Coia Prant
Coia Prant
[中间盒识别报告](https://postimg.cc/vxnN0t1v) 已经有内鬼指出ShadowTLS已经被识别
> btw, this so-called "内鬼" is suspicious. Do you think psychological warfare is also part of GFW's work? If you don't believe it, fine, my advice is if it's true,...
> > > btw, this so-called "内鬼" is suspicious. Do you think psychological warfare is also part of GFW's work? > > > > > > If you don't believe...
Suggested Reference Paper “Parrot Is Dead”
> > > > > btw, this so-called "内鬼" is suspicious. Do you think psychological warfare is also part of GFW's work? > > > > > > > >...
> But in the other hand, ShadowTLS is designed to bypass SNI whitelist at the beginning. There are different problems encountered at this time, and there will always be trade-offs...
The difference between shadow TLS and mtproto is that shadow TLS handshakes with the real server and supports tls 1.2
https://telegra.ph/%E6%8A%A5%E5%91%8A-%E4%B8%AD%E9%97%B4%E7%9B%92%E5%A6%82%E4%BD%95%E8%AF%86%E5%88%AB%E4%BB%A3%E7%90%86%E6%B5%81%E9%87%8F-10-17 新鲜的报告和PoC 防火墙完全可以重定向TCP连接来精准识别客户端 从而对其封杀
You can use go build tags to enable specific features
Maybe consider Go generics and using specific build flags to enable specific features. Modifying the fingerprint can only be done at the lower level. TLS packets have integrity checks. If...