12-29-2020 , 12:55 PM
Howdy Trojan VPN Servers and Shadowsocks to Bypass Blocks
The project github
https://github.com/trojan-gfw/trojan
https://github.com/trojan-gfw/igniter/issues
Go to the site, choose a configuration, and just copy it
https://howdy.id/trojan-vpn/
Here is a complete installation guide, it does not require installation (it took me 5 minutes to set up and add different protocols.)
https://blog.fastssh.com/vpn-protocol/ho...and-32bit/
I also added other Shadowsocks protocols that I will publish here. You can see in the screenshot
Free open source project Shadowsocks. This is a pair of programs for the server and client, working according to the following principle: the client pretends to be a SOCKS5 proxy server, receives incoming connections, encrypts them, broadcasts them to the server and releases them to the Internet there. That is, the principle of operation is similar to the SSH tunnel, but it has a lot of advantages and a couple of disadvantages compared to it. I think you will find a lot of information on the net.
In the next posts, I will publish these protocols, just add them to the program and use them. If you have any questions, write, we will discuss.
The project github
https://github.com/trojan-gfw/trojan
https://github.com/trojan-gfw/igniter/issues
Go to the site, choose a configuration, and just copy it
https://howdy.id/trojan-vpn/
Here is a complete installation guide, it does not require installation (it took me 5 minutes to set up and add different protocols.)
https://blog.fastssh.com/vpn-protocol/ho...and-32bit/
I also added other Shadowsocks protocols that I will publish here. You can see in the screenshot
Free open source project Shadowsocks. This is a pair of programs for the server and client, working according to the following principle: the client pretends to be a SOCKS5 proxy server, receives incoming connections, encrypts them, broadcasts them to the server and releases them to the Internet there. That is, the principle of operation is similar to the SSH tunnel, but it has a lot of advantages and a couple of disadvantages compared to it. I think you will find a lot of information on the net.
In the next posts, I will publish these protocols, just add them to the program and use them. If you have any questions, write, we will discuss.