| ▲ | imcritic 4 hours ago | ||||||||||||||||||||||||||||
I wish they would improve wireguard-the-protocol as well: wireguard doesn't stand a chance against gov/isp blocks. | |||||||||||||||||||||||||||||
| ▲ | razighter777 4 hours ago | parent | next [-] | ||||||||||||||||||||||||||||
That's more of a job for an encapsulating protocol. (shadowsocks or similar) Wireguard isn't designed to be obfuscating alone. It's just a simple l3 udp tunnel with a minimal attack surface. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | holysoles an hour ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
The mullvad apps do offer obfuscation options (shadowsocks, etc) but i agree it would be nice if something was baked into wireguard itself. I recently went through setting up shadowsocks over wg for my homelab and it was a good bit of effort | |||||||||||||||||||||||||||||
| ▲ | tvshtr 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
There are forks of wg because of this. Like amnezia-wg | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | DANmode 3 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
Known Limitations WireGuard is a protocol that, like all protocols, makes necessary trade-offs. This page summarizes known limitations due to these trade-offs. Deep Packet Inspection WireGuard does not focus on obfuscation. Obfuscation, rather, should happen at a layer above WireGuard, with WireGuard focused on providing solid crypto with a simple implementation. It is quite possible to plug in various forms of obfuscation, however. tl;dr Read the docs. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | tetris11 3 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
Anywhere I can read more about this? | |||||||||||||||||||||||||||||