In my continuation of howto secure your phone habits while on the go, we have come to anonymizing your traffic. There are a few reasons to do this:
- On a public internet network and have no access to a VPN
- In a country that censors the internet (Hi China!)
- You like to keep your identity somewhat off the grid for whatever reason
TOR was developed to allow for all of the above. Due to the open nature of Android and the user-base, it was quickly ported back in 2009. The Guardian Project leads the effort and has since provided 4 main components. Today I will be focusing on the Orbot (TOR+Proxy) and the Firefox extension to allow proxy usage. In addition you can use their Jabber client for anonymous and encrypted chatting. So lets get to setting things up! A few things you need to grab from market:
- Firefox Mobile
If you are not rooted then you need not apply. There is some confusion on the Market page for Orbot that you just click a big button and poof your phone is anonymous. That is not the case at all. Due to the changes in 1.6 -> 2.1/2.2 you can no longer proxy everything off your phone easily. You need to force the usage of the proxy which is why we are using Firefox with an additional extension. Any program that will allow for SOCKS proxy usage can be made to work with this setup.
Go ahead and fire up Orbot once you have installed from the Market:
Now click Menu –> Settings and enable Transparent Proxying and Tor Everything. Hopefully it will work like that one day, but for now it just makes sure the SOCKS proxy kick starts. Once you have checked the boxes click the back button to return to the main screen.
We are ready to bring online the TOR! CLick the big power button in the center and give it sometime. It will take awhile your first time to bootstap the network. This can also take a little longer if you are on crappy cell networks
Once you see the Green button and the Android Onion Head with his hands up you are on the TOR network. Congrats! If this step didn’t work go run along and troubleshoot why…
With our anonymous network now ready go ahead an open Firefox Mobile as it allows us to set a proxy. Note to Google: Let me set a system-wide proxy without using iptables hacks from the command line. SHEESH!
Well lets check to see if our phone is on the TOR network by navigating to http://check.torproject.org/
OH NOES! What the heck is going wrong here?!?!?! We need to grab the proxy add-on for Firefox Mobile to override its system defaults. Our buddies at the Guardian Project created on that you can find here: https://guardianproject.info/apps/proxymob-firefox-add-on/ Installing ProxyMob will require you restart your browser.
Once you have installed and rebooted navigate to the settings by scrolling to the right bar on Firefox –> Settings –> Add-ons –> ProxyMob settings
Enable the proxy by sliding the slider over and then scroll down to the SOCKS proxy portion and enter 127.0.0.1 as the host and 9050 as the Proxy port
Click back and try the TOR check page again and if you see the below image you are surfing anonymously! Congrats!
FULL SIZE IMAGES HERE:
android apologetic apple catholic christian dating debian encryption geek God google howto iphone life linux love mac military nokia Personal phone poetry politics pope relationship relationships religion religious review running security tech Techie technology theology travel tweets twitter ubuntu UNIX video vintage vmware work writing
About the author
- As a visionary, entrepreneurial executive, I have extensive expertise in leading lean, agile, high-performing teams that design, engineer and deliver cross-domain solutions. My expertise includes managing complex integration projects that maximize ROI while facilitating secure transfer of information. My multifaceted experience spans both military and corporate operations in North America, South America, Europe and the Middle East with global implications. As co-founder of Spec Ops Technology, a successful international business, we have built a team that delivers high quality, cost-effective technology solutions for clients in diverse business sectors including aviation and technology. My background includes extensive training in Boundary Information Protection within the U.S. Air Force. I served as an accomplished Lead Engineer who managed an elite R&D business group within the Integrated Defense Systems (IDS) sector. I’ve been recognized as an astute manager who built, coached and led a dynamic team of professionals while simultaneously serving as Team Lead of a major inter-agency integration project with Wyle Labs.