Skip to content
View anti-pigs's full-sized avatar

Block or report anti-pigs

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
anti-pigs/README.md

Censorship: because pigs love to sniff ๐Ÿฝ๐Ÿฝ

ู‡ูŠู†ุฒู„ ููŠุฏูŠูˆู‡ุงุช ู‚ุฑูŠุจ ุจุชูˆุถุญ ุงุฒุงู‰ ุชุนู…ู„ ูƒู„ ุฏู‡ ุจู†ูุณูƒ

methods employed by "ู…ุงุณุฑ" for censoring the internet

  • DPI

implementation

implementation Software-based solutions Hardware-based solutions
Advantages
  • easier
  • enable whole network( smartphone, IoT devices, gaming consoles, smart TVs ) to be tunneled
Disadvantages
  • most clients can only take over application layer traffic and lack higher system permissions
  • some applications(banking, games, windows apps) don't follow proxy rules so won't get bypassed
  • Heavy CPU utilization
  • network congestion
  • underutilization of bandwidth
  • requires a dedicated Router
  • Costly
usecase
  • lite users
  • single devices
  • on occassion
  • multiple users
  • labs
  • offices
  • special devices like Smart TVs

working states as of march 2024

  • wireguard: blocked by DPI (can be obfuscated)
  • openVPN: blocked by DPI (can be obfuscated)
  • haven't tested out any other commercial VPN
proxies
  • shadowsocks: working
  • trojan: working
  • xray: working

what you'll need?

a VPS with minimal capabilities


Clients/Software

servers


VPN

why we don't use VPNs to circumvent censorship

  • VPNs have a distinct signature therefore it's easier to get identified and blocked
  • VPN wasn't developed specifically to bypass censorship and restrictions
  • the main advantage to a VPN is end-to-end encryption which pervents interception of communication traffic during transmission and safeguards against the leakage of trade secrets, therefore it is not specifically designed to circumvent censorship

usecase

  • when you have a home network and want to access that private network using an open network like a public WiFi while encrypting the traffic, then a VPN is a good option

  • want to make a private network for all your employees because that's good practise and/or you live in a fascist state

list of VPNs (list is not exhaustive)

traditional VPNs

  • wireguard
  • openVPN

Mesh VPNs (overlay networks)

  • tailscale
  • nebula
  • netmaker
  • netbird
  • zerotier

opensource VPN service providers


proxies

why is it preferable to use proxies to circumvent censorship

  • better suited for this task
  • tend to be harder to identify and hence blocked
list of proxies (list is not exhaustive)

obfuscation tools

bypassing DPI

Caution: this DOES NOT hide the fact that you're accessing a blocked site


SSH proxy


jargon

  • Airport: platforms or websites that provide special encrypted internet access nodes

FAQ

  • ู„ูŠู‡ ุงู„ ู‚ุงุฆู…ู‡ ุฏูŠู‡ ู…ูˆุฌูˆุฏู‡ุŸ ูƒุฐุง ุณุจุจ ุงู„ุงูˆู„: ูƒู†ุช ุนุงูŠุฒ ู‚ุงุฆู…ู‡ ุชู‚ูˆู„ู‰ ุงู„ู‰ ุงู„ VPN ุงู„ู‰ ุดุบุงู„ ู ู…ุตุฑ ูˆ ู…ูƒู†ุชุด ู„ุงู‚ู‰ ูˆุงุญุฏู‡ ู‚ุฏูŠู…ู‡ ุงูˆ ุฌุฏูŠุฏู‡ ูƒู„ ุงู„ู‰ ูƒู†ุช ุจู„ุงู‚ูŠู‡ ู‡ูˆ ุดูˆูŠู‡ ุจูˆุณุชุงุช ุนู„ู‰ ุณุงุจ ุฑูŠุฏูŠุช ุจุชุงุนุช ู…ุตุฑ

