Tor Flash Player

The Tor Browser Bundle can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Flash Player is a browser plugin for Internet applications to watch audio and video content. You should never enable Flash to run in Tor Browser as it is unsafe. Many services that use Flash also offer an HTML5 alternative, which should work in the Tor Browser. Edit this page - Suggest Feedback - Permalink. Adobe Flash Player 64-bit Note: On December 31st 2020, Adobe Systems will officially stop updating and distributing Adobe Flash: Adobe Flash Player Support is Coming to An End. Adobe does not recommend that you download Flash Player, and they recommend that you.


Video websites, such as Vimeo make use of the Flash Player plugin to display video content. Unfortunately, this software operates independently of Tor Browser and cannot easily be made to obey Tor Browser’s proxy settings. It can therefore reveal your real location and IP address to the website operators, or to an outside observer. For this reason, Flash is disabled by default in Tor Browser, and enabling it is not recommended.

By default, Tor Browser automatically checks for updates and notifies you of an available update. A green up-arrow notification displays over the hamburger menu when an update becomes available. Click the menu icon, then click Restart to update Tor Browser. Tor Browser closes to install the update. Once completed, Tor Browser relaunches. Why can’t I install Flash Player in Tor browser? New Here, Dec 17, 2015. Copy link to clipboard.

Some video websites (such as YouTube) offer alternative video delivery methods that do not use Flash. These methods may be compatible with Tor Browser.


JavaScript is a programming language that websites use to offer interactive elements such as video, animation, audio, and status timelines. Unfortunately, JavaScript can also enable attacks on the security of the browser, which might lead to deanonymization.

Tor Browser includes an add-on called NoScript. It's accessible through 'Preferences' on hamburger menu (main menu), then select 'Customize' and drag the “S” icon to the top-right of the window. NoScript allows you to control the JavaScript (and other scripts) that runs on individual web pages, or block it entirely.

Users who require a high degree of security in their web browsing should set Tor Browser’s Security Level to “Safer” (which disables JavaScript for non-HTTPS websites) or “Safest” (which does so for all websites). However, disabling JavaScript will prevent many websites from displaying correctly, so Tor Browser’s default setting is to allow all websites to run scripts in 'Standard' mode.


Tor Browser is based on Firefox, and any browser add-ons or themes that are compatible with Firefox can also be installed in Tor Browser.

However, the only add-ons that have been tested for use with Tor Browser are those included by default. Installing any other browser add-ons may break functionality in Tor Browser or cause more serious problems that affect your privacy and security. It is strongly discouraged to install additional add-ons, and the Tor Project will not offer support for these configurations.



As of 2017, the flash proxy project is deprecated.It was deployed in Tor Browser between 2013 and 2016,but has since been superseded by newer and more effectivepluggable transports.If you want to help support a newer circumvention systemdesigned along the same principles as flash proxy, please seeSnowflake.


Flash proxies are a way of providing access to a censorshipcircumvention system such as Tor.A flash proxy is a miniature proxy that runs in a web browser. It checksfor clients that need access, then conveys data between them and a Torrelay.

Tor has bridgerelays, but in some cases even these can be blocked despite the factthat their addresses are handed out only a few at a time. The purpose ofthis project is to create many, generally ephemeral bridge IP addresses,with the goal of outpacing a censor's ability to block them. Rather thanincreasing the number of bridges at static addresses, we aim to makeexisting bridges reachable by a larger and changing pool of addresses.

'Flash proxy' is a name that should make you think 'quick' and'short-lived.' Our implementation uses standard web technologies:JavaScript andWebSocket.(In the long-ago past we used Adobe Flash, but do not any longer.)

If your browser runs JavaScript and has support for WebSockets thenwhile you are viewing this page your browser is a potential proxyavailable to help censored Internet users.

How to Help

Copy and paste this HTML into your web site or blog. An example is atthe bottom of this page.

There is an options page (the same page youget by clicking on the badge) with which users can choose whether theywant to be a proxy. By default, if a user has not made a choice, theywill be a proxy. If you want only people who have explicitly clicked'yes' to be a proxy, add the cookierequired parameter. If auser has selected 'no,' they will never be a proxy, regardless of thepresence of cookierequired.

Browser plugins

Cupcake is analways-on flash proxy plugin for Chrome. Clickhere to install from the Chrome web store.

