<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[The Un-Official Proxomitron Forum - General Discussion]]></title>
		<link>https://www.prxbx.com/forums/</link>
		<description><![CDATA[The Un-Official Proxomitron Forum - https://www.prxbx.com/forums]]></description>
		<pubDate>Wed, 22 Apr 2026 04:52:46 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21114#pid21114</link>
			<pubDate>Tue, 10 Feb 2026 22:52:19 -0500</pubDate>
			<dc:creator><![CDATA[DullFace]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21114#pid21114</guid>
			<description><![CDATA[<blockquote><cite><span> (Jun. 02, 2025 05:41 AM)</span>amy Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=21105#pid21105" class="quick_jump">&nbsp;</a></cite>The next release of Proxomitron Reborn should be within this week</blockquote>
So, how its going?]]></description>
			<content:encoded><![CDATA[<blockquote><cite><span> (Jun. 02, 2025 05:41 AM)</span>amy Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=21105#pid21105" class="quick_jump">&nbsp;</a></cite>The next release of Proxomitron Reborn should be within this week</blockquote>
So, how its going?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21109#pid21109</link>
			<pubDate>Mon, 04 Aug 2025 18:18:16 -0400</pubDate>
			<dc:creator><![CDATA[mizzmona]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21109#pid21109</guid>
			<description><![CDATA[Thank you, Amy. Do you need help testing?]]></description>
			<content:encoded><![CDATA[Thank you, Amy. Do you need help testing?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21105#pid21105</link>
			<pubDate>Mon, 02 Jun 2025 01:41:49 -0400</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21105#pid21105</guid>
			<description><![CDATA[Today is an important day in Proxomitron history; and we should remember that it was not me, but Scott, who started it all. I am simply doing my part to keep it alive, as I use it myself.<br />
<br />
The next release of Proxomitron Reborn should be within this week, if testing proves to be successful; this post was made through it. It has the crucial new feature, which I have named ProxTLS, that allows for a huge flexibility in configuration to behave nearly 100% identical to how mainstream browsers handle TLS negotiation.]]></description>
			<content:encoded><![CDATA[Today is an important day in Proxomitron history; and we should remember that it was not me, but Scott, who started it all. I am simply doing my part to keep it alive, as I use it myself.<br />
<br />
The next release of Proxomitron Reborn should be within this week, if testing proves to be successful; this post was made through it. It has the crucial new feature, which I have named ProxTLS, that allows for a huge flexibility in configuration to behave nearly 100% identical to how mainstream browsers handle TLS negotiation.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21104#pid21104</link>
			<pubDate>Wed, 14 May 2025 21:48:34 -0400</pubDate>
			<dc:creator><![CDATA[Anno Domini]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21104#pid21104</guid>
			<description><![CDATA[Thank you for all that you're doing, and for keeping Proxomitron alive, Amy. You are a true HERO in every sense of the word.]]></description>
			<content:encoded><![CDATA[Thank you for all that you're doing, and for keeping Proxomitron alive, Amy. You are a true HERO in every sense of the word.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21103#pid21103</link>
			<pubDate>Mon, 21 Apr 2025 03:52:46 -0400</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21103#pid21103</guid>
			<description><![CDATA[<blockquote><cite><span> (Sep. 26, 2024 05:01 AM)</span>amy Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=21063#pid21063" class="quick_jump">&nbsp;</a></cite>Almost 2 years later and there is some public(!) discussions about this in OpenSSL itself; making it look more like a browser is becoming important:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>https://github.com/openssl/openssl/issues/19220</code></div></div>
<br />
I have been working on my own towards the same goal with Proxomitron Reborn, so it's not clear who will get there first;</blockquote>
It seems like the answer to that question is going to be me <img src="images/smilies/wink.gif" style="vertical-align: middle;" border="0" alt="Wink" title="Wink" /><br />
<br />
Here's a "preview" of what's coming:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>ProxTLS cipher TLSv1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (128 bits) [FF11550]<br />
HTTP/1.1 200 OK<br />
Date: Mon, 21 Apr 2025 07:51:26 GMT<br />
Content-Type: text/plain;charset=UTF-8<br />
Content-Length: 100<br />
Connection: keep-alive<br />
X-Powered-By: Express<br />
