- I got a used iPhone SE as a burner phone and created a fake Twitter account, although it hasn't aged yet. What else should I do? (Apparently I'm not gonna put my HN account on my social media list)
- Looks like China's GFW is so sophisticated[0] that it seems evading it is almost impossible. Is Iran's as smart? Do they use deep packet inspection?
- Does Cloudflare Zero Trust work in Iran? Should I create a SOCKS proxy?
- How severe is the internet censorship in Iran in general?
- Not specific to Iran, but I'm a bit surprised that border cops in almost all countries have the authority to force me to unlock my phone. Dark times.
Any advice will be appreciated!
[0] https://news.ycombinator.com/item?id=44958621
u_sama•5m ago
Also the Chinese GFW is not this titanic wall, there are well known exploits that use the 443 TLS port to masquerade as popular wesbites signatures.
If you need some guidance lmk I can write a full tutorial on how XRay/V2Ray works and how to set it up, as well as a series of scripts to generate stuff :)