ุงู„ุซุงู†ู‰: ููŠู‡ ุดูˆูŠุช ู…ุตุฑูŠูŠู† ุงุณุชุบู„ุงู„ูŠู† ูˆู„ุงุฏ ู…ุชู†ุงูƒู‡ ุจูŠู‚ุฏู…ูˆุง ุฎุฏู…ุงุช "VPN" ู…ู‚ุงุจู„ ูู„ูˆุณ ุทุจุนุง ู„ู†ุงุณ ู…ุชู‚ุฏุฑุด ุชุฏูุน ูˆ ุงู„ู†ุงุณ ู…ุชุนุฑูุด ุงู† ููŠู‡ ุจุฏูŠู„ ูˆ ุงู† ุงู„ุงุฏูˆุงุช ูƒู„ู‡ุง ู…ุฌุงู†ูŠู‡ ุนุดุงู† ูˆู„ุงุฏ ุงู„ุงุญุจู‡ ู…ุด ุจูŠุญุทูˆุง ู„ูŠู†ูƒ ุงู„ู…ุดุงุฑูŠุน/ุจุฑุงู…ุฌ ุนู„ู‰ github ุงู†ุง ุนุงุฑู ุงู† ููŠู‡ ู†ุงุณ ู…ุด ุนุงูŠุฒู‡ ุชุตุฏุน ู†ูุณู‡ุง ุจูƒู„ ุงู„ูƒู„ุงู… ุฏู‡ ู‡ู…ุง ุนุงูŠุฒูŠู† ุญุงุฌู‡ ุดูุงู„ู‡ ูˆ ุฎู„ุงุต ูˆ ู…ุณุชุนุฏูŠู† ูŠุฏูุนูˆุง ู…ู‚ุงุจู„ ุญุฏ ูŠุฏูŠุฑ ุงู„ infrastructure ุจุงู„ู†ุณุจู‡ ู„ู‡ู…, ุจุณ ุนู„ู‰ ุงู„ุงู‚ู„ ุงู„ู†ุตุงุจูŠูŠู† ู…ุด ุจูŠุญุทูˆุง ุงู„ toolchain ุงู„ู‰ ุจูŠุณุชุฎุฏู…ูˆู‡ุง ุงู„ู‰ ุจุงู„ู…ู†ุงุณุจู‡ ู‡ู…ุง ู…ูƒุชุจูˆู‡ุงุด ูˆู„ุง ู‡ู‰ ุจุชุงุนุชู‡ู…

ุงู„ุซุงู„ุซ ูˆ ุงู„ุงู‡ู… : ุงู„ุนุงู„ู… ุนู…ุงู„ ูŠุญุฏู ุนู„ู‰ ุงู„ูŠู…ูŠู† ุงู„ู…ุชุทุฑู, ูƒู„ ูŠูˆู… ุงู„ูˆุงุญุฏ ุจูŠุดูˆู ุฏูˆู„ ุฏูŠู…ูˆู‚ุฑุงุทูŠู‡ ุงู„ูŠู…ูŠู† ููŠู‡ุง ุจู‚ู‰ ู…ู‡ูŠู…ู†, ุงู„ูˆู„ุงูŠุงุช ุงู„ู…ุชุญุฏู‡ ุงูƒุชุฑ ุฏูˆู„ู‡ ุจุชู†ุงุฏู‰ ุจุงู„ freedom of speech ุญุงุจุณูŠูŠู† julian assange ูˆ ุณู†ูˆุฏูŠู† ู‡ุฑุจุงู† ู ุฑูˆุณูŠุง ูˆู„ุฃ ุงู„ูˆุงุญุฏ ุนู…ุงู„ ูŠุณู…ุน ุงู† ุชู„ููˆู†ุช ุงู„ุตุญููŠูŠู†/ุงู„ู†ุงุดุทูŠูŠู† ุงู„ุณูŠุงุณูŠู† ุนู…ุงู„ู‡ ุชุฎุชุฑู‚ ุงุฌู‡ุฒุชู‡ู… ูˆ ุงู„ุฌูŠุด ูˆ ุงู…ู† ุงู„ุฏูˆู„ู‡ ู…ุนู†ุฏู‡ู…ุด ุดุบู„ุงู†ู‡ ุบูŠุฑ ุงู†ู‡ู… ูŠู‚ุนุฏูˆุง ูŠุดุชุฑูˆุง ู…ู† ุงุณุฑุงุฆูŠู„ malware , ู ู…ู† ุงู„ู…ู‡ู… ุงู† ุฃู†ุชูŽ/ุฃู†ุชู ุชุนุฑููˆุง ุชุนู…ู„ูˆุง proxy ุณูŠุฑูุฑ ุจู†ูุณูƒ ุญุชู‰ ู„ูˆ ุจุชูุถู„ ุงู„ุฎุฏู…ุงุช ุงู„ู…ุฏููˆุนู‡

