

Add to that the fact that Apple has left the app alone even after being notified of potential issues makes the whole situation even weirder. "Dear Apple, please take down the fake #Tor Browser Bundle you have in your App Store," Tor Project's Runa Sandvik (Opens in a new window) wrote on Twitter.Ĭonsidering Apple's reputation for being strict about what apps it allows into the App Store in the first place, it's a little surprising that the fake app made it through the approval process. Even though other users have filed complaints, the app remains available on the App Store, and other Tor users and volunteers have expressed their frustrations on the ticket and elsewhere online. It appears from the ticket that Tor Project officials notified Apple of the fake app in December, and Apple said it would give the developer a chance to defend the app. "Tor Browser in the Apple App Store is fake," Phobos wrote on the ticket, adding, "We should have it removed." It appears the Tor Browser app for iOS devices is fake, and "full of adware and spyware," according to a support ticket (Opens in a new window) opened two months ago by "Phobos," a volunteer with the Tor Project. How to Set Up Two-Factor AuthenticationĬoncerned about online tracking and eavesdropping? Considering TOR? If so, don't download the iOS app for the Tor Browser from Apple's App Store.How to Record the Screen on Your Windows PC or Mac.

How to Convert YouTube Videos to MP3 Files.How to Save Money on Your Cell Phone Bill.How to Free Up Space on Your iPhone or iPad.How to Block Robotexts and Spam Messages.Then simply open the folder and click to start Tor Browser.Execute the file you downloaded to extract the Tor Browser into a folder on your computer (or pendrive).It is very easy and similar to using a normal browser: Thus, as a whistleblower, in order to protect your anonymity, you must first download and install the Tor Browser. If you have concerns about your traceability and you choose to submit your information in total anonymity, you will be using a submission system that is entirely based on the use of Tor technology, which is already integrated into our platform. WildLeaks has implemented a Tor-based secure platform in order to allow our sources to stay anonymous and to submit sensitive information in the most secure way possible, always encrypted, in respect to data transmission and management.
