I don't need it at the moment (European), so I'm not updated. But awaiting someone else's answer, it is not difficult to get to grips with the matter, I suggest start with a "XRay vs Trojan" search, they are proxy servers (Trojan is GFW or GO) and visit all the links about the matter (any language, Chinese included, under several search engines), paying attention to the user's comments about the used protocols ( VMess, VLESS, XTLS, REALITY, VISION, and so on), different tools, clients, and searching again about them within a deep loop search.
> How can you trust one over another?
Even though those protocols and tools are open source, I would take it easy, read the code, search for analyses about it, trying make sure that nothing is happening in the background (my sincere apologies to the authors), and after this compile it my self. I would use a dedicated machine for it, not my main computer, and monitor the traffic. I mean, I would not install/use them without minimal checking first.
drtgh|8 months ago
> How can you trust one over another?
Even though those protocols and tools are open source, I would take it easy, read the code, search for analyses about it, trying make sure that nothing is happening in the background (my sincere apologies to the authors), and after this compile it my self. I would use a dedicated machine for it, not my main computer, and monitor the traffic. I mean, I would not install/use them without minimal checking first.