Tutorial: Opera Mobile proxied through Tor. - Android & Iphone

Users browsing this thread: 1 Guest(s)
D9u
Long time nixers
Disclaimer; I found this somewhere quite awhile ago, so I don't know who to credit, but I sure can't claim glory here.



Prerequisites:
* Un-rooted Android device with Orbot properly installed and configured.
* Opera Mobile properly installed to default configuration.
* A few spare minutes.


Tor on an unrooted Android sucks when you're stuck using "Orweb" as the only Tor compatible browser in conjunction with Orbot.
No copy/paste; no multi tabbed browsing; no bookmarks, etc.

Orbot is an Android Tor+Privoxy setup wizard which establishes the necessary encrypted circuits within the Tor network to facilitate an attempt at anonymous communications over the "clear" internet.

Basically any browser that allows proxy configuration can be used with Orbot.

Here's one way to do it with Opera Mobile and Orbot running in the background:
* Open up "Opera Mobile" and type "about:config" in the address bar, then hit "Go"

* Scroll down until you see the "Proxy" section, select it.

* Under "HTTP server" and "HTTPS server" enter
"127.0.0.1:8118" [without quotes]

* This is the default port and address for a Tor localhost proxy.

* Click the checkboxes next to "Use HTTP" and "Use HTTPS" to enable proxy usage for the respective protocols within Opera Mobile,

* Click "Save" and restart Opera Mobile.

* It's recommended to disable Javascript within Opera Mobile to avoid potential address leaks.

* Once you have Orbot fired up and you see the green onion, load up Opera Mobile and visit the following page to check if your setup is OK:

https://check.torproject.org/

If all went well the site will say so.

Click the buttons labeled "Default" to restore non Tor proxied browsing.

Happy obfuscated mobile computing!
BSD is what you get when a bunch of Unix hackers sit down to try to port a Unix system to the PC.
Linux is what you get when a bunch of PC hackers sit down and try to write a Unix system for the PC.
pac
Members
Nice tutorial, I like it. Thanks. Altrough I believe Tor isn't so safe. :)
pac
Members
(05-09-2012, 09:18 PM)NeoTerra Wrote:
(05-09-2012, 11:06 AM)pac Wrote: Nice tutorial, I like it. Thanks. Altrough I believe Tor isn't so safe. :)

How so? :(

First, I need to apologize for my wrongfully statement. TOR is safe depends what are you doing. Tor is used for anonymity, not for privacy. There is still a slight chance that someone is able toread your email credentials, msn passwords, forum accounts... INothing is safe anymore on the internet. Certain nodes can block different sites, so their users can get on.

Here(link) is quite long and very informative post why TOR is not safe.
D9u
Long time nixers
Using end to end encryption can help deter MiTM, but I just use Tor to hide my originating IP address.

You can also modify these instructions to use your own private proxy.
BSD is what you get when a bunch of Unix hackers sit down to try to port a Unix system to the PC.
Linux is what you get when a bunch of PC hackers sit down and try to write a Unix system for the PC.