What to do if tor is blocked. Transparent bypass of blocking and access to the Tor network

Many sites in our country are blocked by Roskomnadzor! And in this issue I will show you how to bypass blocking of any site using the TOR browser.

Lately we have been hearing more and more about restrictions on the Internet. Governments of different countries prohibit their citizens’ access to resources containing content that, in the opinion of deputies, is incorrect.

Operators are forced to transmit information about users, and there is no talk of any anonymity on the Internet. At the same time, it is not always the case that sites blocked by decision of certain authorities actually contain materials that can harm users.

“The forbidden fruit is sweet,” and various restrictions on the Internet have given rise not only to ways to circumvent them, but also to an entire secret network, which can only be accessed using special means that hide information about the user. Anonymous network called Tor, and it is available absolutely free to everyone.

You can download TOR Browser from the official website using THIS LINK

VIDEO: TOR browser. How to download and configure the Tor browser in Russian

Well, you can learn more about the dark internet and immerse yourself in it at!

Well, that's all for today! Please write in the comments whether you managed to bypass the blocking of any prohibited site?

And also if you liked this video, give it a thumbs up and don't forget subscribe to my YouTube channel and notifications by clicking on the bell next to the subscribe button!

The desire to bypass censorship and blocking of sites, as well as the prohibition of using VPNs introduced by Roskomnadzor, now turns out to be, or extensions installed in them for changing IP addresses. If you already have the well-known Tor browser, then, alas, this does not mean that you are insured against entering not only the sites you need but are prohibited, but also from blocking the browser itself.

You need to remember that Tor anonymizes the source of your traffic and encrypts all traffic inside Tor networks but it cannot encrypt traffic between the Tor network and the destination address. If you transmit valuable information online using this “secret” browser, you should be as careful as when using regular browsers - use HTTPS for your own sites or other methods of encryption and authentication. However, even with such less reassuring factors privacy when using this browser, it is still prohibited and blocked in the Russian Federation. If you notice that your Internet service provider is trying to block Tor, then try using the method I outlined below. There is still a way out (at least partially). Let's look at the method...

How to bypass Tor Browser blocking

1.Install the browser and get bridges

Let's move on to the website and carry out the necessary actions. If you have not yet installed the Tor browser, then click on the “Step 1” button to download the installation file. In special tables with download links, you need to select the appropriate language for your OS, as well as the language you need. There is also Russian.

Then, of course, run the file and install the program. If you already have this browser, go to the site using the button "Get Bridges" .

Important! To perform the steps below, you must update your Tor browser to the latest version.

When you click on the third button, you will be provided with small instructions and tips on installing bridges in the browser on the same page of the site. Bridges are Tor relays that allow you to bypass censorship.

So you have installed Tor browser, received bridges (relays) after the appropriate transition:

Click on the button "Just give me the addresses of the bridges" and after passing the captcha, we go to the page for receiving them.

2. Install bridges to the Tor browser


And also the screenshots shown below.

1.Copying bridges:

2. Login to browser settings:

3. Check the box according to the instructions, select manual mode and insert bridges into the corresponding settings window. We confirm the operation by pressing the “OK” button and complete the installation of repeaters. Voila!

Enjoy your work, friends! And free Internet!

(Visited 1 times, 1 visits today)

A decree has been issued in Belarus on ways to restrict access to websites. From it it became known that in case of violation of the law, everything can be blocked for everyone.

Among other things, it is planned to limit access to proxy servers and networks such as Tor, through which users will try to access blocked sites.

There is no way to find out which site a user is trying to access through a proxy server. If the technology is done properly, the channel will be encrypted, and no one will know which site the user is visiting through a proxy, Tor or VPN. So you won't be able to catch him by the hand. Therefore, we can conclude that only all proxies and VPNs can block.

Catching those who go through proxies to prohibited sites is almost impossible and expensive. This means that either everyone will be blocked, or history will repeat itself, as with Decree 60. It will be spelled out in the law, but in practice no one will block all proxies, VPNs and Tor. Until a certain point...

You can block the Tor browser, but not for everyone and not for long

There are several technologies for circumventing censorship on the Internet. The Tor browser is the most popular. Blocking it is difficult, but possible at the right times for most people. There are several ways.

