Originally created by Tails on #5937 (Redmine)
The Obfsproxy project exists to achieve the benefits of Tor’s bridges together with traffic obfuscation.
Since bridges are easily detected and blocked in some areas (in particular China, but also places where wholesale SSL blocking is used), something like obfsproxy is needed in Tails.
Hiding Tor usage
In situations where both reliability and obfuscation are required despite an adversary having control of the user’s local network traffic obfuscation must also be employed. This traffic obfuscation is imperative where the user’s welfare or liberty my be jeopardised by her use of Tor.
feature/obfsproxy currently adds rudimentary support for
obfsproxy. It’s possible to just add a bridge like
through Vidalia’s settings and it works (also works with
bridge-mode so that even in its current
implementation (which doesn’t use
DisableNetwork), Tails prevents Tor
from talking to the network, and makes Vidalia prompt the user for
obfs2 or not).
Merged in Tails 0.15.