I’m Hunter Perrin. I’m a software engineer.

I wrote an email service: https://port87.com

I write free software: https://github.com/sciactive

  • 6 Posts
  • 325 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle




  • It’s not completely FOSS, but I run Port87, which is quite a bit FOSS. It uses Haraka as its SMTP server, SvelteKit as its server framework, Nymph.js as its database layer, Svelte as its frontend framework, and Svelte Material UI as its UI framework.

    The ones that I created and maintain are:

    The base app layout is also available on GitHub.















  • Shadowsocks doesn’t look anything like HTTPS traffic. It looks like a bare stream cipher over TCP connections to one host with bursts of traffic. HTTPS starts off with a TLS handshake (a client hello, a server hello, the server certificate, then a cipher negotiation and key exchange) before any ciphertext is exchanged. Shadowsocks just starts blasting a ciphertext stream. Even if you run it on port 443, it looks nothing like HTTPS.

    Without any sort of cipher negotiation and key exchange, it’s obvious that it’s a stream cipher with a pre shared key, so this would be automatically suspicious. There’s also not really any plausible deniability here. If they probe your Shadowsocks host and see it running there, that’s all the proof they need that you’re breaking their rules. With a VPN, you could at least say it’s for a project, and with SSH, you could say you’re just transferring files to your own machine.