Deploying Secure Proxies with Trojan-Go
Published on May 8, 2025
In this article, we explore how to deploy highly obfuscated proxy nodes using Trojan-Go, with TLS encryption and Nginx WebSocket forwarding.
Thoughts on programming, networking, and cybersecurity
Published on May 8, 2025
In this article, we explore how to deploy highly obfuscated proxy nodes using Trojan-Go, with TLS encryption and Nginx WebSocket forwarding.
Published on April 28, 2025
Learn how to create a self-managed VPN tunnel that protects your traffic from ISP surveillance and fingerprinting.