Patent attributes
Methods, non-transitory computer readable media, and peer devices are disclosed that facilitate network censorship circumvention. A censored peer sends to a rendezvous peer censored peer location information. A connection with a volunteer peer is then established using volunteer peer location information received from the rendezvous peer for a matched volunteer peer. First network traffic is then sent to the volunteer peer in accordance with a first network protocol using a second network protocol associated with the connection. The first network traffic is directed to a network host restricted with respect to the censored peer and the second network protocol is a peer-to-peer network protocol. Second network traffic responsive to the first network traffic is then extracted from network message(s) to thereby obtain access to the restricted network host via the volunteer peer. The first network messages are in accordance with the second network protocol and received via the connection.