Jump to content

Flash proxy

From Wikipedia, the free encyclopedia

Flash proxy is a pluggable transport and proxy which runs in a web browser. Flash proxies are an Internet censorship circumvention tool which enables users to connect to the Tor anonymity network (amongst others) via a plethora of ephemeral browser-based proxy relays. The essential idea is that the IP addresses contingently used are changed faster than a censoring agency can detect, track, and block them. The Tor traffic is wrapped in a WebSocket format and disguised with an XOR cipher.[1][2]

It has been deprecated in 2016 and replaced by a similar project, Snowflake.[3][4][5][6]

Implementation

[edit]

A free software[7] implementation of flash proxies is available. It uses JavaScript, WebSocket, and a Python implementation of the obfsproxy protocol,[8] and was crafted by the Security Project in Computer Security at Stanford University.[9] This work was supported by the Defense Advanced Research Project Agency (DARPA) and the Space and Naval Warfare Systems Center Pacific under Contract No. N66001-11-C-4022.[10]

See also

[edit]

References

[edit]
  1. ^ Fifield, David; Hardison, Nate; Ellithorpe, Jonathan; Stark, Emily; Boneh, Dan; Dingledine, Roger; Porras, Phil (2012). "Evading Censorship with Browser-Based Proxies" (PDF). Privacy Enhancing Technologies. Lecture Notes in Computer Science. Vol. 7384. pp. 239–258. doi:10.1007/978-3-642-31680-7_13. ISBN 978-3-642-31679-1. ISSN 1611-3349. Retrieved 21 July 2024.
  2. ^ Gallagher, Sean (2014-08-14). "A portable router that conceals your Internet traffic". Ars Technica. Retrieved 2016-04-10.
  3. ^ "Flash Proxies". crypto.stanford.edu. Archived from the original on 20 April 2017. Retrieved 21 July 2024. As of 2017, the flash proxy project is deprecated. It was deployed in Tor Browser between 2013 and 2016, but has since been superseded by newer and more effective pluggable transports. If you want to help support a newer circumvention system designed along the same principles as flash proxy, please see Snowflake.
  4. ^ Fifield, David; Wang, Xiaokang; Serene; Breault, Arlo; Bocovich, Cecylia (2024-07-11). "Snowflake, a censorship circumvention system using temporary WebRTC proxies". www.bamsoftware.com. USENIX. Retrieved 22 July 2024.
  5. ^ Koppen, Georg. "Remove Flashproxy from Tor Browser". Tor Project GitLab. Archived from the original on 27 February 2021. Retrieved 21 July 2024. remove Flashproxy from Tor Browser as it basically has zero users
  6. ^ "Snowflake Technical Overview". keroserene.net. Archived from the original on 10 October 2017. Retrieved 21 July 2024. Previously, users faced difficulties in manually configuring port-forwarding, which limited adoption of older tools like Flashproxy.
  7. ^ "Welcome to nginx". gitweb.torproject.org. Archived from the original on 24 September 2013. Retrieved 27 January 2022.
  8. ^ "Combined flash proxy + pyobfsproxy browser bundles | The Tor Blog". Blog.torproject.org. 2013-02-23. Retrieved 2016-04-10.
  9. ^ "Flash Proxies". Crypto.stanford.edu. Retrieved 2016-04-10.
  10. ^ Jones, Martin (2011). "Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests". Lecture Notes in Computer Science. Vol. 6739. pp. 85–103. doi:10.1007/978-3-642-22424-9_6. ISBN 978-3-642-22423-2. {{cite book}}: |journal= ignored (help); Missing or empty |title= (help)
[edit]