{{Title|title=Non-bridge Censorship Circumvention Tools}}
{{Header}}
{{#seo:
|description=List of Censorship Circumvention Tools that may be helpful to get around network bans. Draft.
|image=Padlocks337569640.jpg
}}
[[File:Padlocks337569640.jpg|thumb]]
{{intro|
List of Censorship Circumvention Tools that may be helpful to get around network bans. Draft.
}}
== '''''UNFINISHED'''''  ==
{{stub}}
----

== Introduction ==
----
This page is about the censorship circumvention tools other than [[Bridges|Tor Bridges]]. If you are not experiencing a real censorship (for example, only some ports are blocked by your ISP), then [[Bridges#Better_Connectivity_without_Real_Censorship_Circumvention|something]] simpler can be tried.

== Tools ==
----

{| class="wikitable"
|-
! Tool !! client language || works on Linux !! works on Wine !! OS !! Interface !! Transport !! uses Service !! Tor works !! runs through proxy !! notes
|-
| [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/GoAgent GoAgent] [https://en.wikipedia.org/wiki/GoAgent 1] || ? || yes || N/A || ? || proxy/if? || ? || google app engine account || ? || ? || [https://web.archive.org/web/20140106215851/http://www.goagent.org/ site] and [https://github.com/goagent/goagent/commit/e492ed0283f5cde7cf71d7ac47429f64aa48cd13 sources] [https://www.eff.org/deeplinks/2015/08/speech-enables-speech-china-takes-aim-its-coders deleted] (Similar to [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/meek meek].)
|-
| [https://shadowsocks.org/ ShadowSocks] || Originally Python, later ported to [https://github.com/shadowsocks/shadowsocks-libev C] and [https://github.com/shadowsocks/shadowsocks-rust Rust] || yes || N/A || yes || proxy || [https://www.pluggabletransports.info/transports/#scrambling scrambled] as random encrypted traffic+encrypt || server for proxy || ? || no || [https://github.com/shadowsocks/shadowsocks sources] was [https://github.com/shadowsocks/shadowsocks/tree/master clocked as deleted] due to [https://www.eff.org/deeplinks/2015/08/speech-enables-speech-china-takes-aim-its-coders police pressure], Rust client still actively developed, runs on routers
|-
| [http://www.scotty-transporter.org/ scotty transporter] || java || yes || N/A || ? || proxy || ? || php webhosting, server with java, google appengine account || ? || ? || -
|-
| [https://github.com/altoor/IPoEM IP over mail tunnel] || C or C++ || ? || ? || yes || ? || email/protocol? || maybe an email account? || ? || no? || -
|-
| [https://en.wikipedia.org/wiki/Psiphon Psiphon] [https://s3.amazonaws.com/0ubz-2q11-gi9y/en.html 1] || ? || no || ? || no? || ? || ? || ? || ?  || ? || -
|-
| [https://web.archive.org/web/20160525142918/http://lahana.dreamcats.org/node-howto/ Lahana] || uses an ipsec vpn client || yes || N/A || ? || if || ipsec vpn || amazon aws account || ? || ? || -
|-
| [https://telex.cc/ Telex] || ? || ? || ? || ? || ? || tls || cooperating isp || yes || ? || only a concept
|-
| [https://code.kryo.se/iodine/ Iodine] || C or C++ || yes || N/A || yes || if || dns || domain and dns server || ? || no || very small, runs on routers
|-
| [https://www.your-freedom.net/ your freedom] || java || yes || N/A || ? || socks,if || ?, dns || free account || ? || https(s), socks 4/5 || has various settings
|-
| [https://www.torproject.org/ tor] || C++,javascript || yes || N/A || yes || proxy,if() || tls,pt || - || yes/N/A || yes || tor over tor is bad
|-
| [https://dongtaiwang.com/home_en.php FreeGate] || ? || no || ? || ? || ? || http(s),tls || ? || ? || ? || officially only available for china & Iran, questionable trustworthyness
|-
| [https://ultrasurf.us/ UltraSurf] || C++ || no || ? || ? || ? || http(s),tls || ? || ? || ? || officially only available for china & Iran, similar origin with FreeGate, as [https://web.archive.org/web/20110807042953/http://www.wired.com/magazine/2010/11/ff_firewallfighters/all/1 Wired reported] server admin can (and do) see clients' requests, own censorship rules according to [https://media.torproject.org/misc/2012-04-16-ultrasurf-analysis.pdf Tor developer Jacob Appelbaum's research]
|-
| [https://www.vpngate.net/en/ VPN Gate] || ? || yes || N/A || no || if || vpn || - || ? || ? || -
|}

===Webproxies===
* dynaweb webproxy, owner of FreeGate, questionable trustworthyness (https://freedomhouse.org/sites/default/files/inline_images/Censorship.pdf), own censorship rules
* [https://proxify.com/ Proxify]
* [https://translate.google.com Google Translate]

