The first half of the title is actually very watery, because with the upgrade of the firewall, the number of blocked lists will only grow and will not end. Back to the topic, if your favorite website is blocked one day, your work mailbox cannot be accessed.
The first half of the title is actually very watery, because with the upgrade of the firewall, the number of blocked lists will only grow and will not end. Back to the topic, if your favorite website is blocked one day, your work mailbox cannot be accessed.
The first half of the title is actually very watery, because with the upgrade of the firewall, the number of blocked lists will only grow and will not end.
Back to the topic, if one day your favorite website is blocked and your work mailbox cannot be accessed, how can you use the correct posture to achieve scientific Internet access? Lei Feng has organized several tips for everyone.
1. Freegate dummies
Many people use Freegate, WuJie, fqrouter, and Shadowsocks for the first time. The first two are old Windows athletes who have been around for many years and are the new Android stars of the smart machine era. (Freegate and WuJie have also released mobile versions, but they seem to be seldom discussed. I don't know why)
The reason why such software is listed first is that it is too easy to use, and the real one-click access does not require any operation. The only thing that is inconvenient is that it takes a lot of effort to find them, because many websites that provide downloads cannot be accessed.
(To mention, Freegate's main technology is online proxy. It also has many derivative forms, such as PAC and goagent, which will not be described here)
2. hosts file
Hosts is an advanced technique for white users. Google was the preferred scientific method for surfing the Internet when it was not so popular.
Previously, smarthosts + hosts auto update software was the first choice, because it is very convenient and you don't have to worry about all kinds of software. You just need to modify a file on the device, it is also applicable to cross-platform Windows, Mac, Android, and iOS.
However, smarthost stopped updating last year. Later, there was a stable and updated hosts source. This method gradually declined and was available only when the 12306 ticket was snatched.
3. VPN
VPN users are currently the largest scientific Internet users.
The purchase of third-party VPN services, self-built VPN servers, and the use of public VPN services are prevalent. In general, most of the buyers are reluctant to make changes. Most of the self-built servers are technical personnel, and public VPN is truly a tough game player.
There is also a very large group of buyers. They are multinational companies such as Microsoft, IBM, and Dupont. When the firewall administrator is cheap, the group will complain to the Ministry of Commerce, then the Ministry of Commerce will go to the firewall supervisor again. Well, you can access the Internet normally.
Each VPN service provider has a detailed tutorial.
4. OpenVPN
OpenVPN is a safer VPN.
It is open-source and open-source, and can be used on every platform like VPN, and provides a variety of encryption combinations.
Like VPN, OpenVPN also has many third-party services built based on it. If you are willing to make the effort, you can build such a service yourself? Purchasing a third-party service may be a good choice.
OpenVPN is not prepared for scientific Internet access. Many Chinese universities use OpenVPN as a basic network connection method, but some people find OpenVPN.net (the largest OpenVPN service provider) services can be turned over and free of charge, so it is becoming popular in China.
It is rumored that the firewall can now identify and block OpenVPN.net traffic, and the NSA can identify and intercept content in OpenVPN traffic.
5. Tor
Tor is an anonymous proxy network.
If you are from Freegate, WuJie, and other services, you should know that they all use proxy servers for transit. The same is true for Tor, but its proxy server is a node of the proxy network for all volunteers who run Tor software on their own computers.
Tor is a common method for hackers and sensitive users to access the Internet. There are not many Tor nodes in China, so the speed is slow.
6. Lantern
Lantern is a trusted version of Tor.
Tor is too complex to review nodes, so many reviewers can also come in.
The core of Lantern is trust. you invite your friends to come in and set their nodes as trusted. This method is more trustworthy than Tor's unfamiliar nodes.
As mentioned above, Lantern is funded by Google.
Last
It should be emphasized that the above is just a scientific method of surfing the Internet, not an anonymous tool.
There is no anonymous network in China.