News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Stop using obfs4 protocol for bridges or anything else. The developer has been saying this for years. : OpSec | Torhoo darknet markets

If you're using obfs4 for Tor bridges or any other use case you should stop.

It has a lot of issue.

For a variety of reasons, obfs4 traffic is often easily distinguished from random traffic, which is very problematic when using it for something like a bridge.

It has little to no protection against replay attacks

Obfs4 does not include a decoded version of the X25519 public key in the authenticated digest calculations for the handshake, so an adversary can potentially manipulate the public key without detection compromising the handshake and creating a vulnerability.



Honestly, it is possible to create a better obfuscation protocol than
obfs4, and it's shelf-life expired years ago. No one should be using
it for anything at this point, and no one should have been using it
for anything for the past however many years since I first started
telling people to stop using it.
People should also have listened when I told them repeatedly that there
are massive issues in the protocol.

Do not ask me questions about this.
Do not use it in other projects.
Do not use it in anything new.
Use a prime order group instead of this nonsense especially if you
are doing something new.
All I want is to be left alone.


This is addressed here in the Whonix docs: "Hide Tor from your Internet Service Provider"
This is no news.

As the maintainer writes back in 2023, obfs4 passed it's shelf-life expired date years back. Yes, can only agree, government censorship has matured a lot since 2014 (first release of obfs4).

What's annoying is the statement "there are massive issues in the protocol", and then no explanation, nothing in the backlog. What the maintainer say is an obfuscation it self. One thing is clear, it's possible to detect the Tor use with modern network analyzers, and that's bad. But if there is other issues, is unclear.

Tails with Tor Browser does not provide alternative obfuscation protocols.

Best option if Tor traffic must be hidden is to use a VPN connection to a country where Tor is allowed. The user must ensure that there are no DNS-leaks or WebRTC-leaks, thus this would also reveal Tor usage.
/u/BribeThePope
1 points
3 months ago
Haven't been proven that tor usage can be detected by analyzing the VPN connection with DPI+LLMs for the standard VPN protocols?

Also VPN are a huge problem since it's a single point of failure.
You are right /u/BribeThePope, an advanced network analyzers could potentially detect what type of traffic is most likely in the VPN connection. However, this is based on probabilities and not on exact facts which therefore are not used for filtering (censoring) the traffic.

To avoid being detected, the VPN traffic needs to be obfuscated, there are a few options like Mullvad DAITA that change network package sizes and adds background noise so DPI/AI fails to recognize handshaking, error handling and other patterns that otherwise can reveal a Tor circuit.
/u/street57249
1 points
3 months ago
Is it recommended to use as an addition to the VPN a Tor Bridge to increase the probability of hiding Tor usage (VPN before Tor Bridge)?
From VPN-provider you should go Tor directly, assuming that you use a "no logs" VPN-provider. A Tor bridge has the purpose of passing censorship (and to hide Tor usage). The VPN-provider should not know your identity, so going directly Tor from there is OK.

The Houdini trick is how to connect to Internet from the very beginning. You don't want to reveal your identity to the VPN-provider via the IP-address provided by your ISP. You have a few options how to connect from home:
  • Anonymous SIM-Router with SIM-card or eSIM (only connect with Ethernet cables)
  • Anonymous mobile phone with SIM and via USB-tethering
  • Hack neighbors WiFi (not recommended)
  • Use an Yagi-antenna and connect to free Internet at nearby
  • Hook into property network wiring closet
  • Tunnel fiber cable from your place elsewhere and hijack an Internet connection there.

In all the above do not have the device that connects to Internet in your premises, place it at common areas where everyone has access. Further on, use cables from that device so it connects to every apartment and office in one or several properties (old RG-58 would be perfect). This way you will achieve plausible deniability.
> Anonymous SIM-Router with SIM-card or eSIM (only connect with Ethernet cables)
[...] which are not actually anonymous, because once they are powered on (SIM or eSIM alike), as long as you have the simcard on you, you're telling the mobile data provider where the simcard is (right at your appartment / house), and it continuously tells that at all times, with very high precision (down to a few meters type of precision). Lookup what Cellular Tower Triangulation is. It's always a goldmine for cops to dig into that data, all they need is someone's phone number to know where that simcard has gone to, ever since it got powered on. ⚠️more details on that⚠️

> Anonymous mobile phone with SIM and via USB-tethering
Same as above. The only anonymity you can have with a SIM card is VERY limited like i explained here (never taking the phone out of the faraday bag while you're at home, and under surveillance outside. Not the kind of upstream internet connection you can use for daily internet stuff for sure.)

> Hook into property network wiring closet
[...] and then all i need (as the adversary) is follow the cable which leads to your apartment, not viable.

> Use an Yagi-antenna and connect to free Internet at nearby
that could potentially work but only if you live in an urban area, you're out of luck if you're living in some small village.

