Android users visiting sites using Tor leave all kinds of incriminating evidence in the logs
People using Tor on Android use User-Agents with all kinds of incriminating evidence such as:
"Mozilla/5.0 (Linux; Android 4.1; Nexus 7 Build/JRN84D)
AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.166
Safari/535.19"
"Mozilla/5.0 (Linux; U; Android 4.2.2; es-us; HUAWEI Y320-U151 Build/HUAWEIY320-U151) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30"
"Mozilla/5.0 (Linux; U; Android 2.3; en-us; GT-I9100 Build/GRH78) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1"
These are examples with the least personal information in them and they may or may not be from a popular hidden service.
I am not sure who's software or project is responsible for this but it does not exactly make these people "blend in"