Recent reports from Tor users in Russia indicate an escalation in
  online censorship with the goal of blocking access to Tor and other
  circumvention tools. This new wave includes attempts to block Tor
  bridges and pluggable transports developed by the Tor Project, removal
  of circumvention apps from stores, and targeting popular hosting
  providers, shrinking the space for bypassing censorship. [1]Despite
  these ongoing actions, Tor remains effective.

  One alarming trend is the targeted blocking of popular hosting
  providers by Roscomnadzor. As many circumvention tools are using them,
  this action made some Tor bridges inaccessible to many users in Russia.
  As Roscomnadzor and internet service providers in Russia are increasing
  their blocking efforts, the need for more [2]WebTunnel bridges has
  become urgent.

Why Webtunnel bridges?

  Webtunnel is a new type of bridge that is particularly effective at
  flying under a censors's radar. Its design blends itself into other web
  traffic, allowing a user to [3]hide in plain sight. And since its
  launch earlier this year, we've made sure to prioritize small download
  sizes for more convenient distribution and simplified the support of
  uTLS intergration further mimicing the characteristics of more
  widespread browsers. This makes Webtunnel safe for general users
  because it helps conceal the fact that a tool like Tor is being used.

  We are calling on the Tor community and the Internet freedom community
  to help us scale up WebTunnel bridges. If you've ever thought about
  running a Tor bridge, now is the time. Our goal is to deploy 200 new
  WebTunnel bridges by the end of this December (2024) to open secure
  access for users in Russia.

How to run a Tor WebTunnel bridge

  On the International Day Against Online Censorship in March, we
  published a blog post introducing [4]WebTunnel: "Hiding in Plain
  Sight". Setting up a WebTunnel bridge requires some system
  administration skills, but we've streamlined the process to make it as
  straightforward as possible.

  1. Using Docker: We offer a Docker image that simplifies deploying the
  Tor bridge and WebTunnel transport. Some additional configuration of
  your web server is required.

  2. Ansible automation: A WebTunnel Ansible role, created by community
  member Jacobo Nájera, provides another way to set up a WebTunnel bridge
  quickly.

  You can find the technical requirements in our [5]WebTunnel guide. In
  short, you'll need:
    * A static IPv4 address (preferred)
    * A self-hosted website
    * A valid SSL/TLS certificate (e.g., Let's Encrypt)
    * Bandwidth usage: at least 1 TB/month, but more is recommendable.

  Important: Avoid using free shared DNS services, as they are frequently
  blocked in Russia and other regions. Consult our community [6]Good/Bad
  ISPs page for finding a provider for your WebTunnel bridge and avoiding
  popular hosting companies.

Bridge campaign rules for participation

  The campaign starts today, November 28, 2024, and will run until March
  10, 2025. As a token of our appreciation for your volunteer work, we're
  offering a Tor t-shirt to operators who run 5 or more WebTunnel bridges
  during this period. Please note: Only one t-shirt will be awarded per
  operator. See the technical requirements below to participate in the
  campaign.

Technical requirements for campaign

   1. Operators must run one WebTunnel bridge per IPv4. It is acceptable
      to use multiple subdomains or distinct domains.
   2. Include a valid email address as your contact information. Or we
      won't be able to confirm and validate your participation in the
      campaign.
   3. Maintain your bridges running for at least 1 year.
   4. Ensure your bridges have a solid uptime, operating close to 24/7.
      Reboots for updates are fine.
   5. Your bridge must remain functional during the campaign period.
   6. Do not host your bridges with [7]Hetzner.

How to participate

  After spinning up and verifying that your five WebTunnel bridges are
  working, confirm your participation by emailing
  [email protected] with the following template:
Subject: Participation in Bridge Campaign 2025
Body: Hi,
I'm signing up for the Tor Bridge Campaign. These are my bridges:
   <Add here your bridge lines>
My t-shirt is (pick your size: https://gitlab.torproject.org/tpo/community/team/
-/wikis/tshirts/tshirt-size-charts).

  To validate your participation, please contact us using the same email
  address listed in your contactinfo. You can expect your reward to be
  shipped in Q2 2025.

Russian censors targeting pluggable transports

  Tor-powered applications like Tor Browser include built-in censorship
  circumvention features, but censors in Russia are increasingly
  targeting these mechanisms. For example, user reports suggest that
  [8]obfs4 connections are being blocked on some 4G mobile networks in
  Russia. Despite this, obfs4 remains the most widely used pluggable
  transport for Tor users in the country. Snowflake has also experienced
  partial blocks at certain providers and Tor's [9]Anti-Censorship Team
  have been investigating.

  Analyzing censorship tactics, developing fixes, and implementing new
  mitigations takes time and resources. In the meantime, Tor WebTunnel
  bridges serve as an urgent and immediate way to bypass censorship in
  Russia.

  Tor-powered applications are critical for combating online censorship
  in heavily restricted regions. In a country where [10]"the biggest
  banks were instructed to punish customers using credit cards to pay for
  VPN services", free and open source tools like Tor are some of the few
  remaining alternatives for keeping users connected.

Background: Tor blocked in Russia (2021)

  In late 2021, the Russian government attempted to block Tor, [11]as we
  detailed in our blog post. Despite the censors' best efforts, Russian
  users were able to circumvent the block using Tor bridges.

  Upon launch of WebTunnel in early 2024, we only had 60 WebTunnel
  bridges. Today, the number has more than doubled to 143. However, we
  must improve our efforts to meet the rising demand and counter the
  evolving censorship landscape.

  If you've ever considered running a Tor bridge, now is an excellent
  time to get started. Please help us spread the word as your help is
  urgently needed.

I want to help, but I am not tech-savvy

  No problem, you can help us spread the word. Now, more so than ever, it
  is important to speak up. Share this in your social networks–online AND
  offline. If enough people read this, we can reach those who can support
  with the technical aspects of this ask.

  You can also make a [12]donation to the Tor Project. Right now, all
  donations are matched. That means when you donate $25, your donation
  will be matched by a generous donor, meaning Tor receives a total of
  $50. Every donation helps build our power in this fight.

Other resources

    * [13]Responding to Tor Censorship in Russia (2021)
    * [14]DEF Con: How Russia is Trying to Block Tor (2022)

References

  1. https://gitlab.torproject.org/tpo/anti-censorship/censorship-analysis/-/issues/40046
  2. https://community.torproject.org/relay/setup/webtunnel/
  3. https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/
  4. https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/
  5. https://community.torproject.org/relay/setup/webtunnel/
  6. https://community.torproject.org/relay/community-resources/good-bad-isps/
  7. https://ntc.party/t/12845
  8. https://gitlab.torproject.org/tpo/anti-censorship/censorship-analysis/-/issues/40050
  9. https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40407
 10. https://cepa.org/article/russias-bankers-become-secret-policemen/
 11. https://blog.torproject.org/tor-censorship-in-russia/
 12. https://donate.torproject.org/
 13. https://blog.torproject.org/tor-censorship-in-russia/
 14. https://www.youtube.com/watch?v=YlZZQYLIXe8