Glossary
What is traffic obfuscation
Techniques that disguise VPN traffic so it looks like ordinary internet activity, used to bypass DPI in censored networks.
Traffic obfuscation is a category of technique for making VPN traffic look like something else — usually plain HTTPS — so deep packet inspection can't fingerprint it as a VPN. Useful in places where the network actively blocks VPN protocols by signature: Iran, China, Russia under TSPU, Turkey under BTK, others.
The bar keeps moving. A protocol that defeats DPI today gets fingerprinted in six months and stops working. Obfuscation in 2026 is an arms race against censors with budget and dedicated engineering teams.
The categories of obfuscation, weakest to strongest
XOR / pluggable transports
Wrap a known protocol (OpenVPN, Shadowsocks) with a simple transformation that hides the obvious markers. Worked in 2015. Easily fingerprinted now — the underlying timing and size patterns survive the wrapper. DPI looks for those.
TLS-wrapped tunnels
Wrap VPN traffic in what looks like a TLS connection. Better than XOR. Still fingerprintable: a fake TLS handshake has order-of-extensions, padding, and timing patterns that differ from a real browser handshake. Trojan and obfs4 fall in this bucket.
shadow-tls and the second wave
Improvements on TLS-wrapping that try to mimic specific browsers' fingerprints more closely. Works against simpler DPI, breaks against sophisticated DPI that tracks fingerprint drift.
Reality / domain fronting through real sites
The current strongest approach. Don't fake a TLS handshake — do an actual one, to an actual public site, with that site's actual certificate. The handshake is real, indistinguishable from any other connection to the same host. To block, the censor would need to block the host — which is something like microsoft.com or cloudflare.com.
This is what VLESS Reality does. The mechanism is described in VLESS Reality explained.
What obfuscation costs
A few things, depending on the technique:
- Latency. Real TLS handshakes take longer than raw VPN handshakes. VLESS Reality adds about 100-200 ms on initial connect. After that, a steady-state tunnel is roughly the same.
- Throughput. TLS 1.3 wrapping costs a few percent of throughput vs. raw WireGuard. Negligible on a fast connection, noticeable on a saturated one.
- CPU. More crypto on both ends. Mobile devices feel this more than desktops.
- Reliability. Obfuscated protocols have more moving parts. They fail in more ways. Modern implementations are robust but never as bulletproof as raw WireGuard on a clean network.
Obfuscation is overkill on a clean network. It's mandatory on a censored one. The right product ships both and switches automatically.
Where obfuscation isn't a substitute
Obfuscation hides the fact that you're using a VPN. It doesn't:
- Hide what you do once tunneled (that's encryption + the destination).
- Stop DNS leaks on its own — those are a separate layer.
- Help if the VPN provider logs everything.
You need encryption + obfuscation + no-logs + leak prevention. Each fixes a different problem.
Fexyn's approach
Fexyn Stealth is VLESS Reality. The default rotation tries WireGuard first; if it gets blocked or throttled, the engine falls back to Stealth. Users in known-restrictive networks (VPN for journalists, users in Russia or Turkey) can pin Stealth as the default in app settings.
Read more in VLESS Reality on Fexyn or bypass internet censorship in 2026.
Try Fexyn free for 7 days — see whether Stealth gets through your specific network.
Related terms
Try Fexyn free for 7 days
Windows app available now in Beta. WireGuard, VLESS Reality, and OpenVPN with no browsing-history, DNS-query, or traffic-content logs.
See pricing