Obfuscate Tor Traffic - Mon, Jul 29, 2024
Fully disguise Tor traffic as other traffic
Tor can be used for censorship circumvention. Howver, censors can obtain list of Tor nodes from a directory server, and block access to the Tor network (all relays). The solution to this is Tor bridges.
Censors can also block Tor by identifying Tor traffic, since it is relatively easy to identify. Tor traffic is disguised as HTTPS traffic, but uses random domain names, and has a characteristic packet-size distribution. The solution to this is to fully disguise Tor traffic as other traffic. The Pluggable Transport API allows communication between obfuscator and Tor client.