Saturday, April 5, 2025
Homecyber securityTor Unveils WebTunnel - Let Users Bypass Censorship

Tor Unveils WebTunnel – Let Users Bypass Censorship

Published on

SIEM as a Service

Follow Us on Google News

Tor Project’s Anti-Censorship Team has made a groundbreaking announcement that promises to bolster the fight against internet censorship.

On the World Day Against Cyber Censorship occasion, the team proudly introduced WebTunnel, a revolutionary new type of Tor bridge.

This innovative technology is now available in the stable version of the Tor Browser, marking a significant advancement in censorship circumvention technology developed and maintained by The Tor Project.

The Importance of Bridges in the Fight for Internet Freedom

Developing various types of bridges is crucial for enhancing Tor’s resilience against censorship efforts.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:

This is particularly pertinent as the world navigates through the 2024 global election megacycle, a period where the role of censorship circumvention technology becomes increasingly critical in safeguarding Internet Freedom.

For those who have ever contemplated becoming a Tor bridge operator to aid others in connecting to Tor, the introduction of WebTunnel presents an opportune moment to get involved.

Detailed requirements and instructions for running a WebTunnel bridge can be found on the Tor Community portal.

Understanding WebTunnel: The Technology Behind the Innovation

WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS), drawing inspiration from HTTP.

It operates by encapsulating the payload connection within a WebSocket-like HTTPS connection, making it appear to network observers as ordinary HTTPS (WebSocket) traffic.

This ingenious design allows WebTunnel to blend seamlessly with regular web traffic, enabling it to coexist with a website on the same network endpoint.

Consequently, when someone attempts to access the website at the shared network address, they will encounter the website’s content without indicating the hidden bridge (WebTunnel).

Comparing WebTunnel to Obfs4 Bridges

WebTunnel offers an effective alternative to obfs4 bridges for most Tor Browser users.

Unlike obfs4 and other fully encrypted traffic, which aim to be entirely distinct and unrecognizable, WebTunnel’s strategy of emulating well-known web traffic renders it more effective in environments with protocol-allower lists and a deny-by-default network policy.

In essence, WebTunnel traffic, by resembling HTTPS traffic—a permitted protocol—successfully bypasses censorship mechanisms that would otherwise reject unrecognized traffic.

How to Use a WebTunnel Bridge

Step 1: Acquiring a WebTunnel Bridge

Currently, WebTunnel bridges are exclusively distributed via the Tor Project Bridges website.

Plans include expanding distribution methods to include platforms like Telegram and Moat.

Users can obtain a WebTunnel bridge by visiting bridges, selecting “webtunnel” from the “Advanced Options” dropdown menu, solving a captcha, and copying the provided line.

Step 2: Setting Up Tor Browser

It is essential to note that WebTunnel bridges are incompatible with older versions of Tor Browser (12.5.x).

Users must download and install the latest version of Tor Browser for Desktop or Android.

After installation, users can add the bridge lines obtained in Step 1 through the Connection preferences window or by selecting the option to configure a bridge on Android devices.

Following these steps should enable a successful connection via WebTunnel.

The launch of WebTunnel by the Tor Project represents a significant leap forward in the ongoing battle against internet censorship.

As the global community continues to confront challenges to internet freedom, innovations like WebTunnel underscore the importance of continued vigilance and innovation in pursuing an open and accessible internet for all.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...