Ник |
Пост |
Дата |
Qoo2S(Qoo2S) |
- Does DPI circumvention tools like GitHub - ValdikSS/GoodbyeDPI: GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows) only manipulate DNS or also other traffic like https ?
- Is technique used different in every tools ? Like -
GitHub - xvzc/SpoofDPI: A simple and fast anti-censorship tool written in Go
GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites.
GitHub - krlvm/PowerTunnel: Powerful and extensible proxy server with anti-censorship functionality
- Does it also improve privacy and security and anonymity or it’s just a Censorship bypass tool ?
- How to have a listen port in GitHub - ValdikSS/GoodbyeDPI: GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows), Instead of it using driver to proxy all traffic though it, it would like to DNS request over say 127.0.0.1:5354 which I can put in Firefox or firewall software.
| 2024-09-23T08:42:50.154Z |
manwithbox(manwithbox) |
- It definitely manipulates traffic, why only DNS?
- Most techniques are similar.
- Its not a VPN or other proxy|tunnel software. Its just a tool for modifying packets to bypass DPI checks, thats all.
- Its not a proxy. It capture network packets with divert driver, modify it and pass further. System wide.
| 2024-09-23T09:56:28.893Z |
lylipvtoey |
To some extent. By design, it prevents ISP from easily knowing the websites you visited.
Use ByeDPI to expose a proxy port. Use any encrypted DNS solution if you want to have a secure resolver. | 2024-09-23T15:02:04.587Z |
Qoo2S(Qoo2S) |
- Power Tunnel Only manipulates DNS
- Where can read about those
- So it would not hide me ?
| 2024-09-23T18:53:50.205Z |
Qoo2S(Qoo2S) | How does DPI-circumvention compare to Encrypted DNS ? | 2024-09-23T18:54:21.114Z |
manwithbox(manwithbox) |
- Search on Github, official repos.
- No hide. Network packets will be tricky configured for DPI fooling. Thats all.
| 2024-09-23T19:09:04.996Z |
Qoo2S(Qoo2S) |
- Would it make it difficult for ISP, ASNs others listening to traffic to log it ? Also DPI would be me standard out so privacy-vise it’s bad.
| 2024-09-24T07:37:10.194Z |
manwithbox(manwithbox) |
- Not at all. Its a regular traffic, according to http, https standarts. For logging it will be common, just like without fooling.
This software cant be banned, you IP either. The only way to make it useless is to change type of blocking on DPI, but you can find out a new fooling strategy and continue with restricted websites.
| 2024-09-24T08:02:13.268Z |
zzr | encrypted dns does nothing against active dpi because tls-extension like SNI is sending as plain text unless u are enable ECH but it not enough to be enabled on a client side but also needs to be enabled on server side, so yeah… but if ECH becomes popular the regulators just block entire tls1.3 like china gov did
also u can read more in this article (but u gonna need a translator)) | 2024-09-24T08:33:18.930Z |