Agree. Stealth helps, but it doesn’t really defeat traffic analysis. On many restrictive networks it still gets fingerprinted or blocked.
One practical improvement would be adding support for AmneziaWG as an additional stealth-class protocol. It’s open source, WireGuard-based, and specifically designed to reduce protocol fingerprinting by altering handshake and packet characteristics. Other VPNs already use it where TLS-style obfuscation isn’t enough.
This wouldn’t replace Stealth, just complement it. Protocol diversity is one of the few defenses that actually works against active traffic analysis.
Agree. Stealth helps, but it doesn’t really defeat traffic analysis. On many restrictive networks it still gets fingerprinted or blocked.
One practical improvement would be adding support for AmneziaWG as an additional stealth-class protocol. It’s open source, WireGuard-based, and specifically designed to reduce protocol fingerprinting by altering handshake and packet characteristics. Other VPNs already use it where TLS-style obfuscation isn’t enough.
This wouldn’t replace Stealth, just complement it. Protocol diversity is one of the few defenses that actually works against active traffic analysis.