Trojan
Trojan is a proxy tool based on the HTTPS protocol, designed to covertly and efficiently bypass network censorship. Trojan uses TLS encryption to make its traffic look the same as normal HTTPS traffic, making it difficult to detect and intercept by network censorship mechanisms such as the Great Firewall (GFW).
Features of Trojan
- HTTPS protocol: Trojan uses HTTPS (HTTP based on TLS) for data transmission, so its traffic is difficult to distinguish from ordinary HTTPS traffic, effectively evading traffic analysis and detection.
- Encryption: Due to the use of TLS, Trojan's traffic is automatically protected by strong encryption to ensure data security and privacy.
- High performance: Trojan is simple and efficient in design, with excellent performance. It is suitable for various network environments and provides stable and fast proxy services.
- Multi-platform support: Trojan supports multiple operating systems such as Windows, macOS, Linux, and has corresponding implementations on both the client and the server.
- Easy to deploy: The deployment of Trojan servers is relatively simple, and is usually used in conjunction with web servers (such as Nginx) to further enhance traffic concealment.
How Trojan works
- Client configuration: The user configures the Trojan client locally and specifies information such as the server address, port, and password.
- Server configuration: Deploy the Trojan server on the remote server, configure the TLS certificate and key, set the listening port and verification password, etc.
- Connection establishment: The client and the server establish a secure connection through TLS, and all transmitted data is encrypted.
- Data transmission: Once the connection is established, all client-requested data is forwarded to the target address through the Trojan server, and the response data is also returned to the client through the Trojan server.
Application scenarios
- Bypassing network censorship: Since its traffic is disguised as ordinary HTTPS traffic, Trojan can effectively bypass various network censorship and blockades.
- Privacy protection: Through TLS encryption, Trojan ensures the privacy and security of user data during transmission.
- Efficient proxy: Suitable for network proxy needs that require high performance and stability, such as browsing the web, streaming, online games, etc.
Relationship with other proxy tools
Trojan is similar to proxy tools such as Shadowsocks and VMess, which are tools used for scientific Internet access and bypassing network censorship. Unlike these tools, Trojan pays more attention to the concealment of traffic and its similarity to regular HTTPS traffic, so it performs better in some strict network censorship environments.