The VPN servers only differ by their protocol. So, the suggestions off the top of my head are WireGuard, OpenVPN, Outline. You'll need to read a lot and understand the UNIX terminal basics. There's a single one-click automated option I know of right now โ AmneziaVPN. It's completely free, open-source and based on WireGuard. It uses Docker to completely automate the process, which allows even your grandma to set it up quickly and painlessly. It also offers options for when the state goes hog wild and blocks connections per protocol. (It's a thing in ๐ท๐บ / ๐จ๐ณ)
๐ป Advanced VPNs. When the state goes rogue as described above, the protocols separate out into three categories:
โช๏ธ Easily detectable: all common VPN tunnel protocols โ WireGuard, OpenVPN, and so forth... They can be easily regulated by the state.
โช๏ธ Detectable: commonly obfuscated versions of the common VPN tunnel protocols, e.g. AmneziaWG (WG + garbage packet spam during handshake initiation), OpenVPN over Cloak, Shadowsocks. They require much more scrutiny to be sifted out by the censorship systems.
โช๏ธ Undetectable: while in reality not 100% safe, they're state-of-art as of September 2024 and make it past the Great Firewall of China. Most of these protocols aren't documented in English. If you live outside ๐ท๐บ, ๐จ๐ณ or ๐ฎ๐ท, you likely won't need those for at least the next decade.
Let's go over them anyway. There's no nomenclature for them, but I'll try my best to sort them:
โช๏ธ VMess
โช๏ธ VLess
โช๏ธ Naive
โช๏ธ Trojan
โช๏ธ Hysteria
The whole idea behind those ยซundetectableยป protocols is to mask your VPN traffic as HTTPS (aka browsing a random web page). It is considerably slower than any of the VPN solutions shown before, but if there isn't any other option, that's what you're left with. Recent advancements include Xray + XTLS-REALITY, which has an ability to defeat Active Probing โ previously uncontested state censorship method.
The bottom of the barrel, where everything above fails:
โช๏ธ KCP
โช๏ธ Meiru
โช๏ธ TUIC
โช๏ธ Brook
โช๏ธ Pingtunnel โ masks your traffic under ICMP! (pretty promising)
Umm, yea. You probably won't ever need those. But keep that in mind, there's no way to censor the internet.
๐ป DNS. It's a very important subject, because a DNS (Domain Name System) server is what resolves domain names into IP addresses for you, and censorship can also be applied to it.
That's what DNS does, and you can manually resolve domains using the
DNS is just like a hash-table, a dictionary of the Internet:
Chances are you are using a DNS server provided by your ISP free of charge. Let's say the state asked the ISP to block
In the best case scenario you can directly set custom DNS servers (
The solution to both of these digital rape cases is DNS over HTTPS or DNS over TLS. Now the idea is strikingly similar to that in the ยซundetectableยป VPNs. The tools are also open-source and freely available, I'll list them here (OpenWRT packages as an example):
โช๏ธ HTTPS-DNS-proxy
โช๏ธ DNSCrypt-proxy
โช๏ธ Stubby
๐ป Advanced VPNs. When the state goes rogue as described above, the protocols separate out into three categories:
โช๏ธ Easily detectable: all common VPN tunnel protocols โ WireGuard, OpenVPN, and so forth... They can be easily regulated by the state.
โช๏ธ Detectable: commonly obfuscated versions of the common VPN tunnel protocols, e.g. AmneziaWG (WG + garbage packet spam during handshake initiation), OpenVPN over Cloak, Shadowsocks. They require much more scrutiny to be sifted out by the censorship systems.
โช๏ธ Undetectable: while in reality not 100% safe, they're state-of-art as of September 2024 and make it past the Great Firewall of China. Most of these protocols aren't documented in English. If you live outside ๐ท๐บ, ๐จ๐ณ or ๐ฎ๐ท, you likely won't need those for at least the next decade.
Let's go over them anyway. There's no nomenclature for them, but I'll try my best to sort them:
โช๏ธ VMess
โช๏ธ VLess
โช๏ธ Naive
โช๏ธ Trojan
โช๏ธ Hysteria
The whole idea behind those ยซundetectableยป protocols is to mask your VPN traffic as HTTPS (aka browsing a random web page). It is considerably slower than any of the VPN solutions shown before, but if there isn't any other option, that's what you're left with. Recent advancements include Xray + XTLS-REALITY, which has an ability to defeat Active Probing โ previously uncontested state censorship method.
The bottom of the barrel, where everything above fails:
โช๏ธ KCP
โช๏ธ Meiru
โช๏ธ TUIC
โช๏ธ Brook
โช๏ธ Pingtunnel โ masks your traffic under ICMP! (pretty promising)
Umm, yea. You probably won't ever need those. But keep that in mind, there's no way to censor the internet.
๐ป DNS. It's a very important subject, because a DNS (Domain Name System) server is what resolves domain names into IP addresses for you, and censorship can also be applied to it.
