🌭6
#vote
接到反馈报告 TEST 系列使用的 Hysteria 2 协议存在断流情况,是否有必要改为使用 VLESS REALITY / TUIC 协议? 注意:任意两种协议不能共存,否则马上触发 GFW 封锁;
接到反馈报告 TEST 系列使用的 Hysteria 2 协议存在断流情况,是否有必要改为使用 VLESS REALITY / TUIC 协议? 注意:任意两种协议不能共存,否则马上触发 GFW 封锁;
Anonymous Poll
25%
Hysteria 2
59%
VLESS REALITY
16%
TUIC
🐳1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥4🎃1
Please open Telegram to view this post
VIEW IN TELEGRAM
🍓2🐳1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🕊4🆒3🌭1
#log
A simple overview of AnyTLS protocol
- Any: custom 'padding' options to avoid the inspection of 'TLS in TLS' traffic; functionally similar to VLESS's 'xtls-rprx-vision' flow control algorithm, but more flexible.
- TLS: uses TLS as the basis of data transfer and helps prevent the inspection of fully encrypted traffic (like Shadowsocks or VMess) and also eliminates the dependence of device's system time when AEAD is enabled.
- One More Thing: Protocol-level regulation of 'MUX' mechanism, which maintains a connection pool and significantly reduces the connection latency.
Conclusion: another approach to evading the GFW; could be considered an upgraded low-latency Trojan protocol; shows potential to build a high-performance proxy (or Traffic Camouflage, more precise in context of users in China) tunnel with sing-box's implementation.
A simple overview of AnyTLS protocol
- Any: custom 'padding' options to avoid the inspection of 'TLS in TLS' traffic; functionally similar to VLESS's 'xtls-rprx-vision' flow control algorithm, but more flexible.
- TLS: uses TLS as the basis of data transfer and helps prevent the inspection of fully encrypted traffic (like Shadowsocks or VMess) and also eliminates the dependence of device's system time when AEAD is enabled.
- One More Thing: Protocol-level regulation of 'MUX' mechanism, which maintains a connection pool and significantly reduces the connection latency.
Conclusion: another approach to evading the GFW; could be considered an upgraded low-latency Trojan protocol; shows potential to build a high-performance proxy (or Traffic Camouflage, more precise in context of users in China) tunnel with sing-box's implementation.