Engineering Log
Network Security / Protocol Analysis / Low-level Engineering
Deep Analysis
How censorship works. Analysis of TSPU, DPI, Active Probing and ML traffic analysis.
Protocols & Tools
Practice. Configuring XHTTP, Reality, VLESS. Network stack optimization.
Fundamentals
Network fundamentals. TCP/IP, Handshakes, Encryption. For beginners.
I noticed you enjoy reading my log. Thanks for the interest!
Subscribe to the channel to never miss new articles.
Latest Articles
XTLS Reality & JA4 Fingerprinting: 2025 Technical Analysis
Reality changed the game by eliminating the need for self-signed certificates. But in 2025, that is not enough: we analyze new attack vectors via RTT timings and post-handshake messages.
XHTTP: A Deep Technical Analysis of the New Xray Transport Protocol
XHTTP changes the game in traffic obfuscation. We analyze how the new protocol mimics CDN behavior, eliminates nested TLS handshakes, and makes data flow invisible to neural networks.
How the Internet Works: From Cables to HTTPS. A Deep Dive into the 2025 Networking Stack
Before configuring complex circumvention systems, it's essential to understand the basics. We explore how data travels across networks and why the lock in your browser is just the tip of the iceberg.
Network Protocol Architecture 2025: VLESS, XHTTP & Modern Encapsulation Methods
In this guide, we analyze how 2025 engineering solutions ensure connection stability through application-level imitation and metadata protection.
TSPU Deep Dive: Modern Traffic Classification Techniques
By late 2025, the Russian internet has fully entered the era of "smart" filtering. We analyze how modern classification algorithms manage backbone traffic.