xjkj8

xjkj8

This site provides technical education on computer networking.

When Tim Berners-Lee invented the world wide web in 1990, he emphasized universal access to information. He wrote: "The WorldWideWeb (W3) is a wide-area hypermedia information retrieval initiative aiming to give universal access to a large universe of documents." This site focuses on networking technologies which facilitate that universal access.

You can reach this site on the Tor network at:

http://k3oxb4lrs7l3vt2lhy3w5ilrrqzeltdxjyne3t7sctmnyu3ypwpuszid.onion

1. Articles you can read on this site

1.1. XHTTP. Xray is a networking utility for building encrypted tunnels between a proxy client and a proxy server. The Xray XHTTP transport splits the upload channel and the download channel. In this example, the upload arrives at port 443, and the download uses port 8443.

1.2. Mekya. V2ray is a powerful and privacy-enhancing proxy tool. It supports multiple tunneling protocols and can bypass the censorship of many countries. Traffic is fully encrypted, securing your Internet use over and above regular HTTPS encryption. V2ray's Meek protocol tunnels your traffic as ordinary HTTP requests and response. Mekya improves performance over Meek by using the mkcp protocol instead of sequential transmission of HTTP requests and responses.

1.3. XHTTP + HTTP/3 + CDN. XHTTP was previously known as splitHTTP. HTTP/3 uses udp/443 by default, but Cloudflare cannot support HTTP/3 between Cloudflare and the origin. Therefore the Xray client transmits HTTP/3 over udp/443, while the Xray server receives HTTP/2 or HTTP/1.1.

1.4. WireGuard + udp2raw. The use case here is you are in an environment hostile to WireGuard or to UDP connections in general. The strategy is to use an obfuscated connection. udp2raw creates a tunnel through which UDP traffic passes as encrypted UDP, FakeTCP, or ICMP. This allows you to carry on working in the face of blocking, throttling, packet loss, or QoS problems.

1.5. Tor + Shadowsocks-Rust pre-proxy. The scenario in this article is that you want to reach the Tor network, but a restrictive firewall is preventing you from connecting. You decide to set up a Shadowsocks-Rust pre-proxy so that Tor Browser can connect through it to the Tor network. The instructions that follow are for a Linux server and a Windows PC client.

1.6. Nginx in front of VLESS XHTTP. In this article, Nginx sits in front of Xray, which implements the VLESS protocol with XHTTP transport. Transport Layer Security (TLS) is processed by Nginx before traffic reaches Xray. This makes your proxy server resemble a realistic web server. The Nginx and Xray configurations are almost entirely copied from lxhao61/integrated-examples. This article fleshes out the practical details of how to install and configure the software.

1.7. Create a Tor WebTunnel bridge. To assist users behind restrictive firewalls, the Tor Project has developed pluggable transports. These obfuscate the connection between the user and the Tor network. WebTunnel is one such pluggable transport. It wraps the payload in a WebSocket-like HTTPS connection. This gives the impression that the user is simply browsing the web. This article shows you how to set up a Tor WebTunnel bridge, either for public distribution to users behind firewalls, or for your own private use.

1.8. Beginner's guide to overcoming Internet censorship. If your government has suddenly started censoring your Internet access, here are some methods you can try. The method you use to overcome Internet censorship depends on the method your government is using to block you. This page starts with the most primitive blocking methods and moves on to the most sophisticated.

1.9. Censorship circumvention for iOS (iPhone) and iPadOS (iPad). This page introduces some possible solutions for penetrating restrictive firewalls from iOS (iPhone) or iPadOS (iPad) devices. A word of caution before you begin. Mobile devices are inherently insecure. The phone company knows exactly who you are. Every cell tower in the neighborhood knows exactly where you are. Make sure you stay safe. Exercise judgment over what you do on a mobile device. In certain countries, governments have banned some of the apps on this page. They do not appear in your App Store. To get around this ban, you may have to change the region of your Apple ID account, not just the region settings on your device.

1.10. How to change where Google thinks you are. A frequently asked question is: "I'm using a VPN. How come Google still knows where I am?" Believe it or not, Google will publicly tell you how it knows. It has a whole support page on the subject. The explanation begins: "When you use Google, like with Maps, Search or Google Assistant, your current location is used to give you more helpful results." It goes on to give precise information about how Google knows your location. What follows are some tips on how to wipe your old location in Google and establish your new location.

2. How to reach the onion site

2.1. Download and install the Tor Browser from the Tor Project web site at https://www.torproject.org. If you cannot reach the Tor Project website, there are various alternatives. You can use one of the official mirrors hosted by the EFF or the Calyx Institute. You can send an email to [email protected], and in the body of the message simply write windows, osx, or linux, depending on your operating system. You can chat with the bot @GetTor_Bot on Telegram. Or as a last resort you can send an email to [email protected].

2.2. If you need instructions on how to use the Tor Browser, read the Tor Browser manual. In some environments, you will need to use one of the mirrors mentioned above to reach the manual, since it is hosted on the Tor Project web site.

2.3. If you are in a country such as China or Russia, and if Tor Browser's automated Connection Assist feature does not connect you to the Tor network, you may be able to reach the Tor network by manually configuring your connection to use a bridge.

2.4. If the publicly distributed bridges are all blocked in your environment, you may be able to connect through your own private bridge. To set up your own obfs4 bridge, follow the instructions on the Tor Project web site. To set up your own WebTunnel bridge, follow the instructions in the article Create a Tor WebTunnel bridge. In either case, you can make the bridge private by specifying BridgeDistribution none in your /etc/tor/torrc file.

2.5. An article elsewhere on this site introduces the possibility of using Tor with a Shadowsocks-Rust pre-proxy.

2.6. Once you have connected to the Tor network, you can visit the .onion version of this site. The .onion URL allows you to access the site if your ISP bans the clearnet URL. Copy and paste the URL below into your Tor Browser address bar:

http://k3oxb4lrs7l3vt2lhy3w5ilrrqzeltdxjyne3t7sctmnyu3ypwpuszid.onion