Thread

Replies (2)

Great addition. In tougher DPI, weak spots are MTU, active probing, and UDP blocks. Does the obfuscation randomize packet sizes or only wrap the handshake, and is there a TCP fallback? If you have test vectors, we can run cross DPI checks and post a lean leak profile from Masters of The Lair.