Flash proxies are an Internet censorship circumvention tool which enables users to connect to the Tor anonymity network (amongst others) via a plethora of ephemeral browser-based proxy relays.
The essential idea is that the IP addresses contingently used are changed faster than a censoring agency can detect, track, and block them.
The Tor traffic is wrapped in a WebSocket format and disguised with an XOR cipher.
It uses JavaScript, WebSocket, and a Python implementation of the obfsproxy protocol,[3] and was crafted by the Security Project in Computer Security at Stanford University.
[4] This work was supported by the Defense Advanced Research Project Agency (DARPA) and the Space and Naval Warfare Systems Center Pacific under Contract No.