(no title)
zsj | 8 years ago
I recommends the shadowsocks protocol[2] which I used in the censored network, which is hard to be detected and decrypted.
zsj | 8 years ago
I recommends the shadowsocks protocol[2] which I used in the censored network, which is hard to be detected and decrypted.
Tepix|8 years ago
CodesInChaos|8 years ago
I don't expect most VPN users to need protocol obfuscation, especially since the IPs of the VPN operator are probably well known. If you're serious about that, you either need your own server or take great effort to hide the entry points (like Tor bridges attempt to).
sr2|8 years ago
Tunnelbear are one of the few VPN providers that use a thing called obfsproxy to circumvent this kind of censorship. They call it 'Ghostbear'[0] but really it's just an obfsproxy bundling which uses the domain fronting technique.
[0] https://help.tunnelbear.com/customer/en/portal/articles/2435...
[1] https://en.wikipedia.org/wiki/Domain_fronting
pdcerb|8 years ago
Packages like STunnel/stunnel might help(available for both windows/linux).