Do you have such a question, who came out to learn how to overcome the wall?

Do you have such a question, who came out to learn how to overcome the wall?

What kind of scientific Internet method should I choose?

Is it to buy a VPN, an airport, or a VPS self-built ladder?

Which way is more stable, safer and simpler to use?

Hello! Hello everyone, I’m James

. How do you quickly understand what circumvention is?

How to choose VPN, airport or VPS self-built ladder?

At the same time, I also simply share my personal experience and experience for your reference.

If you are already using a stable and reliable scientific Internet service, in

order to save your time, it is recommended to close this video

. You can see that the screen has been opened in advance. Share

in the video

You can also directly click on the time stamp in the description bar of the

video or drag the progress bar of the video to jump to the content you want to know about

the link in the description bar. I also explain a little in advance for everyone.

Most of the following information comes from On the Internet,

if there is any error based on my personal understanding, please leave a message to correct me, thank you!

Of course, your likes, subscriptions, and sharing will be my

biggest motivation for continuing to share valuable videos. Thank you for your support!

The “wall” is actually the abbreviation

of the Great Firewall. The full English name is Great

Firewall. Some friends call it Kungfu.com or GFW.

The GFW is the abbreviation of Great Firewall.

The “wall” is also a censorship system created for the Internet in mainland China.

This review system started in 1998

when a user visited a website listed on the Great Wall firewall or the IP of a server. The

wall would block communication with the server, and the user would not be able to access the target website,

such as Google, YouTube, etc. , Here I want to tell you that

the gfw list we often say

is actually a blacklist. As long as it is a URL/domain name

or server IP in the blacklist, it cannot be accessed normally in mainland China.

In fact, this blacklist is what we call censorship. The purpose of a blacklist in the system

is to filter out content that does not comply with national regulations.

What we often say is supporting the wall or scientific Internet access免费翻墙工具

is to use a special method or tool

to browse the website in the GFW or use a website.

Here, we I also don’t discuss the necessity and pros and cons of its existence, etc. I

just want to “understand” it with everyone, learn how to “bypass” it,

or reduce its impact on our access to information

so that the acquisition has an effect on ourselves. Value information and improve our own awareness.

In order to help us better understand “over the wall”,

let’s first understand what is the basic principle of web browsing.

In fact, when we visit a website, we

actually visit the

corresponding IP of this website. To put it simply, the data of the website on the address server

, for example, we entered baidu.com in the browser.

In fact, we visit the baidu.com domain name, and the website data on the (corresponding) IP server is

the ladder and blog website that we usually build , Personal website

corporate website, the purpose of DNS domain name resolution

is to point the domain name to the IP address of this server.

As long as we enter the visited website or domain name request in the browser,

the DNS server of the local broadband operator

will resolve it. Get the server IP corresponding to this domain name

and visit the directory where the website data is stored,

and then the data will be exchanged.

Then we can open this website

or say, visit the data of the website on this server, and

you may also wonder why We don’t directly

enter the server’s IP to access this website data,

but enter this website or domain name to visit.

That’s because the IP address numbers are too complicated.

Websites and domain names are easier to remember than IP addresses.

So, the shorter the domain name or The website, its value is higher.

If you want to know more details or information,

you can click to watch the video tutorial of “Cheese”.

Because of the existence of the “wall”, the operator’s DNS server is actually

receiving us After the visit request, it

actually has to go through the GFW, that is, this wall

will then visit the target network.

When our target website or the service we visit is in the GFW List, it

is also the blacklist we just mentioned.

At this time, the “wall” will block the communication with the target server,

so we can’t access the website or use the service

we often say” “Overcoming the wall”

is actually to bypass the active detection or blocking of the wall through various technical means

so that we can normally or use the websites or services in the gfw list. In

short, it is the VPN or client that we have enabled locally

. After the node is added, it takes over.

At this time, we only need to enter youtube.com or google.com in the browser. The

local computer, it will pretend the request is

to visit our “source” server

or it is already abroad. The open source (program/node) that has been deployed on the VPS

is not in the gfw list because the server’s IP or the domain name we use here

is not in the gfw list, so the “wall” will allow (access) to request

foreign “source” servers , After it receives the communication request,

he will go to verify it, what to verify?

