You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have heard a similar project called 西厢计划 which is trying to identify fake packet from GFW, which will stop work when the "fingerprint" of GFW changes. Finally no body keep maintaining that project anymore now. Similarly if GFW fixed those flaws you used, this tool will stop working unless you find new flaws, as you mentioned in the paper. Is there any plan for that, or this is just a research project?
The text was updated successfully, but these errors were encountered:
This is a research project. Very likely there will be no one maintaining the code. However, we are going to continue our research. One future direction is automated insertion packet discovery, which will provide abundant of bullets, unlike WestChamber project, there was only one strategy and insertion packet. Also, we will actively monitor if there's any change in the GFW's behavior, and we look forward to solving new puzzles.
I have heard a similar project called
西厢计划
which is trying to identify fake packet from GFW, which will stop work when the "fingerprint" of GFW changes. Finally no body keep maintaining that project anymore now. Similarly if GFW fixed those flaws you used, this tool will stop working unless you find new flaws, as you mentioned in the paper. Is there any plan for that, or this is just a research project?The text was updated successfully, but these errors were encountered: