[Feature] DPI Circumvention to Bypass Throttling #277
worstperson
started this conversation in
Show and tell
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I came across something interesting, DPI circumvention tools made for oppressive regimes are also very effective for mobile carrier DPI. I'm looking at the Russian tool zapret, as it's written in C and targets routers.
https://github.com/bol-van/zapret/blob/master/docs/readme.eng.txt
The approach I show here will work for users that use VPNHotspot without a VPN(provisioning bypass?), though it is also easy to run the server in socks mode and have AdGuard pass data through it.
The specific tool I tested was tpws. It is implemented as a transparent or socks proxy, so it's easy to work with.
I changed CFLAGS -O3 to -O2 to fix a segfault, copied android-ifaddrs, and compiled as usual:
arm
aarch64
The required NAT redirection rules:
To start start the service as root:
./tpws --bind-addr=192.168.42.129 --port=8123 --split-pos=3 --uid=1:3003
The result is uncapped fast.com results, confirmed working on T-Mobile and AT&T.
Beta Was this translation helpful? Give feedback.
All reactions