goodman

goodman

Basic Tutorial for Accessing the Internet through Scientific Means

Basic Principles of Scientific Internet Access:
The essence of the Great Firewall (GFW) is to block data interaction between the mainland and certain domain names or IP addresses. Therefore, we can bypass the firewall by using servers that are not blocked to forward our traffic to the blocked servers (referred to as scientific internet access below).

The process of scientific internet access generally consists of two stages: data encryption and data forwarding. VPN, which we commonly refer to, is a broad concept and cannot be equated with scientific internet access. For example, VPN is also required to access the internal network of certain companies or institutions. However, we only need to remember that VPN software that usually provides scientific internet access services integrates data encryption and forwarding. I do not recommend this method of scientific internet access because we have no way of knowing whether their encryption algorithms are secure. Many free VPN proxy software also have certain connections with anti-China organizations. For example, many iOS VPN software are developed by the Falun Gong organization.

A more secure way of scientific internet access is to use open-source encryption protocols to encrypt traffic locally and then send it to third-party servers for traffic forwarding. The paid platforms that provide traffic forwarding services are usually called "airports". Capable individuals can also choose to rent servers and build their own forwarding platforms. There are very detailed tutorials on GitHub that even ordinary people can understand. People like us only need to choose suitable proxy software for traffic encryption and airports. This is a tutorial for complete beginners, so I will only introduce Clash, a mainstream proxy software. Clash currently does not have an iOS version, so iOS users can use foreign IDs to download Shadowrocket (this software is paid, you can contact me for purchasing, and I will also consider giving it away as a prize).

I will share the subscription link for free, but I cannot guarantee its timeliness. It may become invalid in one or two days. After it becomes invalid, you can look for it in the comments section of the original blogger. Just find the latest comment. Since I don't have a Mac device, I will only introduce the Windows and Android versions. Mac users can search for tutorials on their own. Below are the specific tutorials:
Windows version, download link: [link]
window.png
After opening, you will see this page (it may be in English, but the usage is the same). Copy the subscription link (the subscription link is in the comments section of the original blogger. If it doesn't work, try the latest comments. If it still doesn't work, wait for new comments).
下载订阅.png
Open this software and go to "URL Download", then go to the proxy interface to select the mode and node.
延迟测试.png The node refers to the IP address. Different nodes correspond to different IPs. Introduction to modes:
Global Mode: All traffic uses the proxy.
Rule Mode: Divert traffic based on the rules in the configuration file. Some traffic uses the proxy, while others don't (recommended mode).
Direct Mode: All traffic does not use the proxy.
Script Mode: Divert traffic based on advanced scripts (not recommended for users without programming experience).
After selecting the node and mode, enable the system proxy, and then open youtube.com to test if the connection is successful. If it fails, please change the node. 系统代理.png

Android, download link: [link], extraction password: 5r0t. The usage for Android version is basically the same as the Windows version, just import the subscription, but you need to open the subscription button first before selecting the node.
5C04F932AF55E7950AF845B9E9037B63.jpg

58C62F8577E29F41A5F723FD94A03EC0.jpg

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.