10,000 - 50,000 downloadsAdd this app to your lists
+ By Inetric, LLC
Orxy is an Orbot alternative that supports devices running the latest Android. Orxy protects network traffic using The Onion Router (Tor) network. Tor encrypts the data and sends it through random points across the world to hide where the connection started. For example, while using Orxy, a website you visit might think you're looking at it from another country.
Orxy also lets apps understand .onion addresses, which are special names that point to hidden services within the Tor network, sometimes referred to as the 'Hidden Web,' 'Dark Net,' or 'Deep Web.' Try it out: http://3g2upl4pq6kufc4m.onion
To benefit from Orxy, you must configure your apps to use it as a proxy. Orxy provides a local Socks5 proxy on port 6150 (and 9050) and an HTTP proxy on port 8118.
Avoid the hassle of configuration and protect apps that have no proxy settings, like YouTube, bitcoin clients, or the Play store, by installing the Orxify plugin (http://goo.gl/ymr12A). Orxify automatically manages all app traffic transparently, without requiring special configuration or root access. No configuration prevents mistakes that could potentially leak information.
In addition to using Tor to anonymize your traffic, optionally subscribe to our proxy service and hide the Tor traffic from your ISP, which is especially useful if your ISP blocks Tor traffic. Orxy will send the Tor traffic in an encrypted tunnel through one of our proxies, making it appear like an access to a regular HTTPS protected site. Your data is protected from us by Tor, and Tor traffic is hidden from your ISP by the tunnel. Try it free for 7 days, just click 'Hide Tor Traffic' within Orxy.
A quick way to get started with the default setup is to install Orweb. Avoid the prompt to install/enable Orbot by changing the proxy settings within Orweb: Navigate to Settings -> Proxy Host and enter 127.0.0.1 as the value.
Firefox supports proxy settings by entering about:config in the address bar, search 'proxy', and setting the following:
- network.proxy.type = 1
- network.proxy.socks = 127.0.0.1
- network.proxy.socks_port = 6150
- network.proxy.socks_remote_dns to true (click 'toggle')
- network.proxy.http = 127.0.0.1
- network.proxy.http_port = 8118
- network.proxy.ssl = 127.0.0.1
- network.proxy.ssl_port = 8118
For the Twitter app: Settings -> Enable HTTP Proxy -> set Proxy Host to localhost and Proxy Port to 8118
Visit http://goo.gl/GHjqgs for more info on Tor, including tips on remaining anonymous and protecting yourself.
- If you log in to a website using your username and password, you are no longer anonymous to that website.
- Logging in to sensitive sites while using Orxy, such as online banking or email sites, is not recommended. These sites usually have checks to verify your identity using your common locations. If you suddenly appear as logging in from another country, you may get blocked. You must also be careful to ensure proper HTTPS is used to prevent someone from seeing your password. It's best to simply avoid these sites to be safe.
- Google search will sometimes present a CAPTCHA while using Orxy. If it persists, try using another anonymous friendly search engine such as http://ddg.gg (or http://3g2upl4pq6kufc4m.onion)
Email any bugs, comments, or questions.
Note: Anonimizing traffic can be slow: it may be sent over many hops around the world. The Samsung app com.sec.msc.nts.android.proxy interferes with Orweb, please disable it if you have connectivity problems: Settings->Applications->Application Manager->com.sec.msc.nts.android.proxy -> Turn Off.
Follow @orxify for updates: https://twitter.com/orxify
This product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
- Update Tor to 2.5.10
- Update OpenSSL to 1.0.1j
- Update Tor to 2.4.24
- Update OpenSSL to 1.0.1i
- Update Tor to 2.4.23
1.2.1: Fix for devices running android > 4.3
- Hide Tor Traffic option now available
1.1.4: Important Security Update
- Updates openssl to 1.0.1h to fix CVE-2014-0224
- Default listener port now 6150
- Update Tor to 2.4.22
- Add more connectivity checks and messages