Prevent downloading of Tor browser

You can close sites for downloading the program itself. And create fake download sites where you can post a version of the browser with a virus. This will make it difficult for users to get it.

Block addresses built into the browser

The Tor browser changes ports and uses a whole network of computers to access sites. The site for downloading movies, music and Torrent programs works on the same principle - you download a file from several sites at once different computers. Naturally, it is difficult to block them all.

But for the first access to the Internet, certain addresses are registered in the browser, which are easy to find by studying the browser and block them. China is doing this with varying degrees of success. Of course, computer specialists will be able to quickly register new addresses, but for most users the Tor browser will stop working for some time until the browser developers release an update that solves the problem.

You can also block VPN

There are three VPN technology options. Some are easy to block because they access the Internet through certain ports that can be easily recognized and closed.

OpenVPN, for example, is not so easy to block. The program can pretend to be a regular browser that accesses the Internet via an encrypted channel.

There are about 100 of the most common VPN providers. It’s not difficult to block them, just according to the list. Rewrite all server addresses and block. China uses this quite effectively.

Businesses and computer geeks will be able to find VPN servers that are not blocked. But this is not an option for everyone.

It's easy to block web proxies

The third option for accessing sites is a web proxy. In fact, web proxies are also websites. By typing them into the search, you can find the most popular ones and limit access to them in the same way as to all other sites. There are programs that can “raise” proxies, but most Internet users will not be able to master them.

There are projects that can bypass censorship

Project lantern designed as effective method bypass censorship. The principle of its operation is such that users become proxy servers for each other. But there are no simple solutions yet. If the new law is implemented with enthusiasm, it may cause problems with this method. If not, it will be easy to bypass it.

Create a lock on limited time easy for most users. But the law can be kept in one's pocket simply to be used at a certain time.

Website blocking is a commercially available technology. Belarus can buy a ready-made solution and launch it fairly quickly. Companies in Europe and Russia are engaged in the production of such solutions.

On February 26, the document was adopted by the Operational Analytical Center under the Presidential Administration and the Ministry of Communications in agreement with the Ministry of Information.

Why do you need a VPN?

Using VPN services, you can bypass blocking of sites that do not work in Russia (for example, Spotify). But that's not the only reason they are needed. Remote workers and branch employees connect via VPN to corporate services, thereby not putting company data at risk. People who access the Internet via public Wi-Fi and are afraid that their data will be intercepted also use a VPN to protect themselves from intruders.

How does it work? If your computer usually connects to the Internet through the provider’s server, then the VPN service sets up a tunnel between your computer and the remote server. This way you access the Internet in a roundabout way. All data inside the tunnel is encrypted, so the provider and hackers do not know where you go under the VPN connection or what you do on the Internet. In this case, sites do not see the true IP address of your computer, since you are working under someone else's address. VPN (Virtual Private Network) creates a secure private network within the unsecured Internet.

How will it be blocked?

Sarkis Darbinyan: “There are many ways that a person can use: research the issue and easily set up your own VPN, use other solutions such as Psiphon, Tor, browser turbo modes, plugins, purchase another VPN service that cares about users and takes prompt action.” .

What will the blocking lead to?

Artem Kozlyuk: “Almost all business is tied to VPN. Virtual private networks of any enterprise, from small to large, are at risk. VPN malfunctions can occur at any time due to incorrect enforcement of the new law. We see an endless number of times how Roskomnadzor implements these laws. Firstly, they are poorly written from the technical side, and secondly, in the process of law enforcement, Roskomnadzor increases this technical illiteracy to new proportions.”

Markus Saar: “It is still not clear how verification and control will take place. A VPN, unlike a form of anonymizer, is a closed network and must be purchased to access it. paid subscription and install the software. Moreover, some services do not have their own software, and you need to configure the connection manually using configuration files, keys and certificates. The second question is how rational it is to “hit” tech-savvy users who have reached the point of using VPN, Tor and other tools. After all, if they once found the strength and desire to bypass censorship, they will do it again and again.”

Sarkis Darbinyan: “Blocking VPN traffic by telecom operators clearly means colossal damage to the entire corporate sector, the country’s digital economy and a decrease in the security of Russian citizens in the global digital environment in the face of foreign intelligence services, corporations and attackers using vulnerabilities for surveillance and data theft. No one has ever been able to completely block the ability to transmit and receive information via VPN, even in Asian and Muslim countries with repressive regimes. Providers have lists of IP addresses of the most popular VPNs, which they update and block at some intervals. But VPN traffic has also learned to disguise itself. The VPN provider can create new IP addresses at least every minute (plus endless IPv6), so this will become increasingly difficult and expensive.”

With such an initiative, the free Internet is becoming less and less before our eyes. At the same time, most users are sure that Tor and VPN cannot be limited in any way. We asked advice on this from Mikhail Lisnyak, the creator of the meditative service for tracking currency quotes and oil prices Zenrus and a teacher at Moscow Coding School, whose course registration started today.

VPN - in a nutshell - is a creation virtual network over another network, such as our Internet. That is, an encrypted channel is created between the user and the VPN server, through which the user connects to another network, and it turns out that a person from Moscow accesses the Internet as if he were from, for example, Amsterdam. We are now considering one of the VPN options, which relates to the news feed, in general various types and there are many more applications, but their operating principles are absolutely the same.

Tor is a routing system based on encryption and a distributed network of intermediary nodes (they can also be ordinary Tor users). When connecting to Tor, the client collects a list of available intermediary nodes, selects several of them, and in turn encrypts each sent packet with the keys of the selected nodes. Next, this packet, encrypted with several keys, is sent to the first (input) intermediary node. The latter decrypts its key and sends the packet further, the second node decrypts its own, and so on. At the end, the last node decrypts the last “layer” and sends the packet out to the Internet. You can think of it as an onion, with each subsequent node peeling off a layer. Actually, this is what Tor stands for - The Onion Routing, that is, “onion routing”. Since almost the entire path of the packet is encrypted and no one except the input node knows the sender of the packet, the system ensures anonymity and security of traffic.

But you can block Tor. First, the Tor client must somehow obtain a list of entry nodes. To do this, the client connects to the root registry of these nodes. If you block access to this root server, the client will not be able to obtain a list of input nodes on the network and, of course, will not be able to connect to the network. There is a manual way to obtain nodes (for example, through mail), but this, firstly, is not very convenient, and secondly, if the supervisory authorities discover the addresses of these nodes, they can still be immediately blocked.

In addition, there is such a system as DPI - a packet analysis and filtering system. Now this system is gradually being implemented in Russia by providers. It is quite expensive, so not all providers use it. But that's it for now. I think that in the near future all backbone providers will install it. This system can analyze traffic at a low level, determine the type of traffic (even encrypted, but without receiving the content itself), filter it and, if necessary, send it for blocking. Now these systems are already able to identify Tor traffic based on certain criteria. Tor responded by coming up with a traffic masking system (obfsproxy), but gradually they are learning to detect it too. And using all this is becoming more and more difficult for the average user.

If the authorities want, they will block everything for the vast majority of users. Particularly stubborn geeks will be able to find loopholes, but for regular user this is not an option

That is, Tor can be banned in an entire country using the same DPI. When they introduce criminal liability for the use of such software, several show trials will quickly be held, and that will be the end of it for the most part. There are no sane replacements for Tor yet. The same i2p is banned in exactly the same way. Now blocking Tor is not easy, it is expensive, but it is quite feasible if the state really wants it.

In general, everything has already been invented and is used, for example, in glorious China. Known nodes are blocked, traffic is analyzed by DPI, and identified packets are blocked (and information about the sender is sent to the right place). Plus, there is a “forward connection” system, when a suspicious packet to some server on the Great Firewall is “suspended”, and the firewall itself makes the same request to this server and analyzes the response. And then, based on various criteria, it is determined whether it is possible or not.

If the authorities want, they will block everything for the vast majority of users. Of course, especially stubborn geeks will be able to find loopholes, they will be covered, new loopholes will be found - this is an eternal process, as happens with viruses and antiviruses. But for the average user this is not an option. In addition, there is always the opportunity to introduce white lists or simply close the entire external Internet completely. But I hope it doesn't come to that.



Loading...
Top