Overview

On penetrating GFW, people assume that strong encryption and random obfuscation may cheat GFW’s filtration mechanism. However, trojan implements the direct opposite: it imitates the most common protocol across the wall, HTTPS, to trick GFW into thinking that it is HTTPS.

The next page introduces the trojan protocol and how it hides itself from active and passive detections.

Homepage Next Page