wa-tunnel icon indicating copy to clipboard operation
wa-tunnel copied to clipboard

Alternative method

Open RihanArfan opened this issue 2 years ago • 6 comments

I find this project concept very interesting and it sparked an idea of using dialup over WhatsApp calls.

RihanArfan avatar Nov 12 '22 04:11 RihanArfan

I don't know if Android permits access to the voice audio stream like you would need but it's a thing to research further.

I had a similar implementation, all done in poor javascript (Greasemonkey). The key difference was it used images for data transfer. I used a shitty encoder/decoder that whatsapps own image compression didn't break too much. It wasn't reliable enough and got me several numbers banned so I dropped it. Also I had an issue that I couldn't force Android to think is was Online (had internet), so no apps would benefit from this, only my limited Firefox extension in my phone. Was fun tho...

ManuLinares avatar Nov 12 '22 06:11 ManuLinares

you could have literally used HTTP Injector app and type the whatsapp URL then connect, your whatsapp will never get banned or anything since you dont even need an account for this https://play.google.com/store/apps/details?id=com.evozi.injector&hl=en&gl=US&pli=1

AbdelrhmanNile avatar Nov 12 '22 12:11 AbdelrhmanNile

That sounds really interesting because you would have instant stream of data through the call, unfortunately I think Baileys doesn't provide that yet. Another way maybe we could improve WhatsApp account banning could be editing messages and not sending a new message for each data chunk, could be interesting

aleixrodriala avatar Nov 12 '22 14:11 aleixrodriala

you could have literally used HTTP Injector app and type the whatsapp URL then connect, your whatsapp will never get banned

It's true that your WhatsApp will not getting banned but this way; only does Requests spoofing (SSL/Direct) and ISP can still ban this Requests, definitely didn't work accross regions (Our Local ISP already ban this). This repo is definitely a 'New Way' compared to Request-spoofings that's been around ages.

Current Alternative Method is to use CDN or Protocol Upgrade:

  1. Use WildCard Bug-Host that behinds CloudFlare or CloudFront CDN. For example: b-whatsapp.com.
  2. Use WildCard WhatsApp Endpoint: web.web.whatsapp.com with Protocol Upgrades (Upgrade: websocket)

MC874 avatar Nov 12 '22 20:11 MC874

@aleixrodriala I'm currently in a Emirates Airplane, the TLS proxy ind HTTP injector is not working, but the DNSTT is working fine.

jonasled avatar Jul 31 '23 22:07 jonasled