Obfsproxy, which is now part of Passel Protect, makes it easy to manipulate how your web traffic looks when under Deep Packet Inspection. Some internet providers as well as governments like China and Iran use DPI to block VPNs or siphon the bandwidth available to a given protocol to discourage people from using it. Obfsproxy focuses on the way your web traffic appears while Passel Protect is keeping you anonymous and secure.

Below are examples of how different traffic looks under Deep Packet Inspection.

Normal web traffic
Normal web traffic showing different kind of requests.

OpenVPN over UDP traffic. Wireshark marks it as OpenVPN

OpenVPN over TCP traffic. TCP traffic is supposed to look more like normal HTTPS traffic, but the repeated SSL requests can be a give away.

And finally Obfsproxy traffic. Much more like a HTTPS traffic. It looks TCP traffic, without showing the payload of the OpenVPN.
Was this article helpful?
Thank you!