Verify the node configuration information in the client or VPN

and the server address, password, encryption method, port, etc. deployed by the server to

determine whether they are the same.

If the

server (audit) access request is reasonable after the confirmation is correct, then I will visit this

For example, the target website, this is the youtube.com that was just entered,

then visit the website directory corresponding to YouTube, and

then send the data back to our computer. At

this time, we can bypass the wall

and visit the blocked website normally or The service

is the oil pipe or Google or XXXhub that we just entered.

Of course, is it illegal to break the wall?

If you mean, the following types of circumventions must be “yes”.

Next, let’s take a look again, what is a VPN?

VPN, its full name is virtual private network

because of my English pronunciation (not good), so I don’t read it here.

In fact, it is a kind of encrypted communication technology

. Most of the application scenarios

are used for data transmission security and network anonymity

when we connect to free public WiFi

or use home networks to hide our IP address

and ensure that sensitive information on our side is not Leakage,

for example, your browsing activities, passwords, e-mail messages and other information.

In fact, from the perspective of overcoming the wall, VPN technology has many problems (spoofing). The

most serious problem is that its traffic characteristics are too obvious.

At present, the wall has been able to accurately identify

the traffic characteristics of most (using) VPN technologies and block them (spoofing).

Therefore, the VPN method is basically out of date,

especially in the special sensitive period

of the last few days. The services of VPN service providers have stopped.

In fact, some VPN providers

named the client or APP as XXXVPN for the convenience of promotion.

In fact, they use v2ray

shadowsocoks, shadowsocoksR and other open source programs to build

nodes because of their The price is good and cheap, and the simple use of

VPN has become the way most of the small partners first come into contact with the wall.

Of course, it also includes myself.

Slowly, there are also some small partners who understand VPN as the so-called “wall-climbing tool”

. The airport does not refer to the airport where we go on daily flight and flight,

but some service providers or platforms that provide special Internet access in a private way.

At the beginning, the service providers or platforms

used the clients of the shadowsocoks and shadowsocoksR protocols

. The logo is the pattern of a paper airplane.

So the airport becomes a general term for service providers that provide scientific Internet access or circumvent the wall.

As airport service providers also require larger operating

costs, most airports will set up different packages for different services.

For example, the use of traffic limits, whether to unlock the streaming media node,

whether it is a transit line, IPLC, IEPL line, etc.,

are to distinguish these (services). In layman’s

terms, the airport is similar to the mobile phone we use. Operators such as China Unicom, China Unicom, and China Telecom

will choose different operators and corresponding service packages according to their needs and budgets.

In fact, when we talk about self-built ladders or VPS nodes,

we deploy open source network tools on foreign servers.

For example, Shadowsocks, V2Ray, Trojan, Xray

and generate the corresponding server address, port, password, encryption method and other configuration information.

This is why we

always have these configuration information in the video we demonstrate. This is the reason.

Then, we The user installs a client input server that supports open source programs on the computer

Configure the information to connect

and create a local proxy.

The server and computer client software will ask each other to

provide the server address, password, encryption method, etc., and

wait for the two parties to verify that they are consistent before they can successfully connect, thereby achieving “Proxy Internet access”

More For information, please refer to the chapter on the principle of

overcoming the wall. We often say that Xray, shadowsocks, v2ray, trojan, etc.

They are all open source network tools. The program names

are developed using different programming languages. The

main implementation (method) is to use certain licenses.

I will not give an overview

here. Interested friends can understand what

we are talking about. This server side is actually our VPS.

We only need to buy VPS service providers and mention VPS to

common VPS service providers, such as bricklayers, Vultr or Google Cloud, etc.

The client is what we often call Qv2ray, Clash, v2rayN

v2rayNG, Shadowrocket, etc., and even soft routing system plug-in passwall

or SSR plus, Openclash

Hello World plug-in, etc., can be used as this client

That protocol is actually what we often call vmess, vless, trojan, shadowsocks.

