May 30th, 2014 

The problem behind mobile Tor browsers' ip disclosure - CHECK

back to the article

Most of the currently available Tor browsers for mobile platforms have one really strange security flaw. Anyone who has access to the raw html traffic ( especially website owners and, at least for unprotected connections, as well the operator of the exit node and the people inbetween) could modify the server response in order to get the real ip of the user.


You have to access this page VIA TOR with your mobile Tor browser (Orweb, Anonymous Browser Connecttor, OnionBrowser),
only THEN this test makes sense. Your current ip is

(short link: http://xordern.net/checkip )

Quick solution. Use another application or option - refer to the solutions in the main article on this issue.

Please see the original article for more information.

  © 2009-2014 Dominik Bok