Orxy

Orxy


Protect your privacy, hide your location, and bypass site blocks.


Orxy is an Orbot alternative that supports devices running the latest Android. Orxy protects network traffic using The Onion Router (Tor) network. Tor encrypts the data and sends it through random points across the world to hide where the connection started. For example, while using Orxy, a website you visit might think you're looking at it from another country.


Orxy also lets apps understand .onion addresses, which are special names that point to hidden services within the Tor network, sometimes referred to as the 'Hidden Web,' 'Dark Net,' or 'Deep Web.' Try it out: http://3g2upl4pq6kufc4m.onion


To benefit from Orxy, you must configure your apps to use it as a proxy. Orxy provides a local Socks5 proxy on port 6150 (and 9050) and an HTTP proxy on port 8118.


Avoid the hassle of configuration and protect apps that have no proxy settings, like YouTube, bitcoin clients, or the Play store, by installing the Orxify plugin (http://goo.gl/ymr12A). Orxify automatically manages all app traffic transparently, without requiring special configuration or root access. No configuration prevents mistakes that could potentially leak information.


In addition to using Tor to anonymize your traffic, optionally subscribe to our proxy service and hide the Tor traffic from your ISP, which is especially useful if your ISP blocks Tor traffic. Orxy will send the Tor traffic in an encrypted tunnel through one of our proxies, making it appear like an access to a regular HTTPS protected site. Your data is protected from us by Tor, and Tor traffic is hidden from your ISP by the tunnel. Try it free for 7 days, just click 'Hide Tor Traffic' within Orxy.


A quick way to get started with the default setup is to install Orweb. Avoid the prompt to install/enable Orbot by changing the proxy settings within Orweb: Navigate to Settings -> Proxy Host and enter 127.0.0.1 as the value.
Firefox supports proxy settings by entering about:config in the address bar, search 'proxy', and setting the following:
- network.proxy.type = 1
- network.proxy.socks = 127.0.0.1
- network.proxy.socks_port = 6150
- network.proxy.socks_remote_dns to true (click 'toggle')
- network.proxy.http = 127.0.0.1
- network.proxy.http_port = 8118
- network.proxy.ssl = 127.0.0.1
- network.proxy.ssl_port = 8118


For the Twitter app: Settings -> Enable HTTP Proxy -> set Proxy Host to localhost and Proxy Port to 8118


Visit http://goo.gl/GHjqgs for more info on Tor, including tips on remaining anonymous and protecting yourself.


Tips:
- If you log in to a website using your username and password, you are no longer anonymous to that website.
- Logging in to sensitive sites while using Orxy, such as online banking or email sites, is not recommended. These sites usually have checks to verify your identity using your common locations. If you suddenly appear as logging in from another country, you may get blocked. You must also be careful to ensure proper HTTPS is used to prevent someone from seeing your password. It's best to simply avoid these sites to be safe.
- Google search will sometimes present a CAPTCHA while using Orxy. If it persists, try using another anonymous friendly search engine such as http://ddg.gg (or http://3g2upl4pq6kufc4m.onion)


Email any bugs, comments, or questions.


Note: Anonimizing traffic can be slow: it may be sent over many hops around the world. The Samsung app com.sec.msc.nts.android.proxy interferes with Orweb, please disable it if you have connectivity problems: Settings->Applications->Application Manager->com.sec.msc.nts.android.proxy -> Turn Off.


Follow @orxify for updates: https://twitter.com/orxify


This product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.

Recent changes:
1.2.3:
- Update OpenSSL to 1.0.1i
1.2.2:
- Update Tor to 2.4.23
1.2.1: Fix for devices running android > 4.3
1.2.0:
- Hide Tor Traffic option now available

1.1.4: Important Security Update
- Updates openssl to 1.0.1h to fix CVE-2014-0224

1.1.3:
- Default listener port now 6150
- Update Tor to 2.4.22

1.1.2:
- Add more connectivity checks and messages
Add to list
Free
75
3.8
User ratings
140
Installs
5,000+
Concerns
0
File size
3854 kb
Screenshots
Video of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy Screenshot of Orxy

About Orxy
Protect your privacy, hide your location, and bypass site blocks.