They use different encrypted transmission protocols to encrypt data in

order to avoid the sniffing of the “wall”.

Before that, I will give you a principle.

Regardless of whether you use or choose any scientific method or method of surfing the Internet,

do not touch or express opinions on sensitive topics in

order to avoid risks to the greatest extent

because most of the small partners cannot circumvent

or block input methods or anti-virus software.

Or the airport collects your personal data or information.

Faced with so many airports or so many agreements, how should I choose?

Here I share my personal opinion. There are 5 points in total.

You can also refer to this form.

I will wait. I’ll talk about the first point of this form again later

. You must spend 5 minutes to write about your scientific Internet needs

or budget. Whether you look at xxxxhub, youtube

or Facebook or tikkok, netflix

will choose different according to your needs.

If you have these needs (above), VPN recommends that you not consider the

second one. If your budget is sufficient, try to choose an old airport.

There is also a website dedicated to evaluating airports, referred to as Poison

You can click to watch

the website. There are many reviews of these airports on this website.

You can refer to the

third one. Whether you buy any airport package or service, it

is recommended to buy it for a month and try it

even if you try the first one. In the month of the month, the

overall speed or service is very ok.

I don’t recommend your package here. The single renewal lasts more than three months.

After all, No one knows how the future development of the airport will be

. Fourth, we must be alert to large-scale airport promotional activities

because airports have fixed operating costs.

It is impossible to reduce package fees and cut their own profits.

After all, ordinary airports. The main thing is that you have to make a profit or make money

to provide high-quality services and stable routes

. Airports that blindly make profits and reduce their own profits.

Please consider carefully and carefully taste

point 5. If your budget is sufficient,

you can see that I mentioned it again. A

budget is actually the biggest factor that affects your choice. It is

recommended to buy more than two airports. One can be used as the main force and the

other can be used as a backup. It can also be used in case of special circumstances.

For example,

the airport I have on hand recently Now you can use both the

main power and the backup.

Here I will also tell you that

there will be bad airport service providers or the airport owner will choose to run at a certain time

and then change the website or name and re-operate.

This is why I will do the third point. It is recommended that the renewal period of a single package

should not exceed three months. This is the fundamental reason, everyone should pay attention!

Here I will briefly talk about this table.

First, if the budget of the VPN is acceptable (spoken error),

then you can also tolerate its slower speed and

the disadvantage that it cannot be used in sensitive periods. It is recommended that you use a VPN

if you are one month If the budget can be less than 60 yuan,

I suggest you go directly to the airport

because the airport has a stable and good line.

Although it has traffic restrictions, it supports more services

but it is generally difficult to get started.

After all, it will still involve some client settings

. There are also some client tutorials in my channel. If you

are interested, you can go and see the

third one. The self-built ladder is for some small partners

who actually have a certain amount of hands-on ability. You can buy a VPS (build a ladder).

However, TA has several shortcomings

. The first is that it is difficult to get started

because you have to register a domain name\buy a VPS\ and run the script. The

second one, TA takes time. More, what do you mean?

Suppose you bought a VPS and built a good node, and suddenly the node is not available,

you have to (re)build the node again, so

you spend too much time on a scientific online behavior

If you can spend money to solve things, don’t spend time.

This is one of my views.

Computer client, I suggest you use Qv2ray.

Here you just click to jump.

If you want to use VPS to build ladders

I suggest (use) the third Xray open source program

. If you still think that the airport is more suitable for your needs,

you can also go to the official airport just my socks.

You can click to understand.

Of course, I still want to

Just my socks airport, it has a shortcoming, it will cut off the

specific situation, the picture (below) has been written very clearly

if you can accept the cut off situation, you can try it

(after all, it ) Support 7 days no reason to

refund, the content of this issue of video sharing is here.

Your likes, subscriptions, and sharing sessions are

my biggest motivation to continue to share valuable videos.

Thank you for your support. I am James.

Our next issue Video, goodbye!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s