Since Russia started to use DPI to block YouTube and other stuff, there arised a couple of solutions to fuck with it. I’ve come around this repository or, even better, the end of it’s page for many cross-platform tools that may let you avoid DPI, and I’ve used some of them to prove they are working.
https://github.com/ValdikSS/GoodbyeDPI
They don’t work for resources that are explicitely banned, it only undoes this one layer of blocking. As Russia didn’t block YT (like Twitter) that’s enough for that one usecase. It’s no private VPN or something, but it may become useful in the future.
This might prove useful if the EU goes forward with chat control and maybe DPI further down the road.
What about ShadowSocks?
Shadowsocks quite easy to detect and to ban there are exist solution out there ,such as protocols VLESS and VMESS developing by chiness dudes for bypassing chiness great firewall.
Thanks for the info
Depends. Many popular apps are banned and closely observed here and in Iran, so they’d at least try to block any kind of connection via them, whatever protocol they use, and I switched between several on these to no result. Less known solutions work, those gated behind a subscription too, and there you can still buy a server in EU to tunnel your web needs.
It also varies from carrier to carrier, so on one connection you can use something as simple as krlvm’s tunnel local app, on others you’d need a real and non-banned VPN.
For those who have time to try several links, check thia chat on TG: outlinevpnofficial They don’t work 100% of time, but having a lot of these public servers means some of them are yet to be blocked. Their app is dumb, but it’s availiable for W10, Linux (appimage) and Android I believe.
how does this goodbeyDPI exactly work? do you add it to your vpn or what ?
Found here: https://goodbyedpi.com/2024/05/27/how-does-goodbyedpi-work/
Packet Fragmentation
Packet fragmentation involves breaking down data packets into smaller fragments. DPI systems often struggle to reassemble these fragmented packets, leading to content inspection and filtering failure. GoodbyeDPI takes advantage of this weakness to bypass censorship.TCP Window Size Reduction
GoodbyeDPI also uses TCP window size reduction. By reducing the TCP window size, GoodbyeDPI limits the data transmitted in a single packet. This forces DPI systems to handle multiple smaller packets, increasing the likelihood of evading detection.DNS Spoofing
DNS spoofing is a method where GoodbyeDPI manipulates DNS responses to bypass censorship. By altering DNS responses, GoodbyeDPI can redirect traffic to its intended destination without DPI systems blocking it.DNS Spoofing ? would this help me use internet while pretending that I’m only using facebook ? (which my isp offers for free)
It’d probably make it harder to deny some packets on ISP’s side if they block specifilc thiings like torrents. To mask this traffic under the one sent to Facebook, I guess it should be a bit more specialized.
Other alternatives that work on Linux as well as Windows (I haven’t tried it on windows)
https://github.com/bol-van/zapret
I use GoodbyeDPI and Zapret with dnscrypt-proxy, it works perfectly