Comment on How do you mask Wireguard traffic?
lemmyvore@feddit.nl 1 year agoKeep in mind there’s another very easy method to mess with wg traffic: breaking the connection once every 30 seconds or so. This won’t affect the vast majority of real HTTPS connections but will ruin long lived connections like ssh or streaming.
MigratingtoLemmy@lemmy.world 1 year ago
Hi, is there a point to doing this? My ISP/any advanced DPI will still know that I’m using Wireguard
saucegp@lemmy.world 1 year ago
They are talking about how whoever or whatever you are trying to get around can still mess with your wg tunnels even if you are masking them as https
MigratingtoLemmy@lemmy.world 1 year ago
How can someone else mess with the timeout of my wg tunnel if I mask them as HTTPS traffic?
saucegp@lemmy.world 1 year ago
They can break the session every 30 seconds, which would be fine for a normal web session but mess with your wg tunnel