The identifying connection to TOR seems to be the method people are identified with as using TOR. The servers are public, or if not public per-se, are scrape-able and loggable.
If your ISP sees one of those IPs after a subpoena(or without one), it's off to justify whatever scheme they're cooking to book you with, if you don't allow a cookie through #orbot by accident and do their job for them.
Shame Android's stack can't do two VPNs at once. God, the problems that would solve...


