Techniques for Circumventing Deep Packet Inspection (DPI)
Techniques for Circumventing DPI
Several techniques can be used to evade DPI. These strategies focus on confusing the DPI system or breaking its detection algorithms. Common methods include packet fragmentation, protocol obfuscation, injection of fake packets, and manipulation of Time-to-Live (TTL) values. Each method’s theory and practical application are discussed below.
https://medium.com/@anonrongbo/understanding-and-circumventing-deep-packet-inspection-dpi-ee6194bea468

-
Proton User commented
There are quite a few actively developing projects in this area:
GoodbyeDPI
https://github.com/ValdikSS/GoodbyeDPI
https://ntc.party/c/community-software/goodbyedpiZapret
https://github.com/bol-van/zapret-win-bundle?tab=readme-ov-file#quick-start
https://ntc.party/t/zapret-whats-new/61
https://ntc.party/c/community-software/zapret-antidpi/20ByeDPI
https://github.com/hufrea/byedpi
https://github.com/dovecoteescapee/ByeDPIAndroid/
https://ntc.party/c/community-software/byedpi/39Similar projects
https://github.com/ValdikSS/GoodbyeDPI?tab=readme-ov-file#similar-projectsPerhaps some of their developments will be useful...
Another interesting question is discussed in the neighboring topic
https://protonmail.uservoice.com/forums/932836-proton-vpn/suggestions/19018366-protonvpn-add-vpn-traffic-obfuscation-like-a-scr