Like, from inside China to the outside, but a bilateral solution would be fine with me, too.

  • JiminaMann@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    25 days ago

    I have a private vpn in korea, i could connect to that vpn even through china’s hotel wifi

    Could browse as per normal with abysmal internet speed

  • capc8m@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    25 days ago

    I don’t know if it will work, but it’s possible to tunnel all your traffic through a VPS using SSH and a piece of software called sshuttle.

  • solrize@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    ·
    25 days ago

    It’s possible for a while but there is a whack-a-mole game if you’re doing anything they would care about. So you will have to keep moving it around. VPS forums will have some info.

  • jagged_circle@feddit.nl
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    5
    ·
    24 days ago

    Yeah. But it kinda defeats the purpose.

    The whole point of a VPN is to mix your traffic with tons of other people’s traffic

    • Darkassassin07@lemmy.ca
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      24 days ago

      Where in the world did you get that idea?

      VPNs serve three functions:

      • add a layer of encryption so your local network operator and ISP can’t inspect your traffic, its contents and its true destination. (this is what OP is looking for)

      • make it appear to the service you are connecting to, that you are connecting from a different location than where you actually are. (for example make Netflix think you’re in a different region to show you different content)

      • provide secure access to private services that are not exposed directly to the Internet. IE securely connecting devices on seprate LAN networks together over the Internet via an encrypted tunnel. This is a VPNs true purpose and how they are primarily used in Professional/Comercial settings. (pretty much every corporation you’ve ever interacted with runs a VPN that connects its stores/warehouses/offices together)

      • sem@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        1
        ·
        24 days ago

        These are the true points, however the 4th reason to use a VPN is if you are using a fingerprint-resistant browser and lots of other people are too, it’s harder to track who is going where, since the exit IP is shared.

        If tor isn’t working for whatever reason

      • jagged_circle@feddit.nl
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        24 days ago

        If all your connections come from the same IP, and you’re the only one using that IP, then everyone knows all of your traffic is associated with you.

        If the advisory is the State, then the ISP will still he able to see all your traffic.

  • krasny@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    ·
    23 days ago

    I travelled to China in October 2023. I have a Wireshark VPN running at home with my internet provider (dinamic IP), and it worked for few hours (about 6) and they ban the IP. Resetting the router and getting a new made it work for another few hours.

    As others suggested the vpn traffic is encrypted but very easy to detect. I read about some protocols that can bypass it like shadow shocks but I didn’t have time to tinkering (it was my first time in China).

    I ended by using the service provided by 12vpx and it worked flawlessly. Someone recommended it and it is specialized in provided access in china with lots of gateways. I never had problems with this provider.

    Probably there are others that also work but that is my experience.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      ·
      23 days ago

      Be careful of some of those services as they may be using botnets.

      Tor snowflakes allow for volunteers to proxy traffic to Tor. They are hard to block since there is effectively unlimited IPs.

  • InvertedParallax@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    6
    ·
    25 days ago

    Not really, you need a license and you can host openvpn at tcp 443, but chances are they’ll try to track you down and make your life unpleasant.

    When I was there I vps bumped through Hk, that’s probably harder now.

  • Shimitar@downonthestreet.eu
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    3
    ·
    25 days ago

    It will work for a bit, then they will detect VPN traffic and just block the destination ip for good. Any ip you will use will be shortly unreachable for you, so be prepared to that.

  • nesc@lemmy.cafe
    link
    fedilink
    English
    arrow-up
    4
    ·
    25 days ago

    Yeah, you can look up how to setup hysteria2 and xray. Additionally you need to understand that firewall is different in different places, in some places like big cities you can even use plain openvpn (during daytime), in other more rural places almost everything is blocked.

    • krasny@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      ·
      23 days ago

      I couldn’t use Tor inside China, I tried but did not establish a connection. Didn’t dig into it also.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        ·
        23 days ago

        Look into Snowflakes. The snowflake proxies are hosted by people in low censorship countries with the browser extension installed. The IP addresses are all over the place so they are hard to block.