Chapter 4

Tor Relays, Bridges, and Obfsproxy

This chapter is about how to use Tor effectively even when a powerful adversary—such as a government—is actively filtering all Tor network traffic. While many users will have no problem using Tor to easily and quickly connect to any Internet service, in some countries it is not enough.

Depending on how important it is to the adversary to filter all objectionable content, some adversaries may forbid use of any censorship circumvention tools like Tor. In some cases, if the firewalls detect Tor network activity, those sessions are blocked.

This chapter discusses how such national-level filtering can be (and is) done.

There is a great deal of academic research related to online anonymity and anonymous ...

Get Practical Anonymity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.