Amnezia, which appears to be a “generic” client intended to be used with a self-hosted VPN server. It supports a variety of protocols IKEv2, OpenVPN w Shadowsocks and Wireguard and is fairly well documented and obviously open source.
It could be useful in cases where someone wants to set up their own VPN server but also wants a nice client with a unified behavior.
Looks very well designed at least from a cursory look.
It looks as if it’s meant to be used with a VPS/private VPN provider. The purpose of this seems to be aimed at people who simply can’t use commercial VPN providers because they’re all IP banned.
Hence the focus on self hosting, and DPI mitigation.
I also think if we review these things they should make up a part of
Not the main VPN page, because that has specific criteria on auditing, which is likely to never happen or be applicable to self hosted applications. They do largely use Wireguard/OpenVPN protocols underneath.
I would also like someone to test these at least in some way before we consider recommending them.
Tailscale as more aimed at people wanting to connect to their network. This has more of a focus on DPI avoidance and a server for just routing your traffic in censored areas.
I wouldn’t mind seeing a close practical experiment comparing the two.
You can think of Hiddify as an aggregator. It is simply a frontend to manage the underlying protocols with ease without delving into too much technical steps.
When it comes to China and Iran at least, protocols keep getting patched very fast, and new protocols keep getting developed at an exponential rate, so Hiddify creates VPN configs for all of the available protocols at that time, allowing the user to switch between various configs with ease.
Indeed, this method proves to be useful as many users are able to bypass restrictions, and avoid DPI.
Last I read china/iran is basically the same system.
Connecting to any random port number from the outside world on any server inside of Iran (passing the GFI) is almost always followed by a port probe on that specific port from an IP address belonging to China.
Yeah pretty much. These days people have success by hiding behind CF CDN because blocking CF would break like a quarter of the sites, and they connect via websockets or with some TLS magic I don’t fully understand, and it has a generic looking website. Basically what it does is, it appears as if the user is visiting a normal website, but in fact, is a facade while the actual user bypasses the firewall. As the site uses CF CDN, the IP is that of CF’s and origin is masked. At the moment though, China/Iran are disconnecting the user and blocking the site if a user connects for too much time
@dngray Hello Daniel! I represent the Amnezia development team. Thank you for considering posting information about us. I’ve been following the discussion closely, I want to tell you a little about what Amnezia is doing at the moment.
Amnezia is truly open source, we publish both the server and client parts to the public. Amnezia does not store or collect user data. To create a self-hosted VPN (on your own server) you do not need registration or a personal account. You just need to download the application, enter data to access the server and amnezia will create VPN on this server.
Amnezia currently supports OpenVPN, WireGuard, OpenVPN over Cloak, X-Ray, IKev2 (not yet for all platforms) AmneziaWG (WireGuard with DPI detection protection) and also split tunneling and killswith
We also have our own anti-censorship solution AmneziaFree (this is a free VPN for accessing blocked public sites for different censor regions) - Amnezia