Configure your VPN to mask it’s UDP packets. This should make your traffic look regular via TCP and then websites can’t tell wether you’re behind a VPN or not

Reply to this note

Please Login to reply.

Discussion

👀

Time to see if mullvad can do this. Lol.

The setup I described should be straightforward if you’re running it on Linux

I am.

Feeling stupid.

Is this also called 'obfuscation servers' by chance?

If so, my VPN doesn't seem to have the capability to mask.

I can select either TCP or UDP for transport.

I can also rent a dedicated IP, but I haven't had much connection problems.

I can also multi-hop apparently.

Man. I haven't done even a fraction of what I could/should do.

Next step set up your own VPN via a VPS lol 😂 😜🤯

I've never understood the point, how does it protect you if your identity is attached to a service provider or your own home server? Are you just bouncing your phones internet connection off your home VPN setup?

While setting up a home server-based VPN does involve bouncing off your internet connection at home, this setup still offers benefits because:

- It allows you to control and trust the server handling your data rather than relying on third-party service providers.

- Your ISP will see that you're connected to a VPN but won't be able to monitor or track what specific websites or services you're accessing.

I've definitely been thinking about this recently. I've been trying to get back into node related stuff and certain things are giving me trouble, like needing to connect to services via tor when I'm out of the house, protonvpn not having socks5. If my phone was getting routed through my home connection then when I'm surfing the web I'm still using my routers VPN setup, but I can access my services locally.

Also curious about whether this means "obfuscation servers"

No, obfuscation servers are a different concept. They refer to servers or systems that intentionally modify network traffic patterns and characteristics to make it harder for network monitoring tools