I. Introduction
Tor [12] is used by millions of daily users [27], [49], most of whom use the anonymity network to privately browse the web [27]. Blocking access to the relays that comprise the Tor network is trivial: the network locations of the relays are public (to allow for source routing) and can be straightforwardly enumerated and subsequently blocked. To prevent such blocking, the Tor Project has responded by developing new obfuscation protocols [16], [31], [54] that allow Tor clients to covertly communicate with bridge relays-Tor relays whose network locations are not advertised by the directory servers.