Overview
On penetrating GFW, people assume that strong encryption and random obfuscation may cheat GFW’s filtration mechanism. However, trojan implements the direct opposite: it imitates the most common protocol across the wall, HTTPS
, to trick GFW into thinking that it is HTTPS
.
The next page introduces the trojan protocol and how it hides itself from active and passive detections.
Homepage | Next Page |