Flash proxy

Flash proxy is a pluggable transport and proxy which runs in a web browser. Flash proxies are an Internet censorship circumvention tool which enables users to connect to the Tor anonymity network (amongst others) via a plethora of ephemeral browser-based proxy relays. The essential idea is that the IP addresses contingently used are changed faster than a censoring agency can detect, track, and block them. The Tor traffic is wrapped in a WebSocket format and disguised with an XOR cipher.[1]

Implementation

A free software[2] implementation of flash proxies is available. It uses JavaScript, WebSocket, and a Python implementation of the obfsproxy protocol,[3] and was crafted by the Security Project in Computer Security at Stanford University.[4] This work was supported by the Defense Advanced Research Project Agency (DARPA) and the Space and Naval Warfare Systems Center Pacific under Contract No. N66001-11-C-4022.[5]

gollark: ~~to drive up views and ad revenue~~
gollark: ~~1 + 1 = 12412579102697839012732986231875~~
gollark: ~~tjjj099 should remove sickness, seriously~~
gollark: I don't think I've ever once had a fail with that one somehow.
gollark: https://dragcave.net/view/KKugU

See also


References

  1. Gallagher, Sean (2014-08-14). "A portable router that conceals your Internet traffic". Ars Technica. Retrieved 2016-04-10.
  2. "Combined flash proxy + pyobfsproxy browser bundles | The Tor Blog". Blog.torproject.org. 2013-02-23. Retrieved 2016-04-10.
  3. "Flash Proxies". Crypto.stanford.edu. Retrieved 2016-04-10.
  4. Jones, Martin (2011). "Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests". Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science. 6739: 85–103. doi:10.1007/978-3-642-22424-9_6. ISBN 978-3-642-22423-2.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.