network after using Tor VPN (Orbot) on ...
    May 22, 2018 · Go to Settings/More/Mobile Network/Access Point Name. Tap on selected apn, make sure that proxy and port field are empty.
  62. [62]
    Orbot (Android) just causing connection errors : r/TOR - Reddit
    Jul 30, 2025 · Have you touched any DNS settings in the app? Here is what I and AI think tho: - Misconfiguration of Orbot or the device's DNS settings, causing ...Questions about Orbot working + using Orbot with DDG tracking ...Android - Tor Browser cannot connect when Orbot is ... - RedditMore results from www.reddit.comMissing: compatibility background
  63. [63]
    Firefox android app fails when using orbot (tor) - Mozilla Support
    Jun 26, 2013 · I after activating Orbot and connecting to the Tor network, my stock browser works just fine and I can go to websites. Firefox however returns an error page.
  64. [64]
    [PDF] On the Energy Demand and Feasibility of Anonymity Networks on ...
    Aug 11, 2023 · For a 12-hour usage period, a mobile Tor client on a 4G network requires an additional 4 percentage points of battery charge which appears ...
  65. [65]
    Thank You, Edward Snowden | The Tor Project
    Dec 26, 2019 · In Snowden's case, using Tor allowed him to fulfil his oath to the constitution of the United States and release information of public interest ...
  66. [66]
    Edward Snowden: the whistleblower behind the NSA surveillance ...
    Jun 9, 2013 · The 29-year-old source behind the biggest intelligence leak in the NSA's history explains his motives, his uncertain future and why he never intended on hiding ...<|separator|>
  67. [67]
    The potential harms of the Tor anonymity network cluster ... - NIH
    Nov 30, 2020 · Our data suggest that likely malicious/benign users of the Tor anonymity network are not evenly spread globally and, in fact, vary ...
  68. [68]
    Tor Statistics 2025: Key Metrics & Insights - SQ Magazine
    Sep 29, 2025 · The Tor network is accessed by approximately 2.5 million daily users globally. Estimates suggest that 6–7% of users interact with .onion ...
  69. [69]
  70. [70]
    The Tor Network: A Guide to the Dark Web Browser - Avast
    May 17, 2024 · Tor Browser takes online privacy to an extreme. With an encrypted and anonymous connection, Tor helps you access the unindexed part of the internet known as ...
  71. [71]
    The Tor Browser Afforded CDA Immunity for Dark Web Transactions
    Jun 18, 2019 · Many people and organizations use the Tor ... journalists, human rights organizations and dissidents living under repressive regimes.
  72. [72]
    [PDF] The Dark Web Dilemma: Tor, Anonymity and Online Policing
    Sep 21, 2015 · Online anonymity-granting systems such as The Onion Router (Tor) network can be used for both good and ill. The Dark Web1 is possible only ...
  73. [73]
    Alternative Networks - Privacy Guides
    Apr 10, 2024 · Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying pluggable transports. On the other hand, ...
  74. [74]
  75. [75]
    Onion Browser Review: Tor on iOS - Privacy Guides
    Sep 18, 2024 · Using the dedicated Orbot app also provides more robust protections against IP address leaks. Onion Browser warns in its comparison that using ...
  76. [76]
    9 of the Best Tor Alternatives for Anonymous Browsing
    Aug 16, 2024 · Websites can't track you, but unlike Tor, I2P can't hide your browser fingerprint data. Your ISP will know you're using I2P, but they won't know ...