Lol. That was _before_ these new restrictions. And don't assume that you could setup a simple wireguard server and be done with it. No, it had to be a proper low fingerprint method (e.g., you had to hide the tls-in-tls timing pattern and do traffic shaping). Now, something like dnstt sometimes works, sometimes doesn't. You may be able to open gmail in 10 minutes if it does, and you explicitly have to block the fonts.
> it had to be a proper low fingerprint method (e.g., you had to hide the tls-in-tls timing pattern and do traffic shaping).
Can anyone recommend a good book, video course or other material to learn more about these topics?
What about SSH? Does it work? If yes, you can use some TUI browser as it would only pass updated SSH screen
sorry if it came out as patronizing, I was genuinely curious as to the difficulty of bypassing these
Dam I feel so sorry for you :( At first I thought like gp, bypass it, then I realized you don't have the privilege to bypass it and leave trails behind. It's not like using a vpn to watch netflix of another country, as netflix won't knock on your door.
I wish you all the best. Stay safe my friend.