2022-03-10 14:26:22 +00:00
|
|
|
Application Overview
|
|
|
|
====================
|
|
|
|
|
2022-04-08 14:29:24 +01:00
|
|
|
External Services
|
|
|
|
-----------------
|
|
|
|
|
|
|
|
In order to deploy the circumvention resources, the following providers can be used:
|
|
|
|
|
|
|
|
+------------+-----+-------+---------+----------------+-----+
|
|
|
|
| Resource | AWS | Azure | Hetzner | GandiCloud VPS | OVH |
|
|
|
|
+============+=====+=======+=========+================+=====+
|
|
|
|
| Web Proxy | ✅ | ✅ | ❌ | ❌ | ❌ |
|
|
|
|
+------------+-----+-------+---------+----------------+-----+
|
|
|
|
| Tor Bridge | ✅ | ❌ | ✅ | ✅ | ✅ |
|
|
|
|
+------------+-----+-------+---------+----------------+-----+
|
|
|
|
|
|
|
|
Circumvention resource lists can be distributed via:
|
|
|
|
|
|
|
|
* GitHub
|
|
|
|
* GitLab
|
|
|
|
* AWS S3
|