Jump to content
Not connected, Your IP: 3.14.250.187

Leaderboard


Popular Content

Showing content with the highest reputation on 10/01/23 in Posts

  1. 2 points
    Hello! Unfortunately we will not operate in Australia because of the infamous anti-encryption law, we're sorry, but yes, we are going to seriously consider more bandwidth in New Zealand. Kind regards
  2. 1 point
    go558a83nk

    AirVPN Eddie client for tvOS 17+

    Air doesn't even have an app for iOS for reasons so I think it's nearly impossible that they'll make an app for tvOS.
  3. 1 point
    OpenSourcerer

    Mullvad's udp-over-tcp layer

    Quick note: It's not Go, it's Rust, and no, there are no crate dependencies or code samples suggesting any obfuscation going on. Where did you saw it advertised as such, though? It's basically the forward_traffic.rs file: The "glue" is process_udp_over_tcp which taps into process_tcp2udp or process_udp2tcp depending on the direction, along with a few helper functions. udp2tcp wraps a datagram into a TCP packet and simply appends the length of the datagram to the header. In the other direction tcp2udp simply writes into a UDP buffer and forwards complete datagrams to the UDP socket address specified until the TCP stream is closed.
  4. 1 point
    ss11

    Mullvad's udp-over-tcp layer

    This is because AirVPN, at its core, does not employ random sysadmins. The Core team seams to be specialized in and understand very well cryptography, network / systems security, threat models and various attacks and looks to do diligence research for every feature or option deployed. I was able to tell this by how a ticket that sent to professional support was processed. It's the main reason I'm here and referring this service. Also: can anyone here read Go lang better? Is there actually any obfuscation algorithm in that tcp2udp tool because to me it looks like a lightweight forwarder that wraps and unwraps udp in tcp transparently to the daemon listening on the UDP port. I am not saying it's not good, tools like this should be encouraged to exist as I am sure many users will find valid use cases for them, but I saw it's advertised as an "obfuscation" solution and I want to understand if it technically is (for example like Tor's obfsproxy tool).
×
×
  • Create New...