That's what DNS does, and you can manually resolve domains using the
nslookup utility, for instance:C:\Windows\System32>nslookup google.com
Server: AX4200.lan
Address: fd21:4bd3:61a3::1
Non-authoritative answer:
Name: google.com
Addresses: 2a00:1450:4010:c0a::8b
2a00:1450:4010:c0a::66
2a00:1450:4010:c0a::65
2a00:1450:4010:c0a::8a
173.194.221.138
173.194.221.113
173.194.221.100
173.194.221.101
173.194.221.102
173.194.221.139
DNS is just like a hash-table, a dictionary of the Internet:
x.com โ 104.244.42.129 Agoogle.com โ 108.177.14.139 AChances are you are using a DNS server provided by your ISP free of charge. Let's say the state asked the ISP to block
shitter.com. The ISP might restrict access to that resource via DPI, but it also might resolve the domain name to localhost, or some RFC-private IPv4, 10.0.0.0/8 for instance.In the best case scenario you can directly set custom DNS servers (
1.1.1.1, 1.0.0.1 โ CloudFlare; 8.8.8.8, 8.4.4.8 โ Google) either network-wide or per device. Problem solved. However, this might not work! An ISP may very well hijack your DNS requests server-side and redirect them to their DNS server. Or, they could just block any outgoing UDP traffic on the port 53 when their servers aren't listed as an endpoint.The solution to both of these digital rape cases is DNS over HTTPS or DNS over TLS. Now the idea is strikingly similar to that in the ยซundetectableยป VPNs. The tools are also open-source and freely available, I'll list them here (OpenWRT packages as an example):
โช๏ธ HTTPS-DNS-proxy
โช๏ธ DNSCrypt-proxy
โช๏ธ Stubby
๐56๐2๐ค2โค1
Please ask your questions in the comments if you have any. Also just in case, I am not suicidal.
๐ท๐บ๐ค ๐ง๐ท
๐ท๐บ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐76โค9๐ฑ5๐2
The changes took effect on my side ~5 minutes ago. Here is the block list, insert the following domains into your split tunneling setup in order to continue using the platform:
discord.com
gateway.discord.gg
cdn.discordapp.com
discordapp.net
googleapis.com
discord-attachments-uploads-prd.storage.googleapis.com
dis.gd
discord.co
discord.design
discord.dev
discord.gg
discord.gift
discord.gifts
discord.media
discord.new
discord.store
discord.tools
discordapp.com
discordmerch.com
discordpartygames.com
discord-activities.com
discordactivities.com
discordsays.com
discordstatus.com
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ข134๐คฌ44๐9๐8๐ฑ5โค4๐3
Forwarded from ะขะะกะก
Please open Telegram to view this post
VIEW IN TELEGRAM
๐คฌ110๐ฑ9๐ข6๐4๐2๐1
Enderman
๐จ DPI bypass for Discord RTC found
This bypass in form of a zapret config chunk will unblock the voice channels for you (๐ท๐บ) in no time! Confirmed working for me and a bunch of my friends.
This bypass in form of a zapret config chunk will unblock the voice channels for you (๐ท๐บ) in no time! Confirmed working for me and a bunch of my friends.
QUIC_PORTS=50000-65535
MODE_QUIC=1
NFQWS_OPT_DESYNC_QUIC="--dpi-desync=fake,tamper --dpi-desync-any-protocol"
๐85โค20๐ค10๐4
๐ Archive.org has just been hacked
It's offline as of right now, but the message speaks for itself...
It's offline as of right now, but the message speaks for itself...
๐ข193๐ฑ21๐คฌ15๐ค5๐3
Let me preface this by saying yes, I do own YouAreAnIdiot for many years now.
A couple days ago some actual living breathing human reported the infamous joke website for phishing. This is an attack on Internet history and can be sort of compared to the Internet Archive breach. We all get attacked this often for... preserving history, but this is kind of the first time it went through for both projects.
Due to the modern nature of any and all requests being processed by AI, this caused some insignificant downtime and automatically made the service display a false scare warning about phishing.
And obviously we're left with a rhetorical question of where any kind of phishing could occur on a page with a bunch of flashing shapes and not a single POST request...
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐คฌ148๐ข14๐13๐ค6๐ฑ3
๐ Presumption of guilt
We're living in an Internet era where you get censored and banned by AI algorithms being forced to prove your innocence in an appeal with a hopefully real human being. In case with YouTube appeals are reviewed by AI as well.
It's called the presumption of guilt. Digital tyranny.
We're living in an Internet era where you get censored and banned by AI algorithms being forced to prove your innocence in an appeal with a hopefully real human being. In case with YouTube appeals are reviewed by AI as well.
It's called the presumption of guilt. Digital tyranny.
12๐คฌ125๐ข11๐7๐5๐ฑ4โค3๐ค1๐1
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ค62๐ฑ14โค9๐7
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฑ87โค13๐6๐ข3
I had an account there for quite some time. Recently I finally found time to install an actually usable application to try to consume, understand and maybe publish some content. All the previous times have been rather sporadic and happened solely because someone reminded me I actually have a TikTok account.
Now I wonder, do you guys even watch TikTok? Would you even care to watch my content there? I'm quite intrigued to explore the ยซshortยป niche, as I myself have serious troubles being concise and condensing the content to be digestible even when talking in real life. So it looks like a worthwhile venture for my sake.
Now if you would like to see me upload on TikTok, please tell me what kind of content you generally watch on the platform that happens to coincide with technology and maybe, just maybe, with what I do.
Thank you!
Please open Telegram to view this post
VIEW IN TELEGRAM
๐89โค16๐9๐ค6
๐ค33๐ฑ5๐4โค2๐2
Please open Telegram to view this post
VIEW IN TELEGRAM
โค52๐ฑ28๐ค3๐1