Hi, i’m looking for a VPN that:

  • is easily deployable via a docker-compose
  • has an Android App and it doesn’t drain the battery too much
  • hides as regular HTTPS traffic so it’s not blockable by Firewalls. (I don’t need strong censorship resistance; it just has to work in offices and hotel WiFis.)
  • Bonus: A server like caddy can also accept HTTPS traffic for some regular websites next to the VPN server.

https://github.com/TrustTunnel/TrustTunnel sounds interesting, but the PR for docker compose was closed.

Do you know something else?

  • spaghettiwestern@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    4
    ·
    5 hours ago

    I’ve run Wireguard on 443 (on my router) for exactly that purpose and never had a problem, even when my standard WG port was blocked by some businesses. I’ve since had to move to port 587 due to router conflicts and it’s worked fine so far too.

    The battery drain on Android is negligible (at least for my uses) and WG is activated by Tasker whenever my home wifi is out of range. From what I can see WG is configurable via Docker compose.

  • DecronymB
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 hour ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    HTTP Hypertext Transfer Protocol, the Web
    HTTPS HTTP over SSL
    IP Internet Protocol
    SSL Secure Sockets Layer, for transparent encryption
    TLS Transport Layer Security, supersedes SSL
    VPN Virtual Private Network
    VPS Virtual Private Server (opposed to shared hosting)

    5 acronyms in this thread; the most compressed thread commented on today has 16 acronyms.

    [Thread #171 for this comm, first seen 16th Mar 2026, 17:30] [FAQ] [Full list] [Contact] [Source code]

  • irmadlad@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    7 hours ago

    resistant to blocking?

    That’s going to be the sticky wicket right there. It is rather trivial for server admins to know what IPs go with VPNs and not. Wireguard is about the best thing on the planet right now, imho, but it will also get blocked. Occasionally, I will happen on a site that outright blocks me. If I can’t bend the site to my will, I just move on. The information on the blocked site will 9 times out of 10 be found duplicated somewhere else.

    One ‘trick’ I’ve found works fairly well is Opera. So, when I go to pay my bills online, my VPN coupled with the way I have Firefox configured, will trigger a block. I can fire up Opera, engage it’s built in VPN, still keep my local VPN connected, and have no problem accessing my bills. It’s not an elegant solution, and some users have preclusions to Opera. However, that generally works for me.

    • iopq@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 hours ago

      Wireguard is not resistant to blocking, it is plain as day if you’re using wireguard and china had blocked it for years

      • irmadlad@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 hours ago

        I sort of said as much. It really doesn’t matter, imho, what you use. As soon as that service becomes abused globally, everyone blocks it, including Tor. Any server using DPI or TLS will spot it a mile away. Now, if you have a fool proof way, than I am very much ready to be educated.

  • iopq@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 hours ago

    Use xray. I suggest the REALITY + XHTTP setup where you look like another h2 server

    You can docker compose your panel for managing your server, get a free subdomain from afraid.org and set up tls on it

    I use the v2rayng mobile app since I don’t switch servers much, I only have two