You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Dear Developers
The new method devised by Iranian guys is being the BIG trend in DPI circumvention. It fragments TLS clients hello packets and send them in random size with random timing so the DPI cannot assemble it and tag the session as white.
It would be great if it can be implemented inside the SoftEther as well to be used on Client Side (and even maybe server side for advanced scenarios)
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Dear Developers
The new method devised by Iranian guys is being the BIG trend in DPI circumvention. It fragments TLS clients hello packets and send them in random size with random timing so the DPI cannot assemble it and tag the session as white.
It would be great if it can be implemented inside the SoftEther as well to be used on Client Side (and even maybe server side for advanced scenarios)
This is the repo of this fascinating project: https://github.com/GFW-knocker/gfw_resist_tls_proxy
THIS IS THE NEXT STEP IN INTERNET FREEDOM...
Beta Was this translation helpful? Give feedback.
All reactions