Privacy on mobile is kinda pointless. The device tracks you to within a meter, can be turned on remotely without you knowing and listens to you. They get the pages you visit from your provider and if anything you're helping them reveal TOR nodes since they can pick you up at every jump.
Mobile devices are like a foghorn saying here I am every five seconds. Just saying, you might want to reconsider your dependence on mobile if privacy matters to you.
Did you know that your mobile device helps facial recognition cameras in the wild better identify you? When it makes a guess after seeing you on a cam 5g will instantly allow it to see if your phone is in that area too. If it is, ID confirmed. I don't think it's possible to remain private on mobile.
As I add to my router's port-80/443 blocking list by looking at the junk hitting my website, I sometimes come across TOR hosts when I do reverse lookups on the IP's. They (and the entire IP range of the AS they are located in) get added to my blocking list. I don't believe I've ever seen a legit web hit come from a TOR node.
I suppose the content of some web sites would expect a continuous flow of connections from TOR exit gateways -- and blocking would be a Bad Decision. However, many (most?) sites -- such as all mine -- have content that is hardly deserving of TOR access, I am blocking them by CIDR as I see cracker probes. In the last month or so I have also seen a big up-tick in cracker SSH attempts coming from TOR exit gateways . Blocking those CIDRs, too.