- Joined
- May 5, 2022
Maybe, maybe not. I use pretty much all of these but some of these are outdated. Some notes:Censorship Bypass Guide. Let me know if this is the wrong thread to post this? i couldn't find a better thread for this
1) Hysteria 2 and all UDP/QUIC (TUIC) based protocols are now blockable because SNI is not encrypted in the original iteration. Downgrade attack exists unless you force the new version (purposely blocked in China). Read this paper for details. UDP is blocked in the classic port range, use port range higher than the regular boundaries.
Linux hosts typically use an ephemeral port range of 32768 to 60999, while macOS and Windows Vista or later use the range 49152 to 65535.
2) Trojan hasn't been updated in a while. Rumor was dev got vanned by the MSS.
3) Mirror a site on Naiveproxy server to look more legit. Set TLS to 1.3 and prevent 1.2 downgrade attack to decrypt SNI
4) Encrypt DNS with DNSCRYPT and DOH (DNS over HTTPS) or DOT (DNS over TLS). If using DOH on firefox change server from cloudcuck. DOT can be blocked by ISPs.
5) Split-DNS (not available on windows I think) and Split-tunnel your apps so your traffic looks normal
6) Change from default ports if possible.
7) Spoof useragent and timezone. Some isps block UA by forcing javascript. Run something in a VM instead.
