The Tor Project recently updated its browser application to add support for WebTunnel bridging, making it more resistant to censorship. WebTunnel is similar to the obfs4 options that users can choose from, but instead of just trying to be different and indistinguishable like obfs4, WebTunnel actually tries to mimic known typical network traffic.

Explaining how it works, the Tor Project said that WebTunnel wraps the payload connection into a WebSocket-like HTTPS connection. To someone monitoring your connection, it will appear to be just a normal connection to a web server, when you are actually going somewhere else on the network.

Unlike the obs4 bridge, which can be connected via the Tor Browser built-in option, to connect to a WebTunnel bridge, you need to obtain a unique bridge address from Tor's BridgeDB website, then select "Add Bridge Manually" in Tor Browser's Connection Preferences window, and copy the obtained bridge address before pressing "Connect".

Obviously, if you're in a censored country, you probably won't be able to access the Tor Project's bridge site, as it's likely to be blocked. In the future, the project will also add bridging communication methods such as Telegram and Moat.

If you have access to TorProjectBridgeDB, it might be wise to grab some WebTunnel bridges and save them for later use. You can copy and paste them anywhere for later use.

According to the Tor Project, there are currently 60 WebTunnel bridges around the world with more than 700 daily active users. The project confirmed that WebTunnel works in China and Russia, but not in some areas of Iran.

For more information on setting up WebTunnel bridging in Tor Browser, check out the step-by-step instructions in the announcement linked below:

https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/