Welcome to My Tech Blog

Thoughts on programming, networking, and cybersecurity

Deploying Secure Proxies with Trojan-Go

Published on May 8, 2025

In this article, we explore how to deploy highly obfuscated proxy nodes using Trojan-Go, with TLS encryption and Nginx WebSocket forwarding.

Building a Self-Hosted VPN with Privacy in Mind

Published on April 28, 2025

Learn how to create a self-managed VPN tunnel that protects your traffic from ISP surveillance and fingerprinting.