Anonymity from the ISP is a though one (which i haven't solved myself to be clear, so i don't have an answer yet), but from what i brainstormed so far, that's not realisticly possible. (and if there's no anonymity, then deniability is out of the question, obviously). I recommend you read up on those to know more about the topic.
The following guide explains this further:
/post/f12b38fc9337bce6ae34
/u/MustBeRich
1 points
2 months ago
Can you give me an example of an anonymous wifi router under 80 euros/usd whatever.
If i get this router and insert a sim card(bought anonymously) and then connect it to a ethernet cable which will connect with my laptop will my connection be untraceable?(about carding)
/u/street57249
1 points
3 months ago
This really helps. Thanks a lot.

As you mentioned SIM-cards what about using the SIM-card (or eSIM) in your anonymous notebook directly if the Linux OS does support it?
Seems a misunderstanding in the language. There is a difference between circumvention and hiding.

Circumvention is when you don't care if Tor is detected but only want to bypass network filters of any kind to get your connection across the firewall. Circumvention is used in network environments where lets say the ISP doesn't want Tor running but in general accepted sense Tor usage is allowed.

Hiding is when you care if Tor is detected and you must hide the fact you're using Tor. Hiding is used in restrictive network environments where the government forbids VPNs (like China) or at the very least such capability is neutralized as much as possible.


With that linguistic confusion cleared lets focus on OBFS4. OBFS4 was never about hiding Tor usage but circumventing restrictive environments to allow Tor usage.



Simple ways to hide Tor usage without OBFS4


Correctly configured on both client and server VPN, SSH or modern(!) proxy tunnels like XTLS.

Despite what is claimed under

[whonix org/wiki/Bridges]

Please note that it has been assessed as difficult beyond practicality to Hide Tor use from the Internet Service Provider with proxies, bridges, VPNs or SSH tunnels.


and the pure assumption (not based on any facts or research) from

[gitlab torproject org/legacy/trac/-/wikis/doc/TorPlusVPN#VPNSSHFingerprinting]

Once the premise is accepted, that VPN's and SSH's can leak which website one is visiting with a high accuracy, it's not difficult to imagine, that also encrypted Tor traffic hidden by a VPN's or SSH's could be classified. There are no research papers on that topic.


such attacks aren't practical against correctly configured VPN solutions. Although for anonymity reason (global adversary perspective) it wouldn't be recommend to connect VPN before Tor, if you have no choice or want to mask completely Tor usage, this can be the way.

Tor provides additional protections against this type of attack. Another note is when the research for these attacks had been presented it would come from adversary view of determining if you use Tor inside VPN [VPN(Tor)]. Nowhere did any researchers present concrete evidence or assumptions such adversary can leverage these attacks to see websites you'll visit within that encapsulated tunnel. Such would mean the VPN tunnel is broken beforehand.

Adding OBFS4 connection or going one step further and using only .onions would make Tor usage undetectable from any other VPN connection in the scenario of Tor inside VPN. Note again the circumvent vs hiding aspect.



Simple ways to circumvent firewalls to allow Tor usage without OBFS4


Firewall restrictions are in many cases unique to the ISP or network you are on. To perhaps illustrate what is meant by circumvention lets take the scenario being on a hotel network or hotspot at airport both usually make you pay. Since we are a bit technically inclined we can bypass it by preparing in advance.

If common tricks like VPN with 80/443/high port numbers, TLS-CRYPT, obfs4, ssh, ssl don't work there's always another solution.

You can run a simple VPN server but channel it through port 53 (DNS) and connect to it before entering any information or payment details. Majority of places are misconfigured and will allow valid DNS requests to get the actual IPs of services. Such setup can be achieved with iodine. The bandwidth is asymmetrical and limited but it would get you through. Once connected to the VPN you can now connect to Tor.

Adding OBFS4 connection can be additionally beneficial as in the hiding example.



Now the basics are covered.



Ways to circumvent Tor usage with OBFS4 in restrictive environments


Despite the overblown title by /u/socat2me there is some truth to the words. OBFS4 in its default state has been for some time now detected by different regimes who crack down on such connections on their countries networks. OBFS4 doesn't hide well the fact you are connecting to Tor.

However OBFS4 isn't useless and is overall better to use it than most other suggested pluggable transports.

Not a very discussed option but IAT (Inter-Arrival Time) mode is something you've all probably seen at the end of your OBFS4 bridges. Some have IAT-MODE 0 while others 1 and 2.

[whonix org/wiki/Bridges]

Trying Packet Size and Timing Obfuscation for obfs4

If a provided obfs4 bridge does not work, the user can try enabling packet size and timing obfuscation by changing the iat-mode value in each last line to either 1 or 2. [18]


IAT mode helps screw up any timing signatures for restrictive firewalls by changing the timing between different sets of bytes essentially splitting larger packet into chunks.

[github com/Yawning/obfs4/blob/master/transports/obfs4/obfs4.go]

Standard (ScrambleSuit-style) IAT obfuscation optimizes for bulk transport and will write ~MTU sized frames when possible.


If you've read a bit more on the quoted Go file you'll see performance is impacted if you enable the paranoid (2) option.

[computerscot github io/tor-obfs4-bridge-iat-mode-2.html & jmwample github io/ptrs/]

iat-mode=0 (no obfuscation) / Pass-through
iat-mode=1 (split data into fixed-length packets) / Pad to MTU
iat-mode=2 (split data into variable-length packets)


If you are a visual learner I suggest the following website (WARNING JS ENABLED) demonstrating & explaining every OBSF4 byte

jmwample github io/ptrs/


Remember IAT mode works correctly only when both sides enable it. If server has it on 0 but you put 1 in your torrc client config, you won't benefit.

Excellent tutorial how to create a private or public OBFS4 bridge with IAT mode 2 (or 1)


computerscot github io/tor-obfs4-bridge-iat-mode-2.html


I did read some research though suggesting the juice isn't worth the squeeze. I apologize I can't find the links to that perhaps someone can dig find it. However users in places like Iran or Turkmenistan and other places have reported success with public OBFS4 bridges but with IAT-MODE=2.

Correctly configured private OBFS4 bridges with IAT-MODE=2 are currently working in China for at least a couple of weeks. A very viable option if you can spin up a few instances per month.

Additional bypass methods which can make your server less likely to get blacklisted by GFW would be to place the servers in Chinese administered regions or friendly to it countries.

Currently other type of Tor-provided transports don't work in China at all or are available for very small period of time (like webtunnel).



It does seem Dread would benefit from writing up on some additional techniques & tools to bypass restrictive regime firewalls.
/u/BribeThePope
1 points
3 months ago
> Additional bypass methods which can make your server less likely to get blacklisted by GFW would be to place the servers in Chinese administered regions or friendly to it countries

That's interesting, how can I host in china? I was never able to find any provider that is actually in china and not taiwan/HK.
What do you want to host? Bridges would be useless as example. Not all places have mainland China connection.
/u/BribeThePope
1 points
3 months ago
Actually it was an unrelated question to the thread, some time ago I was searching for a china-only hosting company so it would have been unlikely that they would collaborate with western LEA.
/u/zelliad0z
1 points
3 months ago
least obvious fed
i don't think anyone asked you to introduce yourself
thank you for posting this

it's still the primary bridge type because the purpose of bridges is firewall evasion and obfs4 is simple and cheap to setup
the problem arises when some opsec "gurus" recommend it for hiding Tor usage

obfs4 is not designed to hide Tor usage
everyone should keep that in mind
/u/DrugHub P
1 points
3 months ago
obfs4 is not designed to hide Tor usage

Technically that's exactly what bridges do, with various degree of success. In order to evade blocks you need to make Tor traffic look like something else, besides grabbing the list of guard nodes and blocking access to their IP addresses some countries and providers also deploy advanced DPI. obfs4 makes Tor traffic look like garbage but there are ways to identify them, as far as I know China successfully blocks obfs4 traffic. Newer protocols like snowflake and webtunnel are better but not widely implemented. obfs4 bridges are also very easy to set up, webtunnel not so much, not for the average user at least.
hiding tor usage would bypass a firewall but bypassing a firewall wouldn't necessarily hide tor usage

a firewall works in real time while traffic analysis can be retroactive
bypassing a firewall is quite trivial and hiding tor usage is not
/u/DrugHub P
1 points
3 months ago
Not necessarily but if DPI is used hiding Tor usage is a must. Every decent censorship system uses DPI and it works in real time along with the firewall. Evading an advanced DPI like China's is not trivial.
it's trivial because there are a lot of guides and tools made for that and one can just trial and error their way into evading a firewall
hiding tor usage is fundamentally different because the methods an adversary has are unknown and constantly evolving and stored traffic will be retroactively analyzed
if you need to hide tor usage you must be 100% certain of what you're doing

also even in real time a firewall can be 90% positive it's Tor traffic yet still allow it because of the 10% risk of blocking legitimate traffic
meek tunnels made use of this
/u/BribeThePope
1 points
3 months ago
What would you suggest to reliably hide tor traffic retroactively?
/u/bluemax
1 points
3 months ago
Such a shame TailsOS is still not supporting webtunnel.
/u/yelloweyes
1 points
3 months ago
Also don't support default Tor bridges
/u/hplr
0 points
3 months ago
In the countries with Great Firewall, private Obfs4 bridge is the easiest and probably only way to by pass the GFW. I am open to hear better solution though!
if it works and you're using a disposable connection it might be just enough to access Tor

but i wouldn't want to use it from a personal internet connection because it's trivial to uncover
/u/DrugHub P
1 points
3 months ago
Webtunnel is much better.
Webtunnel works only for a little bit but gets blocked afterwards. GFW blacklists the IP for a time period. Not viable long term solution for China. But webtunnel is a good starting point for whitelist environments where most protocols are denied by default.
/u/DrugHub P
1 points
3 months ago
Interesting, even private / unlisted bridges ?
Yes. Refer to my comment on this topic for more info but private bridges work for a while ones with iat-mode=2 work longer, bonus points if China controlled territory or friendly country. At some point GFW will blacklist IP you're connecting to regardless of how you connect to it bridges, VPN of any sort, vray-based proxies, XTLS anything. A tricky system to get around that's for sure.
/u/SupremeMalik
-1 points
3 months ago
FUCK WHICH ONE OF YOU IS WATCHING ME WATCH MINECRAFT PORN HUH.....HUH.....!!!!!!!