Sandal6823

joined 2 weeks ago
[–] Sandal6823@sh.itjust.works 5 points 1 day ago (1 children)
[–] Sandal6823@sh.itjust.works 4 points 2 days ago

It's visible if I pay $500 to the admins

[–] Sandal6823@sh.itjust.works 18 points 2 days ago* (last edited 2 days ago) (6 children)

Anonymous? I know your E Mail, IP Address and will analyze all your previous posts

[–] Sandal6823@sh.itjust.works 9 points 5 days ago

1/3 club 😎🤏

[–] Sandal6823@sh.itjust.works 1 points 6 days ago

There's no way they can use the existing code, or they will be hacked very quickly again, assuming it's filled with vulnerabilities

[–] Sandal6823@sh.itjust.works 2 points 2 weeks ago

I don't know, I haven't heard of it. It obfuscates Tor behind WebRTC, which is probably more sus for (Great) Firewall than disguising as an HTTPS web server (VLESS+Vision+Reality). And I don't care about Tor network (anonymity), I'm only concerned about bypassing the blocking of regular traffic. But interesting anyways, I will keep looking at it later

[–] Sandal6823@sh.itjust.works 8 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

Of course. It's not resistant to blocking.

There are reasons why Chinese people needed to invent ShadowSocks, VLESS, uTLS, VMESS, Trojan, Reality, Vision, XHTTP, etc.

 

On a server I have a public key auth only for root account. Is there any point of logging in with a different account?