content-encoding: gzip<br />
vary: Accept-Encoding<br />
CF-Cache-Status: BYPASS<br />
Accept-Ranges: bytes<br />
Server: cloudflare<br />
CF-RAY: xxxxxxxxxxxxxxxx-xxx</code></div></div>
<br />
Of the 3 sites mentioned in the original post, 2 of them no longer block with CAPTCHA, and it shouldn't be long before the third one also gets conquered. It's been fun playing with this new feature I've added and am currently testing - many sites that I've been tripped by CF on just work now. The next release of Proxomitron Reborn, which will be soon (providing other things in my life don't get in the way), should overcome this hurdle of browser discrimination and provide enough flexibility to keep fighting back for a while longer!<br />
<br />
"Nothing ever worth doing was easy."]]></description>
			<content:encoded><![CDATA[<blockquote><cite><span> (Sep. 26, 2024 05:01 AM)</span>amy Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=21063#pid21063" class="quick_jump">&nbsp;</a></cite>Almost 2 years later and there is some public(!) discussions about this in OpenSSL itself; making it look more like a browser is becoming important:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>https://github.com/openssl/openssl/issues/19220</code></div></div>
<br />
I have been working on my own towards the same goal with Proxomitron Reborn, so it's not clear who will get there first;</blockquote>
It seems like the answer to that question is going to be me <img src="images/smilies/wink.gif" style="vertical-align: middle;" border="0" alt="Wink" title="Wink" /><br />
<br />
Here's a "preview" of what's coming:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>ProxTLS cipher TLSv1.2 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (128 bits) [FF11550]<br />
HTTP/1.1 200 OK<br />
Date: Mon, 21 Apr 2025 07:51:26 GMT<br />
Content-Type: text/plain;charset=UTF-8<br />
Content-Length: 100<br />
Connection: keep-alive<br />
X-Powered-By: Express<br />
content-encoding: gzip<br />
vary: Accept-Encoding<br />
CF-Cache-Status: BYPASS<br />
Accept-Ranges: bytes<br />
Server: cloudflare<br />
CF-RAY: xxxxxxxxxxxxxxxx-xxx</code></div></div>
<br />
Of the 3 sites mentioned in the original post, 2 of them no longer block with CAPTCHA, and it shouldn't be long before the third one also gets conquered. It's been fun playing with this new feature I've added and am currently testing - many sites that I've been tripped by CF on just work now. The next release of Proxomitron Reborn, which will be soon (providing other things in my life don't get in the way), should overcome this hurdle of browser discrimination and provide enough flexibility to keep fighting back for a while longer!<br />
<br />
"Nothing ever worth doing was easy."]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Proxydomo, created from proximodo's source]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2207&amp;pid=21069#pid21069</link>
			<pubDate>Sat, 23 Nov 2024 05:04:12 -0500</pubDate>
			<dc:creator><![CDATA[prxymouse]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2207&amp;pid=21069#pid21069</guid>
			<description><![CDATA[Still active, new version v2.4 a few days ago. <a href="https://github.com/amate/Proxydomo/" target="_blank">https://github.com/amate/Proxydomo/</a> (see releases)]]></description>
			<content:encoded><![CDATA[Still active, new version v2.4 a few days ago. <a href="https://github.com/amate/Proxydomo/" target="_blank">https://github.com/amate/Proxydomo/</a> (see releases)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Suggestion]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3135&amp;pid=21068#pid21068</link>
			<pubDate>Wed, 16 Oct 2024 12:13:30 -0400</pubDate>
			<dc:creator><![CDATA[Anno Domini]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3135&amp;pid=21068#pid21068</guid>
			<description><![CDATA[Big salute to all the great members of this forum, and especially to those who help answer questions and are keeping Proxomitron alive and current. I don't know if this suggestion will make it easier or not, but I was wondering if it would help to have just ONE POST here (that you cannot reply and add comments to) with all the latest files required to install Proxomitron. In other words, right now it seems like there are different links to get different files, whereas it might be more efficent to have one page with orderly instructions that is always updated with the latest files to run Proxomitron, which people can follow. It might be less confusing for new users and long time users alike. Just a suggestion.]]></description>
