When you visit this site, an HTML5 webRTC request is made to a STUN server, asking your web browser to disclose your physical (ISP) address. They're tricksy things, & aren't blocked by the usual ghostery-style extensions. There's some links below for more info, & tools to protect yourself whilst visiting .onions.
Cheers! ~ cryptõstõrm/õniõn
If you're accessing this site via torstorm.org, we now use a feature there that causes your user-agent to be changed randomly for every request.
So the above user-agent wouldn't be your real one, but instead the one torstorm.org sent to this .onion site.
STUNion is a fork of Daniel Roesler's webrtc-ips project; many thanks for the original work!
Source code for STUNion is here: github.com/cryptostorm/STUNnion
Info on blocking STUN IP leaks is collected here: cryptostorm.org/webrtc
We've implemented full STUNblock functionality at the torstorm.org gateway; details here: cryptostorm.org/torstorm
Additional resources & prior research on the topic collected & credited at: cstorm5dzz7vgmvo.onion/stunnion (non-onion URL: cryptostorm.org/stunnion)
Folks using our deepDNS-based native .onion access from cryptostorm are generally STUN-protected; see: cstorm5dzz7vgmvo.onion/widget (non-onion URL: cryptostorm.org/widget)
Thanks again to the Tor Project team for ensuring anyone using Tor Browser Bundle is STUNnion-free for life!
and umm... kittens? (=^ェ^=)