<s>
Flash	B-Application
proxy	I-Application
is	O
a	O
pluggable	O
transport	O
and	O
proxy	B-Application
which	O
runs	O
in	O
a	O
web	B-Application
browser	I-Application
.	O
</s>
<s>
Flash	B-Application
proxies	I-Application
are	O
an	O
Internet	B-Application
censorship	I-Application
circumvention	O
tool	O
which	O
enables	O
users	O
to	O
connect	O
to	O
the	O
Tor	B-Application
anonymity	I-Application
network	I-Application
(	O
amongst	O
others	O
)	O
via	O
a	O
plethora	O
of	O
ephemeral	O
browser-based	O
proxy	B-Application
relays	O
.	O
</s>
<s>
The	O
essential	O
idea	O
is	O
that	O
the	O
IP	B-Protocol
addresses	I-Protocol
contingently	O
used	O
are	O
changed	O
faster	O
than	O
a	O
censoring	O
agency	O
can	O
detect	O
,	O
track	O
,	O
and	O
block	O
them	O
.	O
</s>
<s>
The	O
Tor	B-Application
traffic	O
is	O
wrapped	O
in	O
a	O
WebSocket	B-Protocol
format	O
and	O
disguised	O
with	O
an	O
XOR	B-Algorithm
cipher	I-Algorithm
.	O
</s>
<s>
A	O
free	B-Application
software	I-Application
implementation	O
of	O
flash	B-Application
proxies	I-Application
is	O
available	O
.	O
</s>
<s>
It	O
uses	O
JavaScript	B-Language
,	O
WebSocket	B-Protocol
,	O
and	O
a	O
Python	B-Language
implementation	O
of	O
the	O
obfsproxy	O
protocol	O
,	O
and	O
was	O
crafted	O
by	O
the	O
Security	O
Project	O
in	O
Computer	O
Security	O
at	O
Stanford	O
University	O
.	O
</s>