TorFlashproxy Badge is an always-on flash proxy plugin for Firefox.Clickhere to install from Mozilla Add-Ons.


Customizeyour Wikipedia skin to include a flash proxy badge.

Research Paper

This paper contains a fuller description of the system and the resultsof performance experiments.

  • Evading Censorship with Browser-Based Proxies (PDF)
    In the Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS 2012), LNCS 7384, pp. 239–258, 2012.


An overview of the flash proxy system and its state of development as ofFebruary 2013.

How It Works

In addition to the Tor client and relay, we provide three new pieces.The Tor client contacts the facilitator to advertisethat it needs a connection. The facilitator is responsible for keepingtack of clients and proxies, and assigning one to another. Theflash proxy polls the facilitator for clientregistrations, then begins a connection to the client when it gets one.The transport plugins on the client and relay brokerthe connection between WebSockets and plain TCP.

A sample session may go like this:

  1. The client starts Tor and the client transport plugin program(flashproxy-client), and sends a registrationto the facilitator using a secure rendezvous. The client transport pluginbegins listening for a remote connection.
  2. A flash proxy comes online and polls the facilitator.
  3. The facilitator returns a client registration, informing the flashproxy where to connect.
  4. The proxy makes an outgoing connection to the client, which isreceived by the client's transport plugin.
  5. The proxy makes an outgoing connection to the transport plugin onthe Tor relay. The proxy begins sending and receiving data between theclient and relay.

The whole reason this is necessary is because the client cannotcommunicate directly with the relay. (Perhaps the censor has enumeratedall the relays and blocked them by IP address.) In the above diagram,there are two arrows that cross the censor boundary; here is why wethink they are justified. The initial connection from the client to thefacilitator (the client registration) is a very low-bandwidth,write-only communication that ideally may happen only once during asession. A careful, slow, specialized rendezvous protocol can providethis initial communication. The connection from the flash proxy to theclient is from an IP address the censor has never seen before. If it isblocked within a few minutes, that's fine; it wasn't expected to runforever anyway, and there are other proxies lined up and waiting toprovide service.

Tor browser flash player install

Doesn't the censor win just by blocking the facilitator? Doesn't thisshift the problem from bridge-blocking to facilitator-blocking? Theshort answer to these questions is no. We assume thatthe censor has blocked the facilitator. For more details, see theFAQ.

From the user's perspective, only a few things change compared to usingnormal Tor. The user must run the client transport plugin program anduse a slightly modified Tor configuration file. Complete details are inourREADME.

How to Use It

Tor Flash Player Chrome


Flash proxy is built into Tor Browser.Follow this link to download Tor Browser.

Next, read theflashproxy howto to learn how to configure port forwarding. See themanual configuration in the rest of this section if the browser bundledoesn't work.

Some Technical Information

Limitations on outgoing connections

It is a restriction of WebSocketsthat they cannot receive TCP connections, only open them.That is the reason for the client transport plugin: it allows Tor toreceive connections instead of making them.

Badge colors

The badge changes color depending on its state.

Dark blue means the proxy is running but no client is being served.
Light blue means a client is currently being served.
Gray means that the badge has disabled itself. This can be becauseit has detected it is running on a mobile device, or the browser doesn'tsupport WebSocket (this happens on Internet Explorer 9).
Black means that there was an internal error and the proxy is nolonger running.

Source Code

Tor Flash Player Latest

All the programs making up the flash proxy system are free software andtheir source code is visible. To get a copy of everything, run thiscommand:

Or browse the code throughgitweb.


Flash proxies began as a project in Stanford'sCS294s class in spring 2011.David Fifield, Nate Hardison, and Jonathan Ellithorpe were members ofthe project team. They and Emily Stark, Roger Dingledine, Phil Porras,and Dan Boneh wrote a research paper on thesubject. Development continues as part ofthe Tor Project.


Estimated average number of concurrent users. See themetricssite for more control over the graph and historical measurements.


Tor Browser Adobe Flash Player Problem

David Fifield <[email protected]>

Try theissue trackerandtor-devmailing list.

Is Flash Player Free

More Information

Flash Player For Tor Browser

  • Research paper (PDF)
  • Bug reports and open tasks(including closed tickets)