Tor's Resilience in the Face of Censorship: A Year of Evolution and Adaptation
The year 2025 brought unprecedented challenges to Tor's mission of ensuring free and secure communication. With Iran and Russia leading the charge in aggressive censorship tactics, Tor had to adapt and innovate like never before. But here's where it gets controversial: is Tor's fight against censorship a battle against governments, or a broader struggle against restrictions imposed by various entities?
Iran's Internet Blackout and the Rise of Snowflake
In June 2025, amidst the escalating conflict with Israel, Iran executed near-total internet blackouts, cutting off digital communication for days. This hostile move, allegedly aimed at espionage prevention and dissent suppression, created an extremely challenging environment for Tor.
To monitor the situation in real-time, Tor utilized its in-country vantage-point system, strategically placing monitoring nodes within Iran. This system provided up-to-date data on accessibility and blocking, allowing precise tracking of domain-fronting configurations. By making Tor traffic resemble benign requests to major cloud platforms, Tor could ensure access to its Snowflake and Moat services.
Snowflake, Tor's most popular obfuscation tool in Iran, underwent multiple technical upgrades this year. The browser extension was updated to Manifest Version 3 to meet modern browser standards. Network Address Translation (NAT) detection logic was enhanced to better match users with compatible proxies, and metrics reporting was improved for proxy operators. Additionally, a new staging infrastructure was deployed to test protocol changes under simulated real-world censorship conditions.
Deploying Conjure: A Game-Changer in Hostile Networks
To counter increasingly sophisticated bridge enumeration and blocking, especially in Iran, Tor accelerated the deployment of Conjure, a pluggable transport with a unique approach. Conjure utilizes temporary, hard-to-predict network addresses from cooperating ISPs, mimicking popular internet services. This makes it significantly harder for censors to perform bulk blocking.
This year, Tor strengthened Conjure's protocols, enhancing both its initial handshake and data transport layers. The addition of multiple bootstrap methods, such as DNS-based and AMP-cache-based registration, made detection more challenging. Upstream transports like DTLS and prefix obfuscation were also integrated, helping disguise Tor traffic as regular web or streaming traffic.
While Conjure is not a new technology, its integration into Tor's bridge ecosystem and its preparations for real-world deployment mark a significant milestone in the fight for more resilient circumvention.
WebTunnel's Battle in Russia: A Pluggable Transport Hero
Russia's tightening censorship regime has increasingly relied on allowlisting and aggressive IP blocking to limit user access. In response, Tor developed WebTunnel, a pluggable transport that seamlessly blends into HTTPS traffic, imitating legitimate TLS sessions. Introduced in late 2024, WebTunnel quickly became a vital tool for Russian users.
By mid-2025, most WebTunnel bridges had been identified and blocked by Russian authorities. Tor's response was swift and strategic: they shifted distribution strategies, notably leveraging Telegram, a platform popular in Russia but harder for censors to scrape for bridge addresses in real-time. WebTunnel bridge support was added to Tor's Telegram distributor, benefiting users in Iran facing similar threats.
This rapid distribution adaptation was powered by rdsys, Tor's bridge distribution system introduced last year. In 2025, rdsys was enhanced with a staging environment, allowing new features and configurations to be thoroughly tested before wide release. This approach reduced downtime and improved user access in critical regions.
The Power of Community: Shaping Tor's Anti-Censorship Work
Throughout 2025, Tor's anti-censorship efforts were greatly influenced by real-time user feedback and the support of its global community. Volunteers played a crucial role, testing transports under different conditions, contributing patches, and providing invaluable insights from within censored environments.
Looking ahead, the Tor Project is committed to expanding Conjure deployment, further enhancing WebTunnel, and preparing Snowflake for future large-scale disruptions. The Tor team emphasizes that censorship is not solely a governmental issue; restrictions can be imposed by various entities, including ISPs, workplaces, or educational institutions. Tor's mission remains unwavering: to ensure users can connect securely and privately, regardless of who is trying to block their access.
If you found this article insightful, be sure to follow us on X/Twitter and LinkedIn for more exclusive content and updates on Tor's ongoing battle against censorship.