Wastholm.com

Ahead of the anniversary of Iran’s revolution Saturday, the country’s government has locked down its already-censored Internet, blocking access to many services and in some cases cutting off all encrypted traffic on the Web of the kind used by secure email, social networking and banking sites. In response, the information-freedom-focused Tor Project is testing a new idea: Encrypted connections that don’t look encrypted. To skirt the so called “deep packet inspection” filters Iran’s government has deployed to block all Secure Sockets Layer and Transport Layer Security (SSL and TLS) encryption that protesters might use to communicate privately, Tor is trying a new kind of bridge to the Web, one the group is calling “obfsproxy,” or obfuscated proxy.