What are the mainstream circumvention software protocols?

Published by Chris on

VPN

Friends who have heard of over the wall, must have heard the term VPN, now let’s explain what the relationship between VPN and over the wall is. VPN is an encryption method that can protect the user’s IP, location, and personal information from leakage, so VPN can be regarded as a kind of camouflage (if it is more academically speaking, it is called encryption). After disguising (encrypting) the user’s IP, location, and personal information, you can bypass the firewall to visit some websites blocked by the firewall.

Many Americans also often use VPNs, not to circumvent the wall, but to protect their own data from leakage (for example, some company employees need to work remotely, and they also use VPNs). The current mainstream VPNs are all developed by American companies. However, due to the Chinese government’s strong crackdown on encrypted traffic in recent years, most VPNs can no longer be used in China.

SS SSR

The full name of SS is Shadowsocks. It is imagined that there is a middleman who can visit the blocked website, and then tell the user the website information after visiting. Since the intermediary is not restricted by the Great Firewall, it can be used to achieve the purpose of overcoming the wall.

Academically speaking, SSR (or similar to V2Ray, Trojan) establishes a Sock5 proxy server for data transmission, and filters the data to prevent it from being recognized by the firewall, thereby achieving the effect of bypassing the wall.

Trojans

Trojan is an open source solution. For more details and operations, please refer to the official website of github. It is recommended that players who are familiar with the program explore it by themselves. If you are a programmer newbie, just read it as a story. Simple is to imitate HTTPS over the wall through Trojan.

While fooling the GFW, it is believed that strong encryption and random obfuscation may fool the GFW. However, the Trojan implements the exact opposite function: it mimics HTTPS, the most common cross-wall protocol, to trick GFW into thinking it is HTTPS.

V2Ray Xray

Simply put, V2Ray can be regarded as an evolved version of SSR, including various obfuscation and camouflage.

Due to the dispute over the licensing concept, the authors of VLESS and XTLS created the Xray project independently, which is currently a superset of V2ray, and there may be different development routes in the future.

Xray-core is a superset of v2ray-core, which includes better overall performance and a series of enhancements such as XTLS, and is fully compatible with the functions and configurations of v2ray-core.
There is only one executable file, including the function of ctl, and run is the default command
The configuration is fully compatible, and the environment variable and API should be changed to start with XRAY_
ReadV with naked protocol is open on all platforms
Provides full VLESS & Trojan XTLS support, both with ReadV
Provides various flow control modes of XTLS, the performance is unmatched!

Categories: knowledge