You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In terms of censorship resistance, there is much to be worked on. Never place all of your trust in the ability of just one censorship resistant proxy protocol. After fetching the information on the VPN network from the Tor Hidden Service, an attempt should be made using OpenVPN UDP or WireGuard UDP, then if that fails, a connection attempt should be made using Psiphon Tunnel Core, Meek and OBFS4. All three of these algorithms have their distinct advantages. Pisphon Tunnel Core is heavily based off OpenSSH although as a combination of many protocols it can break through where Meek and OBFS4 can't. The disadvantage is that it is developed by Psiphon INC for Pisphon, so authentication and connection negotiation will need to be adapted to the Bitmask certificate protocol. Meek has the advantage of pretending to be an HTTPS connection through CDN domain fronting, and OBFS4 is designed to look like random background noise on the internet. Another idea to improve efficiency of Bitmask VPN providers would be for the client to connect to as many servers as possible to split the traffic between them based on the top level domain, domain and subdomain. The client shall always connect to the fastest and least utilized VPN server, thus ensuring an even distribution of bandwidth.
The text was updated successfully, but these errors were encountered:
In terms of censorship resistance, there is much to be worked on. Never place all of your trust in the ability of just one censorship resistant proxy protocol. After fetching the information on the VPN network from the Tor Hidden Service, an attempt should be made using OpenVPN UDP or WireGuard UDP, then if that fails, a connection attempt should be made using Psiphon Tunnel Core, Meek and OBFS4. All three of these algorithms have their distinct advantages. Pisphon Tunnel Core is heavily based off OpenSSH although as a combination of many protocols it can break through where Meek and OBFS4 can't. The disadvantage is that it is developed by Psiphon INC for Pisphon, so authentication and connection negotiation will need to be adapted to the Bitmask certificate protocol. Meek has the advantage of pretending to be an HTTPS connection through CDN domain fronting, and OBFS4 is designed to look like random background noise on the internet. Another idea to improve efficiency of Bitmask VPN providers would be for the client to connect to as many servers as possible to split the traffic between them based on the top level domain, domain and subdomain. The client shall always connect to the fastest and least utilized VPN server, thus ensuring an even distribution of bandwidth.
The text was updated successfully, but these errors were encountered: