Tutorial: Opera Mobile proxied through Tor. - Android & Iphone
Users browsing this thread: 3 Guest(s)
|
|||
Disclaimer; I found this somewhere quite awhile ago, so I don't know who to credit, but I sure can't claim glory here.
Prerequisites: * Un-rooted Android device with Orbot properly installed and configured. * Opera Mobile properly installed to default configuration. * A few spare minutes. Tor on an unrooted Android sucks when you're stuck using "Orweb" as the only Tor compatible browser in conjunction with Orbot. No copy/paste; no multi tabbed browsing; no bookmarks, etc. Orbot is an Android Tor+Privoxy setup wizard which establishes the necessary encrypted circuits within the Tor network to facilitate an attempt at anonymous communications over the "clear" internet. Basically any browser that allows proxy configuration can be used with Orbot. Here's one way to do it with Opera Mobile and Orbot running in the background: * Open up "Opera Mobile" and type "about:config" in the address bar, then hit "Go" * Scroll down until you see the "Proxy" section, select it. * Under "HTTP server" and "HTTPS server" enter "127.0.0.1:8118" [without quotes] * This is the default port and address for a Tor localhost proxy. * Click the checkboxes next to "Use HTTP" and "Use HTTPS" to enable proxy usage for the respective protocols within Opera Mobile, * Click "Save" and restart Opera Mobile. * It's recommended to disable Javascript within Opera Mobile to avoid potential address leaks. * Once you have Orbot fired up and you see the green onion, load up Opera Mobile and visit the following page to check if your setup is OK: https://check.torproject.org/ If all went well the site will say so. Click the buttons labeled "Default" to restore non Tor proxied browsing. Happy obfuscated mobile computing! BSD is what you get when a bunch of Unix hackers sit down to try to port a Unix system to the PC.
Linux is what you get when a bunch of PC hackers sit down and try to write a Unix system for the PC. |
|||
|
|||
Nice tutorial, I like it. Thanks. Altrough I believe Tor isn't so safe. :)
|
|||
|
|||
(05-09-2012, 09:18 PM)NeoTerra Wrote:(05-09-2012, 11:06 AM)pac Wrote: Nice tutorial, I like it. Thanks. Altrough I believe Tor isn't so safe. :) First, I need to apologize for my wrongfully statement. TOR is safe depends what are you doing. Tor is used for anonymity, not for privacy. There is still a slight chance that someone is able toread your email credentials, msn passwords, forum accounts... INothing is safe anymore on the internet. Certain nodes can block different sites, so their users can get on. Here(link) is quite long and very informative post why TOR is not safe. |
|||
|
|||
Using end to end encryption can help deter MiTM, but I just use Tor to hide my originating IP address.
You can also modify these instructions to use your own private proxy. BSD is what you get when a bunch of Unix hackers sit down to try to port a Unix system to the PC.
Linux is what you get when a bunch of PC hackers sit down and try to write a Unix system for the PC. |
|||