  • ุงู†ุง ุฌุฑุจุช ุงุดูˆู tutorial ูˆ ู„ู‚ูŠุชู‡ ูŠุง ุงู…ุง ุจุงู„ุตูŠู†ู‰, ุงู„ุฑูˆุณู‰ ุงูˆ ูุงุฑุณู‰ ู„ูŠู‡ุŸู„ูŠู‡ ูƒู„ ุญุงุฌู‡ ุนู„ู‰ ุงู„ github ู…ุนุธู…ู‡ุง ุจุงู„ุตูŠู†ู‰ุŸ ู„ุงู† ุงู„ู…ูˆุถูˆุน ูƒู„ู‡ ุจู…ุทูˆุฑ ุตูŠู†ู‰ ูƒุชุจ shadowsocks ุนุดุงู† ูŠู‚ุฏุฑ ูŠุชุฌุงูˆุฒ ุฌุฏุงุฑ ุงู„ุญู…ุงูŠู‡ ุงู„ุตูŠู†ู‰ ูˆู„ุงู† ุงู‰ ุญุฏ ุนุงูŠุฒ ู ุจู„ุฏ ููŠู‡ุง ุงู†ุธู…ู‡ ูุงุดูŠู‡/ุดู…ูˆู„ูŠู‡ ุจูŠุจู‚ู‰ ููŠู‡ุง ุญุฌุจ ุนู„ู‰ ุงู„ุงู†ุชุฑู†ุช ู ู…ุทูˆุฑูŠู† ู…ู† ุงู„ุจู„ุงุฏ ุฏู‰ ุณุงู‡ู…ุช ู ุชุทูˆูŠุฑ ุงู„ ecosystem ูƒู„ู‡

  • ูŠุนู†ู‰ ุงูŠู‡ ุงู„ุจุฑูˆุชูˆูƒูˆู„ ุณูŠู†ุŸ project V

  • ู„ูŠู‡ ุจุชุฐูƒุฑ ุงู„ุจุฑุงู…ุฌ/ุจุฑูˆุชูˆูƒูˆู„ ุงู„ู…ูุชูˆุญ ุงู„ู…ุตุฏุฑ ูู‚ุทุŸ ุนุดุงู† ุงู„ุดูุงููŠู‡ ูˆู„ุง ุงู„ุงู…ุงู† ูˆู„ุงู† ููŠู‡ ุญุงู„ุงุช ุจุงู„ู‡ุจู„ ุนู† ู…ู‚ุฏู…ูŠู† ุฎุฏู…ุงุช vpn ุฒู‰ nord, express ุจูŠุณู„ู…ูˆุง ุงู„ logs ู„ู„ุญูƒูˆู…ู‡ ุงู„ู‰ ุจุชุทู„ุจ ุจูŠุงู†ุงุช ุงู„ู…ุณุชุฎุฏู…ูŠู†, ุตุญูŠุญ ุงู†ุช ุจุฑุถูˆุง ููŠู‡ ุฎุทุฑ ู…ู† ุงู† cloud provider ูŠุนู…ู„ ู†ูุณ ุงู„ุญุฑูƒู‡ ุจุณ ุนู„ู‰ ุงู„ุงู‚ู„ ุงู†ุช ุงู„ู‰ ุนุงุฑู ุงู„ุจู†ูŠู‡ ุงู„ุชุญุชูŠู‡ ุจุชุงุนุชูƒ ูˆ ุชู‚ุฏุฑ ุชุชูƒูŠู ู…ุน ุงู„ุจูŠุฆู‡ ู…ุด ู…ุฌุฑุฏ ู…ุณุชุฎุฏู… passive

  • ู„ูˆ ุงู„ guide ุฏู‰ ู„ู„ู…ุตุฑูŠูŠู† ู„ูŠู‡ ููŠู‡ ูƒู„ุงู… ุจุงู„ุงู†ุฌู„ูŠุฒู‰ุŸ ููŠู‡ ุจุนุถ ุงู„ูƒู„ู…ุงุช ุงู„ุฎุงุตู‡ ุจุงู„ุชูƒู†ูˆู„ูˆุฌูŠุง ู…ู„ู‡ุงุด ู…ู‚ุงุจู„ ู ุงู„ุนุฑุจู‰ ูˆู„ุฃ ุงู„ุงู†ุฌู„ูŠุฒู‰ ู„ุบู‡ ุงู„ู†ุช ุจุณ..

Popular repositories Loading

  1. anti-pigs anti-pigs Public

    censorship circumvention tools for egyptian residents

    5