0

How do tools like Ultrasurf works?

At a very high level, what concepts / technologies are used by tools like this?

How does it prevent others (employers/ censorship bodies) from seeing end user traffic?

5
  • The link actually answers your question. Can you explain what about the link does not meet your needs?
    – schroeder
    Commented Jun 9, 2017 at 19:04
  • @schroeder♦ Definitely not homework. I am curious to understand this at least at 1000 feet level. The link does not talks about the technical implementation of it Commented Jun 9, 2017 at 19:04
  • Your question asks about concepts and technologies, but you want to know how it is implemented?
    – schroeder
    Commented Jun 9, 2017 at 19:35
  • @schroeder♦ I wish to know the high level concepts and technologies. Implementation is a very deep level thing which obviously cannot be asked in a short answer Commented Jun 9, 2017 at 20:25
  • Then the link you provided explains all your need.
    – schroeder
    Commented Jun 10, 2017 at 17:27

1 Answer 1

0

How do tools like Ultrasurf work?

They use a second computer (proxy), actually many such computers.

Then the browser is instructed not to connect to the real website you want, but to the proxy, sending it the request. The request itself is heavily encrypted so that nobody except the recipients may know its contents.

Imagine you're underage and you still want to get drunk. You give money to a over-age friend to buy alcohol in his name, then get the booze back to you. The bartender sees a guy of twenty-four and has no qualms in giving him alcohol, nor has he any knowledge of who is actually going to drink it.

At a very high level, what concepts / technologies are used by tools like this?

They use proxying (a proxy is, unsurprisingly, the computer that receives your requests and acts on your behalf), through an encrypted tunnel (or a full virtual private network or VPN, which is actually a more advanced implementation of basically the same concept).

How does it prevent others (employers/ censorship bodies) from seeing end user traffic?

These are actually two questions, because depending on who the "others" are, you might need to hide not only

  • what you are communicating or who you're communicating to

but also

  • the fact that you're communicating privately.

The encryption takes care of the "what", and the fact that you're only communicating with a proxy, and only the proxy knows who to forward your requests to, takes care of the "who".

But while your employer does no longer see requests for nsfw.com, he now sees encrypted and unreadable requests directed to hidethisfrommyemployer.com. Depending on the employer, this might still be undesirable or have nasty side effects.

In some countries, using encryption to sneak past censorship will actually have the opposite effect, since encrypted communications are usually extremely easy to recognize. Also, the networks used on the other side to supply you with a proxy service can be identified and blocked, so that this strategy no longer works.

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .