1. threat model / detection surface
2. sane defaults (stealth + FEC) and config ergonomics
3. test reports from restrictive networks or lossy mobile networks
Motivation: open access to information.
Recent large-scale shutdowns (e.g., Iran’s January 2026 blackout) are exactly the kind of scenario this is built for.
Please use responsibly and within your local laws.
cschulze•1h ago
It uses QUIC/HTTP/3 as the base transport and targets high-loss/high-jitter links and DPI-heavy/restrictive networks.
What's different:
Included apps (beta): How to try: Repo: https://github.com/Christopher-Schulze/QuicFuscateDocs: https://github.com/Christopher-Schulze/QuicFuscate/blob/main...
Looking for feedback on:
Motivation: open access to information.Recent large-scale shutdowns (e.g., Iran’s January 2026 blackout) are exactly the kind of scenario this is built for.
Please use responsibly and within your local laws.