			<content:encoded><![CDATA[Big salute to all the great members of this forum, and especially to those who help answer questions and are keeping Proxomitron alive and current. I don't know if this suggestion will make it easier or not, but I was wondering if it would help to have just ONE POST here (that you cannot reply and add comments to) with all the latest files required to install Proxomitron. In other words, right now it seems like there are different links to get different files, whereas it might be more efficent to have one page with orderly instructions that is always updated with the latest files to run Proxomitron, which people can follow. It might be less confusing for new users and long time users alike. Just a suggestion.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21063#pid21063</link>
			<pubDate>Thu, 26 Sep 2024 01:01:57 -0400</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=21063#pid21063</guid>
			<description><![CDATA[Almost 2 years later and there is some public(!) discussions about this in OpenSSL itself; making it look more like a browser is becoming important:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>https://github.com/openssl/openssl/issues/19220</code></div></div>
<br />
I have been working on my own towards the same goal with Proxomitron Reborn, so it's not clear who will get there first; but the number of sites I've been encountering that do this sort of client discrimination has risen sharply within the past few months, so this has motivated me quite a lot more! No doubt many others are also fighting back.]]></description>
			<content:encoded><![CDATA[Almost 2 years later and there is some public(!) discussions about this in OpenSSL itself; making it look more like a browser is becoming important:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>https://github.com/openssl/openssl/issues/19220</code></div></div>
<br />
I have been working on my own towards the same goal with Proxomitron Reborn, so it's not clear who will get there first; but the number of sites I've been encountering that do this sort of client discrimination has risen sharply within the past few months, so this has motivated me quite a lot more! No doubt many others are also fighting back.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[proxomitron.info]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3133&amp;pid=21060#pid21060</link>
			<pubDate>Sat, 27 Jul 2024 18:29:35 -0400</pubDate>
			<dc:creator><![CDATA[Kye-U]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3133&amp;pid=21060#pid21060</guid>
			<description><![CDATA[Hi!<br />
<br />
If anyone knows who has access to the proxomitron.info domain you can tell them to update their nameservers to:<br />
<ul>
<li>ns1.private-nameserver.net</li>
<li>ns2.private-nameserver.net</li>
<li>ns3.private-nameserver.net</li>
<li>ns4.private-nameserver.net<br />
</li></ul>
<br />
I've migrated webhosts and the proxomitron.info domain needs to be updated to point to my new webhost.<br />
<br />
I hope everyone is doing well!<br />
<br />
EDIT: <span style="font-weight: bold;">thank you!</span>]]></description>
			<content:encoded><![CDATA[Hi!<br />
<br />
If anyone knows who has access to the proxomitron.info domain you can tell them to update their nameservers to:<br />
<ul>
<li>ns1.private-nameserver.net</li>
<li>ns2.private-nameserver.net</li>
<li>ns3.private-nameserver.net</li>
<li>ns4.private-nameserver.net<br />
</li></ul>
<br />
I've migrated webhosts and the proxomitron.info domain needs to be updated to point to my new webhost.<br />
<br />
I hope everyone is doing well!<br />
<br />
EDIT: <span style="font-weight: bold;">thank you!</span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A new threat to Internet freedom...]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3127&amp;pid=20926#pid20926</link>
			<pubDate>Thu, 16 Nov 2023 06:01:11 -0500</pubDate>
			<dc:creator><![CDATA[LibraCrum]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3127&amp;pid=20926#pid20926</guid>
			<description><![CDATA[<blockquote><cite><span> (Jul. 25, 2023 04:46 AM)</span>amy Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20920#pid20920" class="quick_jump">&nbsp;</a></cite>I just came across this, and it is really scary.<br />
<br />
Google (and maybe the rest of Big Tech in bed with them) wants to make it so sites will deny you access unless you <a href="https://alvenda.com/phenq-amazon/" target="_blank">use phenq amazon</a> an "approved" browser as well as the rest of your software/hardware, which will likely mean no adblocking extensions, proxies, or other things they don't like. I have no doubt that us proxy users who choose to experience sites the way we want will be severely affected.<br />
<br />
It is currently still possible to bypass Cloudflare's blocking with the right tricks, but this new "remote attestation" technology will use cryptography to make it nearly impossible.<br />
<br />
