Websocket transmission support to realize CDN traffic transfer (based on WebSocket over TLS) and counter GFW man-in-the-middle attacks.Socks5 / HTTP proxy automatic adaptation.Countermeasures against GFW passive detection/active detection mechanism.Transparent proxy based on TProxy (TCP / UDP).It can be run directly after decompression, no other components depend on it. The pre-compiled binary executable file can be downloaded on the Release page. supports pluggable The unplugged transport layer plug-in allows to replace TLS and use other encrypted tunnels to transmit Trojan protocol traffic. supports the use of AEAD for secondary encryption of Trojan traffic (based on Shadowsocks AEAD). supports CDN traffic transfer (based on WebSocket over TLS). uses routing modules to achieve domestic and foreign traffic distribution. Trojan-Go supports multiplexing to improve concurrency performance. Safe, efficient, lightweight and easy to use. A complete Trojan proxy implemented using Go, compatible with the original Trojan protocol and configuration file format. Under this premise, the transmission performance and ease of use should be improved as much as possible. The primary goal of Trojan-Go is to ensure transmission security and concealment. SSH or Secure Shell is a network protocol that allows data exchange through a secure channel. We will so take your connection to private and make it securely. It supports and is compatible with most functions of the Trojan-GFW version, and has expanded more practical functions. DigitalSSH is provide premium SSH and VPN account with high quality server for our premium SSH account, our server using ssd thats must will get more best perform. ![]() Trojan-Go is a complete Trojan agent implemented in Go language, compatible with the Trojan protocol and the original configuration file format. However, trojan implements the direct opposite: it imitates the most common protocol across the wall, HTTPS, to trick GFW into thinking that it is HTTPS. On penetrating GFW, people assume that strong encryption and random obfuscation may cheat GFW’s filtration mechanism. ![]() We are the GreatER Fire we ship Trojan Horses. It's an idea, an idea that imitating the most common service, to an extent that it behaves identically, could help you get across the Great FireWall permanently, without being identified ever. Trojan is not a fixed program or protocol. Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations. An unidentifiable mechanism that helps you bypass GFW.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |