Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Browser-based Tor proxies

Steve Weis steveweis at gmail.com
Thu Jan 3 17:25:51 PST 2013


I noticed a Stanford project for setting up browser-based, ephemeral Tor
proxies. In their words, "the purpose of this project is to create many,
generally ephemeral bridge IP addresses, with the goal of outpacing a
censor's ability to block them."

The core idea is that volunteers outside a filtered region can embed an
"Internet Freedom" badge on their web pages. Visitors browsing from outside
a filtered region can become short-lived proxies that relay traffic to and
from the filtered region. When visitors navigate away from a volunteer
page, the proxy disappears.

https://crypto.stanford.edu/flashproxy/
https://crypto.stanford.edu/flashproxy/flashproxy.pdf

Note that "flash" is not a reference to Adobe Flash. It's based on
Websockets and Javascript.

Also, I am not endorsing this technology for real-world use yet nor can
attest to its security. I haven't looked at it in enough detail yet.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130103/19aeb257/attachment.html>


More information about the liberationtech mailing list