This is unfortunate, but since 2018 many things were changed. Most of them became way worse. Previous iterations of censorship systems were very dumb, DPI were primitive and filtered very obvious things. Nowadays they are way more intelligent and it is very naive to treat them frivolously.
In 2026 is not enough to pretend that your mtg installation is a Microsoft website that sits in Amsterdam Digital Ocean location. Now your installation has to be a website that is mtg in disguise. Yes, it requires a bit more effort but this effort is probably less than rotating proxies each other day.
mtproto traffic, even with FakeTLS, has its specifics that are probably very well known by DPI systems. These specifics are not something unique but could mark an IP address as suspicious. Now let’s think:
microsoft.com? In case of some CDN, there are ECS-powered
resolvers that are very capable to return results from POV of some subnets.
If censor sees no relevant results, will they be afraid to block IP?The correct way of having this proxy is following:
In that case you will get a match of DNS and SNI in requests. As a side effect, your proxy will work with XTLS and its friends: XTLS in sniff mode ignores IP address a client wants to connect to. Instead, it reads SNI and connect to resolved address: a clever idea if user does not have a trustworthy DNS set up.
Yes, this is much longer that usual technique, and requires more effort. But this is could probably be very well automated to some reasonable extent.
Unfortunately, this is a best practice right now.
Do not also forget about other implementation, like telemt. Try everything. Use VPNs. It does not really matter which project you are going to use as long it helps you to stay connected.
March 2026.