Since Russia started to use DPI to block YouTube and other stuff, there arised a couple of solutions to fuck with it. I’ve come around this repository or, even better, the end of it’s page for many cross-platform tools that may let you avoid DPI, and I’ve used some of them to prove they are working.

https://github.com/ValdikSS/GoodbyeDPI

They don’t work for resources that are explicitely banned, it only undoes this one layer of blocking. As Russia didn’t block YT (like Twitter) that’s enough for that one usecase. It’s no private VPN or something, but it may become useful in the future.

  • haui@lemmy.giftedmc.com
    link
    fedilink
    English
    arrow-up
    29
    ·
    4 months ago

    This might prove useful if the EU goes forward with chat control and maybe DPI further down the road.

    • anon5621
      link
      fedilink
      English
      arrow-up
      13
      ·
      edit-2
      4 months ago

      Shadowsocks quite easy to detect and to ban there are exist solution out there ,such as protocols VLESS and VMESS developing by chiness dudes for bypassing chiness great firewall.

      More https://github.com/XTLS/Xray-core

    • andrew_bidlaw@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      4 months ago

      Depends. Many popular apps are banned and closely observed here and in Iran, so they’d at least try to block any kind of connection via them, whatever protocol they use, and I switched between several on these to no result. Less known solutions work, those gated behind a subscription too, and there you can still buy a server in EU to tunnel your web needs.

      It also varies from carrier to carrier, so on one connection you can use something as simple as krlvm’s tunnel local app, on others you’d need a real and non-banned VPN.

      For those who have time to try several links, check thia chat on TG: outlinevpnofficial They don’t work 100% of time, but having a lot of these public servers means some of them are yet to be blocked. Their app is dumb, but it’s availiable for W10, Linux (appimage) and Android I believe.

    • andrew_bidlaw@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 months ago

      Found here: https://goodbyedpi.com/2024/05/27/how-does-goodbyedpi-work/

      Packet Fragmentation
      Packet fragmentation involves breaking down data packets into smaller fragments. DPI systems often struggle to reassemble these fragmented packets, leading to content inspection and filtering failure. GoodbyeDPI takes advantage of this weakness to bypass censorship.

      TCP Window Size Reduction
      GoodbyeDPI also uses TCP window size reduction. By reducing the TCP window size, GoodbyeDPI limits the data transmitted in a single packet. This forces DPI systems to handle multiple smaller packets, increasing the likelihood of evading detection.

      DNS Spoofing
      DNS spoofing is a method where GoodbyeDPI manipulates DNS responses to bypass censorship. By altering DNS responses, GoodbyeDPI can redirect traffic to its intended destination without DPI systems blocking it.

      • zaknenou@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        4 months ago

        DNS Spoofing ? would this help me use internet while pretending that I’m only using facebook ? (which my isp offers for free)

        • andrew_bidlaw@sh.itjust.worksOP
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          4 months ago

          It’d probably make it harder to deny some packets on ISP’s side if they block specifilc thiings like torrents. To mask this traffic under the one sent to Facebook, I guess it should be a bit more specialized.