An unidentifiable mechanism that helps you bypass network restrictions.
Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations. It doesn't rely on strong encryption or obfuscation; instead it imitates the most common protocol, HTTPS, so firewalls won't see anything other than normal HTTPS traffic.
Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations. It doesn't rely on strong encryption or obfuscation; instead it imitates the most common protocol, HTTPS, so firewalls won't see anything other than normal HTTPS traffic.
To install trojan, run the following command in macOS terminal (Applications->Utilities->Terminal)
sudo port install trojan
To see what files were installed by trojan, run:
port contents trojan
To later upgrade trojan, run:
sudo port selfupdate && sudo port upgrade trojan
Reporting an issue on MacPorts Trac
The MacPorts Project uses a system called Trac to file tickets to report bugs and enhancement requests.
Though anyone may search Trac for tickets, you must have a GitHub account in order to login to Trac to create tickets.