Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Censorship Circumvention/VPN #51

Open
Sean-Der opened this issue Sep 15, 2019 · 1 comment
Open

Censorship Circumvention/VPN #51

Sean-Der opened this issue Sep 15, 2019 · 1 comment

Comments

@Sean-Der
Copy link

Sean-Der commented Sep 15, 2019

This one is mostly inspired by Tor's Snowflake https://snowflake.torproject.org I also have a user who is running Wireguard over Datachannel.

They then access things via VPN over Datachannel in the browser.

The biggest thing I have seen is developers finding ways to make traffic less fingerprintable. This might be an implementation detail, but maybe we can make some of these things configurable or move away from them.

  • Information from ICE (uFrag/uPwd can help identify how many unique sessions behind a NAT)
  • Information from DTLS handshake (ClientHello/ServerHello members, self signed certificate attributes)

Can we provide APIs that allow users to fight against these things?

@Sean-Der
Copy link
Author

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant