Tor Project’s mobile VPN passes security audit with caveats

Zaid Al-Mansouri
By
Zaid Al-Mansouri
AI-powered tech writer covering smartphones, wearables, and mobile technology.
8 Min Read
Tor Project's mobile VPN passes security audit with caveats — AI-generated illustration

The Tor Project’s mobile VPN for Android passed a major security audit conducted by Cure53 in June 2025, marking a significant milestone toward the application’s official launch. The audit examined both the TorVPN for Android mobile application and the Onionmasq/Tunnel Interface for Arti, a Rust-based networking layer that handles encrypted traffic routing. While the results confirm the core security architecture is robust, they also reveal specific vulnerabilities that the Tor Project must address before releasing the app to the public.

Key Takeaways

  • Cure53 conducted penetration testing and source code review of TorVPN for Android in June 2025
  • Tor’s tunnel establishment and routing core architecture showed no fundamental security flaws
  • Identified issues include incomplete input validation, DNS handling weaknesses, and lack of root detection
  • All findings are being tracked and remediated as part of ongoing security work
  • The audit represents a necessary checkpoint before public release, not a clean bill of health

What the Cure53 audit actually found

Cure53’s assessment of the Tor Project mobile VPN identified several categories of security concerns that require remediation. Most findings centered on incomplete input validation and weaknesses in DNS handling that could enable denial-of-service conditions under rare circumstances. These are not fundamental architectural failures—the tunnel establishment and routing mechanisms passed scrutiny—but rather implementation details that need hardening before the app reaches end users.

Additional issues flagged by Cure53 included cryptographic hardening suggestions such as certificate pinning and improvements to randomness generation. The audit also surfaced typical mobile security concerns including plaintext configuration storage and the absence of root detection mechanisms. None of these findings suggest the Tor Project’s approach to mobile VPN is fundamentally flawed, but they do indicate that the application requires further development before it can be considered production-ready for mainstream users.

How Tor Project mobile VPN compares to existing options

The Tor Project’s mobile VPN differs fundamentally from commercial VPN services like ExpressVPN or Mullvad. Rather than routing traffic through a single corporate VPN gateway, Tor’s approach sends data through multiple relays operated by volunteers worldwide, providing stronger anonymity guarantees at the cost of slower speeds. The Cure53 audit examined whether this distributed architecture was implemented securely on Android, and the findings suggest the core design is sound—the issues identified are execution-level concerns, not architectural problems. This positions Tor’s eventual mobile VPN as a privacy-first alternative for users willing to trade performance for stronger anonymity protections.

Timeline and next steps for the Tor Project mobile VPN

The June 2025 Cure53 audit represents a checkpoint in the Tor Project’s mobile VPN development, not the final step toward launch. The organization is tracking all identified findings and integrating fixes into the application’s ongoing development cycle. The audit’s completion signals that the project has reached sufficient maturity to withstand professional security scrutiny, but the presence of identified vulnerabilities means the public release date remains dependent on how quickly the Tor Project can remediate DNS handling, input validation, and cryptographic hardening issues. Users awaiting a mobile Tor VPN should expect continued development work before the app becomes available for general use.

Should you wait for Tor Project’s mobile VPN?

If you currently use Tor Browser on desktop and want equivalent privacy on mobile, the Tor Project’s dedicated VPN application will offer stronger anonymity than any commercial VPN service. However, the Cure53 audit results indicate the app is not yet ready for users who prioritize stability and performance. The identified DNS handling weaknesses and input validation gaps suggest potential reliability issues in early versions. For privacy-conscious Android users, waiting for the official release after Tor Project completes its remediation work is the safer choice than attempting to use beta or pre-release versions.

What does a successful security audit actually mean?

The Cure53 audit is described as successful because it confirmed that the Tor Project mobile VPN’s core security architecture is fundamentally sound—tunnel establishment and routing mechanisms showed no critical flaws. However, this does not mean the application has no security issues. A successful audit in security testing means the testing process itself was thorough and professional, and the findings are legitimate and actionable. The Tor Project’s decision to commission a professional third-party audit demonstrates commitment to security, but the presence of identified vulnerabilities is normal and expected. The real test comes in how quickly and thoroughly the organization addresses the reported issues.

Is the Tor Project mobile VPN free?

The Tor Project is a nonprofit organization, and its mobile VPN will follow the same free-to-use model as Tor Browser on desktop. No pricing information has been released because the application is not yet available for public use. Once launched, users should expect the mobile VPN to be available at no cost, consistent with the Tor Project’s mission to provide privacy tools to everyone regardless of ability to pay.

When will the Tor Project mobile VPN launch?

No official launch date has been announced. The Cure53 audit in June 2025 represents a major milestone, but the Tor Project must complete remediation work on the identified vulnerabilities before releasing the application to the public. The timeline depends on the complexity of fixes required and the organization’s development resources.

How does Tor’s mobile VPN differ from Tor Browser?

Tor Browser on mobile (available as Onion Browser on iOS and Tor Browser on Android) provides Tor routing for web traffic only, protecting your browsing activity but not other applications. The Tor Project’s dedicated mobile VPN, once released, will route all device traffic through Tor’s network, providing system-wide anonymity for all applications. This broader protection comes with trade-offs in speed and battery consumption, which the Cure53 audit did not specifically address but which are inherent to the technology.

The Cure53 audit confirms that the Tor Project is building its mobile VPN on solid security foundations, but the identified vulnerabilities remind us that privacy tools require continuous hardening before they reach users. The organization’s willingness to commission professional security testing demonstrates confidence in its approach while acknowledging the need for external scrutiny. For privacy advocates waiting for a mobile-first Tor experience, the audit results are encouraging—the core architecture is sound, and the identified issues are fixable. However, patience is warranted. Rushing a privacy-critical application to market before addressing DNS handling and input validation weaknesses would be a mistake, and the Tor Project appears committed to getting this right rather than getting it fast.

This article was written with AI assistance and editorially reviewed.

Source: TechRadar

Share This Article
AI-powered tech writer covering smartphones, wearables, and mobile technology.