The Tor Project has unveiled WebTunnel, a new bridge type to combat censorship targeting the Tor network by concealing connections in plain sight. Unlike traditional Tor bridges, WebTunnel employs a technique akin to HTTPS-encrypted web traffic, making it harder for oppressive regimes to detect and block Tor connections. This innovation serves as a censorship-resistant pluggable transport, inspired by the HTTPT probe-resistant proxy, ensuring that the traffic blends seamlessly with ordinary HTTPS connections.
WebTunnel’s approach significantly enhances censorship circumvention by making the connections appear as regular HTTPS (WebSocket) connections to network observers. This disguise allows the traffic to bypass network environments with protocol allow lists and deny-by-default policies, as blocking HTTPS connections would disrupt the vast majority of web server connections. To utilize WebTunnel, users must manually add bridge addresses obtained from the Tor Project’s website to Tor Browser, thereby enabling them to access the Tor network even in censored regions.
The implementation of WebTunnel marks a significant step forward in Tor’s efforts to ensure access to its network for users worldwide, particularly in regions where censorship is prevalent. While WebTunnel has shown success in countering censorship in locations like China and Russia, further improvements are needed to address challenges in regions such as Iran. The Tor Project remains committed to refining and expanding WebTunnel’s capabilities to make Tor accessible to all, emphasizing the critical role of the internet in enabling communication, defending human rights, and fostering solidarity amid global challenges.