We need to clarify a concept first: the tools we commonly use now (such as Shadowsocks, V2Ray, Sing-box) are technically classified more as "proxies" rather than traditional "VPNs," but for ease of understanding, they will be collectively referred to as circumvention protocols below.
I. Common Circumvention Protocols and Their Working Principles
Traditional VPN protocols (such as L2TP, PPTP, OpenVPN) have very distinct characteristics and are easily identified and blocked by firewalls (GFW). Therefore, current circumvention protocols mainly focus on "obfuscation."
- Shadowsocks (SS/SS-Rust):
- Principle: The most classic protocol. It uses symmetric encryption on the traffic, making the data packets look like meaningless gibberish.
-
Current Status: Native SS is easily detected by "active probing" (the GFW simulates a client sending packets to the server to see if the response matches SS characteristics), so it is now often used with AEAD encryption or as a basic tunnel.
-
VMess / VLESS (V2Ray/Xray):
- Principle: A protocol developed by the V2Ray platform. VLESS is currently the most mainstream protocol; it does not encrypt itself and must be used with TLS (the same encryption layer as banking websites).
-
Features: Extremely flexible, can be disguised as normal web traffic.
-
Trojan:
-
Principle: Mimics the most common HTTPS protocol. It disguises the proxy traffic as ordinary website visits. If someone tries to probe it, it will display a real webpage.
-
Hysteria2 / Tuic (based on UDP):
- Principle: Traditional protocols are mostly based on TCP. These protocols are based on QUIC (UDP).
-
Features: Aggressive and fast. In poor network environments (high packet loss), the speed far exceeds other protocols, but it is easily throttled by internet service providers (ISPs).
-
Reality (Currently the most recommended):
- Principle: This is a new technology developed by the Xray team. It directly borrows the TLS fingerprints and certificates of real, well-known websites like
www.microsoft.com, making the GFW believe you are actually visiting Microsoft. This is currently the most covert technology.
II. How do they bypass the Great Firewall (GFW)?
The GFW primarily intercepts traffic through the following methods, and the protocols specifically address these:
- Blocking IP/Ports: If the GFW detects abnormal traffic from a certain IP address that matches proxy characteristics, it directly blocks it.
- Bypass: Use a CDN (such as Cloudflare) or dynamic IP addresses, or use strong obfuscation to make the traffic appear like normal internet traffic.
- Deep Packet Inspection (DPI): The GFW analyzes the content of data packets, searching for characteristic patterns.
- Bypass: Strong encryption (obfuscation) or complete disguise (transforming into standard HTTPS or using certificates from well-known websites).
- Active Probing: The GFW sends specific signals like a police officer checking for suspicious activity.
- Bypass: Reality technology can achieve "no entry without invitation." If it's not your client connecting, the server will behave exactly like the legitimate website being impersonated.
III. What can you do after bypassing the GFW?
- Academic Research: Access Google Scholar, GitHub, IEEE, etc.
- Streaming Media: Watch YouTube, Netflix, Disney+, Twitch.
- Social Networks: Use Telegram, X (Twitter), Instagram, Facebook.
- Generative AI: Interact with ChatGPT, Claude, Gemini.
- Developer Needs: Download development packages, access Docker Hub, etc.
IV. Important Notes (Must Read)
- Compliance: In mainland China, establishing and using illegal channels for international internet access without the approval of the telecommunications authorities is a violation of regulations. Please only use this technology for academic research and personal learning.
- Privacy: Avoid using "free VPNs." Many free tools record your access logs and even sell your personal information.
- Payment Security: When purchasing overseas VPS, try to choose reputable vendors that support Alipay or cryptocurrency.
- Do Not Cross the Red Line: After bypassing the GFW, do not post politically sensitive remarks or participate in illegal activities on the internet. ---
V. Setup Tutorial (Using Yongge's Sing-box Script as an Example)
Sing-box is considered the next-generation all-in-one network tool (a strong competitor to V2Ray/Xray). Yongge's script is known for its simplicity and comprehensive features.
1. Preparation
- An overseas VPS: Recommended providers: BandwagonHost, Aiyun, or mainstream providers like Oracle, BandwagonHost, RackNerd, etc. The recommended operating system is Ubuntu 20.04+ or Debian 11+.
- An SSH connection tool: For Windows,
FinalShellorTermiusare recommended; Mac users can use the terminal directly.
2. Connecting to the VPS
Open your SSH tool and enter your server IP address, username (root), and password to connect.
3. Executing Yongge's Sing-box Script
Enter the following command in the terminal (copy and paste directly):
bash <(wget -qO- https://raw.githubusercontent.com/yonggekkk/sing-box-yg/main/sb.sh)
(Note: If you receive a "wget not found" error, first run apt install wget -y)
4. Script Operation Process
After running the script, a Chinese menu will appear:
1. Install the core: Select 1 to install the Sing-box main program.
2. Select the protocol:
* If you are a beginner and don't have a domain name, VLESS-Reality is strongly recommended.
* Follow the prompts; you can press Enter for the default port (usually 443).
* For the SNI target website, you can choose www.microsoft.com or www.lovelive-anime.jp.
3. Generate configuration: After installation, the script will directly display a QR code and a URL sharing link starting with vless://.
5. Connecting and Using
- Computer (Windows/macOS): Download
v2rayN(Windows) orv2rayU/v2ray-core. * Directly copy thevless://link provided by the script and click "Import from clipboard" in the software. - Select the server and set it to "Automatically configure system proxy".
- Mobile Devices:
- Android: Use
v2rayNGorNekobox. - iOS: Use
Shadowrocket(requires an overseas Apple ID for purchase) orStash. - Simply scan the QR code to use.
6. Verification
Open your browser and visit www.youtube.com. If it opens, you have successfully connected.
Summary
Currently, the most stable combination for bypassing censorship is: Mainstream overseas VPS + Sing-box/Xray + Reality protocol. This method maximizes the simulation of normal traffic, reducing the risk of connection interruptions or IP blocking. Always remember that technology should serve the purpose of acquiring knowledge and improving productivity.