Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Anyone know if these kinds of setups get your around the Chinese firewall? Or is this kind of traffic pretty fingerprintable?


Many VPNs get around it just fine, according to the random experiences I saw online. The issue is not technical, but legal: the traffic is fingerprintable, and that the parties involved (user, ISP) are legally required to store some of the traffic, and to make that available for authorities to check later [0]. I imagine that they handle this like how they handle other law enforcement - by applying it when they feel like. So at the end of the day, don't get caught.

[0] https://en.wikipedia.org/wiki/Cybersecurity_Law_of_the_Peopl...


Wireguard is known to be fingerprintable[1]. But at this moment it is unlikely UDP traffic will be filtered by Chinese GFW[2]. But this may change any moment.

[1]: https://lists.zx2c4.com/pipermail/wireguard/2018-September/0...

[2]: https://gfw.report/publications/usenixsecurity23/en/#sec:res...


I don't think it's true that UDP is completely unfiltered.

I tried setting up a Wireguard site-to-site tunnel for $WORKs Chinese office to access EU office- it stopped working within a day.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: