Update README.md
This commit is contained in:
@@ -16,6 +16,7 @@
|
|||||||
- [IP](#bind-on-ip)
|
- [IP](#bind-on-ip)
|
||||||
- [SOCKS](#socks45-as-upstream)
|
- [SOCKS](#socks45-as-upstream)
|
||||||
- [FAQ](#faq)
|
- [FAQ](#faq)
|
||||||
|
- [Recognizability for DPI + crawler](#recognizability-for-dpi-and-crawler)
|
||||||
- [Telegram Calls](#telegram-calls-via-mtproxy)
|
- [Telegram Calls](#telegram-calls-via-mtproxy)
|
||||||
- [DPI](#how-does-dpi-see-mtproxy-tls)
|
- [DPI](#how-does-dpi-see-mtproxy-tls)
|
||||||
- [Whitelist on Network Level](#whitelist-on-ip)
|
- [Whitelist on Network Level](#whitelist-on-ip)
|
||||||
@@ -242,6 +243,11 @@ enabled = true
|
|||||||
```
|
```
|
||||||
|
|
||||||
## FAQ
|
## FAQ
|
||||||
|
### Recognizability for DPI and crawler
|
||||||
|
Since version 1.1, we have debugged masking perfectly, for all clients without "presenting" a key,
|
||||||
|
we transparently direct traffic to the target host.
|
||||||
|
- We consider this a breakthrough aspect, which few people managed to achieve in perfect form.
|
||||||
|
- Based on this: if configured correctly, **TLS mode is completely identical to real-life handshake + communication** with a specified host.
|
||||||
### Telegram Calls via MTProxy
|
### Telegram Calls via MTProxy
|
||||||
- Telegram architecture **does NOT allow calls via MTProxy**, but only via SOCKS5, which cannot be obfuscated
|
- Telegram architecture **does NOT allow calls via MTProxy**, but only via SOCKS5, which cannot be obfuscated
|
||||||
### How does DPI see MTProxy TLS?
|
### How does DPI see MTProxy TLS?
|
||||||
|
|||||||
Reference in New Issue
Block a user