In China, locking tools have been updated -- TLS encryption is no longer working

In China, locking tools have been updated -- TLS encryption is no longer working

China's censors updated the resource-locking tools, making it much more difficult to bypass them using TLS encryption, told the community of Great Firewall Report. According to him, after 3 October, more than 100 users reported shutting down at least one of the existing tools.

In particular, the effectiveness of TLS-protocol Trojan, similar to Xray VPN tools, V2Ray TLS+Websocket, VLESS, and gRPC, has been significantly reduced. GFW appears to block certain ports that use circumvention services. However, in an attempt by the user to change the port to a free system, the entire IP address is blocked. It is noteworthy that Chinese censorship has failed to place the addresses of these tools on the "black lists" DNS and SNI, and the blocking appears to be automatic in dynamic mode, which is likely to take account of their TLS-sygnatura.

This week, GFW also reported that China had blocked a Google.com domain with all of its subsoils, while Google.cn was re-routing Google.com.hk, and the last one in mainland China was again blocked. Google, in turn, had to shut down an online translator because of censorship in China. The tightening of blocking measures was allegedly linked to political events in the country, wrote The Register: Next week, the 20th CPC Congress was opened, so official Beijing decided to move ahead.