Trojan is a novel circumvention protocol. It claims to have adopted an unrecognizable mechanism to bypass GFW or any Internet blocks. It adopts a TLS-based protocol to avoid DPI recognition and QOS, and disguises the most common network protocol on the Internet.
This is a companion discussion topic for the original entry at https://henrywithu.com/complete-tutorial-of-trojan-deployment-via-docker-and-caddy/