===Email===
* https://web.archive.org/web/20190420181707/http://www.web2mail.com/lite/welcome.php
* [https://github.com/altoor/IPoEM IP over mail tunnel]

===Static Web Mirrors===
* https://www.archive.org
* https://archive.ph/
* https://cachedview.com/
* https://web.archive.org/web/20190319140019/http://www.cachedpages.com/
* https://web.archive.org/web/20170222180651/http://www.google-cache.de/

===Single Site solutions===
* [https://web.archive.org/web/20081015170146/]
* [http://openfacts.berlios.de/index-en.phtml?title=Copies_of_Wikipedia_content]
* [https://en.wikipedia.org/wiki/Reverse_proxy essentially what a cdn does]<ref>https://en.wikipedia.org/wiki/Internet_censorship_circumvention</ref>

===Protocol Tunneling===
====ICMP====
* [https://www.cs.uit.no/~daniels/PingTunnel/ Ping Tunnel]
====DNS====
* [https://dnstunnel.de/ DNSTunnel]
* [https://code.kryo.se/iodine/ Iodine]
* [https://www.your-freedom.net/ your freedom]
====SSL====
* [https://www.stunnel.org STunnel]

===Anonymous P2P===
* Freedom Network
* Onion Routing
* MixMaster
* Babel
* Mixminion
* Zach Brown's Onion
* PipeNet
* IronKey
* MorphMix
* Tarzan
* Tor
* Hornet (Modified Tor)
* [https://geti2p.net I2P]

[https://en.wikipedia.org/wiki/Anonymous_P2P Source]

==Unsorted==
----
* https://web.archive.org/web/20210126155918/https://jaxov.com/2009/09/how-to-unblock-any-website-in-ubuntu-via-ultrasurf-linux/
* https://socialsourcecommons.org/tool/show/3368/
* https://www.vpngate.net/en/
* [http://nms.csail.mit.edu/infranet/ Infranet]
* [https://web.archive.org/web/20160310020359/http://research.cs.tamu.edu/netcamo/ NetCamo]
* [https://web.archive.org/web/20130730135949/http://gtnoise.net/projects/7-anti-censorship/7-collage-defeating-censorship-with-user-generated-content Collage] [https://github.com/sburnett/collage collage]
* https://web.archive.org/web/20060424152838/http://www.peek-a-booty.org/pbhtml/index.php
* https://web.archive.org/web/20070911174435/http://www.brain-pro.de/Seiten/six/sixfour.html
* [https://adam.shostack.org/zeroknowledgewhitepapers/Freedom_System_2_Architecture.pdf freedom systems]
* https://en.wikipedia.org/wiki/TriangleBoy
* [https://github.com/jlund/streisand streisand] - Script to automate deployment of some of these tools.
* https://www.ndss-symposium.org/wp-content/uploads/2020/02/24340-paper.pdf
* https://github.com/OperatorFoundation
* https://github.com/BrassHornCommunications/go-packetflagon/

=== Tor's Pluggable Transports ===
* Flash Proxy https://en.wikipedia.org/wiki/Flash_proxy
* Meek https://gitlab.torproject.org/legacy/trac/-/wikis/doc/meek
* [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/PluggableTransports more] and [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/PluggableTransports?version=108 more]

== Research and Proof of Concept ==
----
* https://web.archive.org/web/20161108060949/https://freedomhouse.org/report/special-reports/leaping-over-firewall-review-censorship-circumvention-tools
* https://en.wikipedia.org/wiki/Internet_censorship_circumvention
* https://www.usenix.org/legacy/events/sec10/tech/full_papers/Burnett.pdf
* jondonym Japan On https://git.gnunet.org/bibliography.git/plain/docs/koepsell-wpes2004_0.pdf
* [https://git.gnunet.org/bibliography.git/plain/docs/CCS%2711_-_Cirripede.pdf Cirripede] paper
* [https://www.usenix.org/legacy/events/foci11/tech/final_files/Karlin.pdf Decoy Routing]
* [https://digitalcollection.zhaw.ch/handle/11475/1752 Morphmix] java

==Questions==
----
* Type? (VPN, proxy, ssh?)
* Usable with Open Source Software, without any proprietary client? (OpenVPN etc.)
* Is there a Linux version?
* Does it work in WINE?
* Can {{project_name_long}} (Tor) get tunneled through it? ({{project_name_long}} (Tor) can get tunneled thought a VPN running on the host and also supports all kinds of proxy settings (http(s), socks4(a)/5).)
* Instructions for using it with {{project_name_short}}?

== TODO ==
Add [https://lantern.io/ Lantern] to the above table. (Already partially documented in {{project_name_short}} wiki, see [[Lantern]].)

{{Footer}}

[[Category:Documentation]] [[Category:TODO]]