Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥4🎃1
Please open Telegram to view this post
VIEW IN TELEGRAM
🍓2🐳1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🕊4🆒3🌭1
#log
A simple overview of AnyTLS protocol
- Any: custom 'padding' options to avoid the inspection of 'TLS in TLS' traffic; functionally similar to VLESS's 'xtls-rprx-vision' flow control algorithm, but more flexible.
- TLS: uses TLS as the basis of data transfer and helps prevent the inspection of fully encrypted traffic (like Shadowsocks or VMess) and also eliminates the dependence of device's system time when AEAD is enabled.
- One More Thing: Protocol-level regulation of 'MUX' mechanism, which maintains a connection pool and significantly reduces the connection latency.
Conclusion: another approach to evading the GFW; could be considered an upgraded low-latency Trojan protocol; shows potential to build a high-performance proxy (or Traffic Camouflage, more precise in context of users in China) tunnel with sing-box's implementation.
A simple overview of AnyTLS protocol
- Any: custom 'padding' options to avoid the inspection of 'TLS in TLS' traffic; functionally similar to VLESS's 'xtls-rprx-vision' flow control algorithm, but more flexible.
- TLS: uses TLS as the basis of data transfer and helps prevent the inspection of fully encrypted traffic (like Shadowsocks or VMess) and also eliminates the dependence of device's system time when AEAD is enabled.
- One More Thing: Protocol-level regulation of 'MUX' mechanism, which maintains a connection pool and significantly reduces the connection latency.
Conclusion: another approach to evading the GFW; could be considered an upgraded low-latency Trojan protocol; shows potential to build a high-performance proxy (or Traffic Camouflage, more precise in context of users in China) tunnel with sing-box's implementation.