Orxy is an Orbot alternative that supports devices running the latest Android. Orxy protects network traffic using The Onion Router (Tor) network. Tor encrypts the data and sends it through random points across the world to hide where the connection started. For example, while using Orxy, a website you visit might think you're looking at it from another country.


Orxy also lets apps understand .onion addresses, which are special names that point to hidden services within the Tor network, sometimes referred to as the 'Hidden Web,' 'Dark Net,' or 'Deep Web.' Try it out: http://3g2upl4pq6kufc4m.onion


To benefit from Orxy, you must configure your apps to use it as a proxy. Orxy provides a local Socks5 proxy on port 6150 (and 9050) and an HTTP proxy on port 8118.


Avoid the hassle of configuration and protect apps that have no proxy settings, like YouTube, bitcoin clients, or the Play store, by installing the Orxify plugin (http://goo.gl/ymr12A). Orxify automatically manages all app traffic transparently, without requiring special configuration or root access. No configuration prevents mistakes that could potentially leak information.


In addition to using Tor to anonymize your traffic, optionally subscribe to our proxy service and hide the Tor traffic from your ISP, which is especially useful if your ISP blocks Tor traffic. Orxy will send the Tor traffic in an encrypted tunnel through one of our proxies, making it appear like an access to a regular HTTPS protected site. Your data is protected from us by Tor, and Tor traffic is hidden from your ISP by the tunnel. Try it free for 7 days, just click 'Hide Tor Traffic' within Orxy.


A quick way to get started with the default setup is to install Orweb. Avoid the prompt to install/enable Orbot by changing the proxy settings within Orweb: Navigate to Settings -> Proxy Host and enter 127.0.0.1 as the value.
Firefox supports proxy settings by entering about:config in the address bar, search 'proxy', and setting the following:
- network.proxy.type = 1
- network.proxy.socks = 127.0.0.1
- network.proxy.socks_port = 6150
- network.proxy.socks_remote_dns to true (click 'toggle')
- network.proxy.http = 127.0.0.1
- network.proxy.http_port = 8118
- network.proxy.ssl = 127.0.0.1
- network.proxy.ssl_port = 8118


For the Twitter app: Settings -> Enable HTTP Proxy -> set Proxy Host to localhost and Proxy Port to 8118


Visit http://goo.gl/GHjqgs for more info on Tor, including tips on remaining anonymous and protecting yourself.


Tips:
- If you log in to a website using your username and password, you are no longer anonymous to that website.
- Logging in to sensitive sites while using Orxy, such as online banking or email sites, is not recommended. These sites usually have checks to verify your identity using your common locations. If you suddenly appear as logging in from another country, you may get blocked. You must also be careful to ensure proper HTTPS is used to prevent someone from seeing your password. It's best to simply avoid these sites to be safe.
- Google search will sometimes present a CAPTCHA while using Orxy. If it persists, try using another anonymous friendly search engine such as http://ddg.gg (or http://3g2upl4pq6kufc4m.onion)


Email any bugs, comments, or questions.


Note: Anonimizing traffic can be slow: it may be sent over many hops around the world. The Samsung app com.sec.msc.nts.android.proxy interferes with Orweb, please disable it if you have connectivity problems: Settings->Applications->Application Manager->com.sec.msc.nts.android.proxy -> Turn Off.


Follow @orxify for updates: https://twitter.com/orxify


This product is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.

Recent changes:
1.2.3:
- Update OpenSSL to 1.0.1i
1.2.2:
- Update Tor to 2.4.23
1.2.1: Fix for devices running android > 4.3
1.2.0:
- Hide Tor Traffic option now available

1.1.4: Important Security Update
- Updates openssl to 1.0.1h to fix CVE-2014-0224

1.1.3:
- Default listener port now 6150
- Update Tor to 2.4.22

1.1.2:
- Add more connectivity checks and messages

Visit Website
User reviews of Orxy
Write the first review for this app!
Android Market Comments
A Google User
Aug 10, 2014
Orxy Good apps
A Google User
Aug 7, 2014
Awesome Works great
A Google User
Aug 3, 2014
What is happening It did not hide from traffick.. Each time i try to do it, it state error, or failed. Luckily, im just subscribe for trial bersion.obviously will not subscribe for monthly
A Google User
Jul 16, 2014
Wth It does nothing.
A Google User
Jun 26, 2014
Brilliant Truely excellent.