Where is the obfuscation bridge covered in more detail? (I've already checked the link in Jason's email.) He says it's highly technical, maybe to some it is, but it only coves installation; not how the obfuscation actually works: how a TLS connection can appears to be HTTP? Someone might say read the source, but my literacy in that area is questionable.