trojan
ja3
trojan | ja3 | |
---|---|---|
10 | 13 | |
18,528 | 2,539 | |
0.4% | 1.5% | |
0.0 | 3.9 | |
about 1 month ago | 7 months ago | |
C++ | Python | |
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
trojan
- Why HTTP/3 is eating the world
-
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic [pdf]
A fellow Aussie currently in China, a Trojan [0] server has been working fine for the last week I've been here. I've got it hosted through a VPS (smaller provider) in LA. While it's a bit of a pain to setup, reliability has been rock solid and definitely useable - my laptop is connected 24/7 and I can access the unfiltered web, including video, just fine. V2ray also supposedly works quite well, but I haven't looked into it.
[0] https://github.com/trojan-gfw/trojan
-
Working from China
Normal VPNs that you can see ads all over the place like N*rdVPN won't work, period. The correct way is to rent a few servers from different providers, make sure their ips are not blocked, and build your own V2Ray or Trojan service first. The Chinese gov will not be able to distinguish your Trojan traffic from ordinary https traffic, so the only thing that's sus to them would be the fact that all your traffic goes to one foreign ip, but I've been doing it for a few years without officials knocking on my door so yeah I think it will work for you as well. I don't take responsibility tho, do your research.
- VPNs to use while in China?
- 懂哥指导下自建梯子教程
-
So stealth is just Wireguard over TLS? Or am i missing something?
(TrojanGFW)[https://github.com/trojan-gfw/trojan] and (V2Ray)[https://github.com/v2fly/v2ray-core]. But you need your own server to do it, and some few tweaks. For first-timer it might be quite confusing to configure, but you will understand how it works in the long run. You could also tunnel your connection to your server which then forward it to protonvpn (which what I'm doing rn).
-
How to avoid ISP level virtual private nets detection?
v2ray or Trojan
- IKEv2 VPNs over censored Internet
- How to compile trojan on termux
- [BUG]Trojan流量貌似可以被运营商识别 · Issue #483 · trojan-gfw/trojan
ja3
-
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic [pdf]
This paper is nice, but it goes over some finer technical things.
So, not about the great wall, but there's projects out there, like this one https://github.com/salesforce/ja3 , which talk about how you can fingerprint fully encrypted traffic. Would be surprising if the great wall doesn't do this, when some open source firewall will.
- CircleCI says hackers stole encryption keys and customers’ source code
- JA3 – A method for fingerprinting SSL/TLS Clients
- JA3 – A method for profiling SSL/TLS Clients
- JA3 – A method for profiling SSL/TLS Clients (fingerprinting)
- Any interest in a free Black Hat Python course?
-
Privacy online just got easier with today’s Firefox release
It's sufficient to identify you since there is still all other tracking data any browser supplies as part of the HTTPs connection handshake [1].
It's also not necessary to have Mozilla be the bad actor. Anyone who has access to the information in the future is a possible bad actor as they might be able to cross-reference the allegedly "innocuous" information with some future, more-pervasive data.
---
[1] - https://github.com/salesforce/ja3
-
Can an ISP see what browser you’re using and do they see your browsing history or traffic any differently whether you’re using Chrome or Firefox?
You can, sort of, with JA3 hashes https://github.com/salesforce/ja3
-
Fighting TLS Fingerprinting with Node.js
ExtensionZ: ...
That becomes a string like "1-C,B,A-X,Y,Z", which gets hashed to a fingerprint like "ae76e4566b036882147de2f7feddad4a". That gives us a totally different unique id, with the same ciphers but in a different order.
(This is pseudocode of course - the actual fingerprints have a few more params and use the number ids for each cipher and extension instead of strings, but it's equivalent)
Here, with 3 ciphers in two different orders, we've seen two different fingerprints already. With those three ciphers alone, there's actually 6 (3 factorial) possible permutations - i.e. a client could order those ciphers any one of 6 different ways, and each ordering has a different fingerprint.
If you have 4 ciphers, there's 24 possible orderings, 6 gives 720, 10 gives 3.6 million, and this goes up very rapidly, so that for a more realistic set of 20 ciphers there's 2 * 10^18 possible orderings, each one of which gives a unique fingerprint, even before we start talking about extension order.
Does that make more sense? The full algorithm is here: https://github.com/salesforce/ja3#how-it-works
-
Show HN: I spent 1.5 years making a Chrome extension that automates any website
Not only that - enterprise bot management protections will run behavioral identification (e.g. how your mouse moves —> AI -> bot yes/no), TCP stack fingerprinting (and other devices if available e.g. gyroscope), TLS ClientHello fingerprinting (e.g. see https://github.com/salesforce/ja3), etc. Lots of very unique info in the Scraping Enthusiasts discord where lots of pro scrapers hang out.
What are some alternatives?
trojan-go - Go实现的Trojan代理,支持多路复用/路由功能/CDN中转/Shadowsocks混淆插件,多平台,无依赖。A Trojan proxy written in Go. An unidentifiable mechanism that helps you bypass GFW. https://p4gefau1t.github.io/trojan-go/
automa - A browser extension for automating your browser by connecting blocks
v2ray-core - A platform for building proxies to bypass network restrictions.
template-ts-tampermonkey - 让油猴也能用上typescript
wireguard-manager - ✔️ WireGuard-Manager is an innovative tool designed to streamline the deployment and management of WireGuard VPNs. Emphasizing user-friendliness and security, it simplifies the complexities of VPN configuration, offering a robust yet accessible solution for both personal and professional use.
hassh - HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint.
Qv2ray - :star: Linux / Windows / macOS 跨平台 V2Ray 客户端 | 支持 VMess / VLESS / SSR / Trojan / Trojan-Go / NaiveProxy / HTTP / HTTPS / SOCKS5 | 使用 C++ / Qt 开发 | 可拓展插件式设计 :star:
mobile-mba-androidapp - 2013 Measuring Broadband America Program Mobile Measurement Android Application
free - 翻墙、免费翻墙、免费科学上网、免费节点、免费梯子、免费ss/v2ray/trojan节点、蓝灯、谷歌商店、翻墙梯子
playbook - The Digital Services Playbook
naiveproxy - Make a fortune quietly
skandroid-fcc