How to Use Tor in China — Bypass the Great Firewall
China operates the most sophisticated internet censorship apparatus in the world — the Great Firewall (GFW). It uses deep packet inspection (DPI), DNS poisoning, IP blacklisting, and active probing to block Tor relays and other circumvention tools. Despite these challenges, Tor remains one of the most effective ways to access the uncensored internet from within China. This guide explains how to configure Tor to work reliably behind the Great Firewall and why offshore Tor hosting is essential for serving users in censored regions.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
Internet Censorship in China
The Great Firewall of China (GFW) is a multi-layered censorship system operated by the Cyberspace Administration of China (CAC). It blocks access to thousands of websites including Google, Facebook, Twitter, YouTube, Wikipedia, and most Western news outlets. The GFW employs deep packet inspection to identify and block VPN protocols, Tor traffic, and other circumvention tools in real time.
Since 2012, the GFW has specifically targeted Tor by blocking all known public relay IP addresses and using active probing to identify and block Tor bridges. The system can detect the TLS fingerprint of Tor connections and terminate them mid-handshake. During politically sensitive periods — such as the anniversary of Tiananmen Square or the National People's Congress — censorship is intensified, and even previously working circumvention methods may fail temporarily.
Despite these measures, Tor usage in China persists. The Tor Project continually develops new pluggable transports specifically designed to evade the GFW's detection capabilities. With the right configuration, users in China can still establish Tor circuits and access the uncensored internet.
Recommended Tor Configuration for China
Direct Tor connections are blocked in China. You must use pluggable transports — tools that disguise Tor traffic to look like ordinary HTTPS or WebRTC traffic. The most effective options for China in 2026 are:
Snowflake: This is currently the most reliable transport for China. Snowflake uses WebRTC to route your Tor traffic through volunteer-run browser proxies. Because the GFW cannot easily block all WebRTC traffic without disrupting legitimate video calls, Snowflake remains functional even during crackdowns. In Tor Browser, enable Snowflake under Connection Settings > Bridges.
obfs4 Bridges: The obfs4 protocol disguises Tor traffic as random noise, making it harder for DPI systems to classify. Request private obfs4 bridges from bridges.torproject.org (access via email: [email protected] from a Gmail or Riseup address). Public obfs4 bridges are quickly discovered and blocked by the GFW, so private bridges are essential.
meek-azure: The meek transport routes Tor traffic through Microsoft Azure's CDN, making it appear as regular HTTPS traffic to microsoft.com. While slower than Snowflake or obfs4, meek is extremely difficult to block without disrupting access to Azure services that Chinese businesses rely on. Use meek-azure as a fallback when other transports fail.
Using VPN + Tor Together in China
For maximum reliability and security in China, combining a VPN with Tor provides layered protection. Connect to a VPN first, then launch Tor Browser. This approach — known as VPN-over-Tor or more accurately Tor-over-VPN — means your ISP and the GFW see only VPN traffic, while the VPN provider sees only Tor traffic without knowing your final destination.
Choose a VPN provider that is known to work in China and supports obfuscated protocols such as Shadowsocks, V2Ray, or Trojan. Avoid VPNs that have been publicly identified and blocked by the GFW. The VPN connection gets you past the initial GFW filtering, and Tor provides anonymity beyond the VPN server.
Be aware that using Tor or VPNs without government approval is technically illegal in China, though enforcement typically targets service providers rather than individual users. Exercise caution, avoid accessing your real-name accounts while on Tor, and consider using Tails OS for sessions where maximum anonymity is required.
Host on AnubizHost for Censorship-Free Access
If you run a website or service that needs to be accessible to users in China and other censored regions, hosting on the clearnet alone is not enough — the GFW will block your domain. By deploying a .onion mirror on AnubizHost's Tor hosting infrastructure, your content becomes accessible to anyone with Tor Browser regardless of their country's censorship regime.
AnubizHost operates servers in privacy-friendly jurisdictions including Iceland, Romania, and Finland — far outside the reach of Chinese authorities. We accept Bitcoin, Monero, and other cryptocurrencies with no KYC requirements, ensuring your hosting account cannot be traced back to you. Our no-logging policy means there are no records to seize even if a server is physically accessed.
Whether you are a journalist reporting on China, an activist organization, or a business serving Chinese customers, AnubizHost Tor hosting gives you censorship-resistant infrastructure with enterprise-grade reliability. Deploy your .onion service today and ensure your content reaches every corner of the internet.
Related Services
Why Anubiz Labs
Ready to get started?
Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.