There is already an increasing opposition, please spread the word if you can, and use a browser that isn't Google-controlled.</blockquote>
<br />
This is really scary to know. <br />
The all we can do is good hope and nothing else.]]></description>
			<content:encoded><![CDATA[<blockquote><cite><span> (Jul. 25, 2023 04:46 AM)</span>amy Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20920#pid20920" class="quick_jump">&nbsp;</a></cite>I just came across this, and it is really scary.<br />
<br />
Google (and maybe the rest of Big Tech in bed with them) wants to make it so sites will deny you access unless you <a href="https://alvenda.com/phenq-amazon/" target="_blank">use phenq amazon</a> an "approved" browser as well as the rest of your software/hardware, which will likely mean no adblocking extensions, proxies, or other things they don't like. I have no doubt that us proxy users who choose to experience sites the way we want will be severely affected.<br />
<br />
It is currently still possible to bypass Cloudflare's blocking with the right tricks, but this new "remote attestation" technology will use cryptography to make it nearly impossible.<br />
<br />
There is already an increasing opposition, please spread the word if you can, and use a browser that isn't Google-controlled.</blockquote>
<br />
This is really scary to know. <br />
The all we can do is good hope and nothing else.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Unreadable website...]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2624&amp;pid=20925#pid20925</link>
			<pubDate>Thu, 17 Aug 2023 06:52:18 -0400</pubDate>
			<dc:creator><![CDATA[GrayHandsome]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2624&amp;pid=20925#pid20925</guid>
			<description><![CDATA[<blockquote><cite><span> (Feb. 27, 2022 05:27 PM)</span>ProxRocks Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20370#pid20370" class="quick_jump">&nbsp;</a></cite><blockquote><cite><span> (Feb. 27, 2022 05:05 AM)</span>JJoe Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20365#pid20365" class="quick_jump">&nbsp;</a></cite>I want to quickly find the filter that is causing the problem.</blockquote>
<br />
Along that line, I've modified my Prox Menu <a href="https://www.outlookindia.com/outlook-spotlight/phenq-where-to-buy-get-original-and-best-price-huge-saving--news-300837" target="_blank">where to buy phenq</a> for quicker access to keys that seem to have a higher need than the original entries  --<br />
<br />
<br />
Original --&gt;&gt; New<br />
<br />
Ad Banners (a_adban.a_adimg) --&gt;&gt; Ad Functions (a_adfn1.a_adfn2)<br />
Ad Comments (a_adcomm1.a_adcomm2) --&gt;&gt; JS Properties (a_jsprop)<br />
Ad Containers (a_adcont.a_adtab.a_adform.a_adcss) --&gt;&gt; JS Methods (a_jsmeth)<br />
Ad JavaScript (a_adjs) --&gt;&gt; External Fonts (a_fonts)  <span style="font-weight: bold;">new key</span><br />
<del>Flash &amp; Media  <span style="font-weight: bold;">removed from Prox Menu</span></del>  <span style="font-weight: bold;">keeping, added a_embed to Content-Security-Policy: Block Media header filter</span></blockquote>
After the modification of Prox Menu is it working ok or not?]]></description>
			<content:encoded><![CDATA[<blockquote><cite><span> (Feb. 27, 2022 05:27 PM)</span>ProxRocks Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20370#pid20370" class="quick_jump">&nbsp;</a></cite><blockquote><cite><span> (Feb. 27, 2022 05:05 AM)</span>JJoe Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20365#pid20365" class="quick_jump">&nbsp;</a></cite>I want to quickly find the filter that is causing the problem.</blockquote>
<br />
Along that line, I've modified my Prox Menu <a href="https://www.outlookindia.com/outlook-spotlight/phenq-where-to-buy-get-original-and-best-price-huge-saving--news-300837" target="_blank">where to buy phenq</a> for quicker access to keys that seem to have a higher need than the original entries  --<br />
<br />
<br />
Original --&gt;&gt; New<br />
<br />
Ad Banners (a_adban.a_adimg) --&gt;&gt; Ad Functions (a_adfn1.a_adfn2)<br />
Ad Comments (a_adcomm1.a_adcomm2) --&gt;&gt; JS Properties (a_jsprop)<br />
Ad Containers (a_adcont.a_adtab.a_adform.a_adcss) --&gt;&gt; JS Methods (a_jsmeth)<br />
Ad JavaScript (a_adjs) --&gt;&gt; External Fonts (a_fonts)  <span style="font-weight: bold;">new key</span><br />
<del>Flash &amp; Media  <span style="font-weight: bold;">removed from Prox Menu</span></del>  <span style="font-weight: bold;">keeping, added a_embed to Content-Security-Policy: Block Media header filter</span></blockquote>
After the modification of Prox Menu is it working ok or not?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A new threat to Internet freedom...]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3127&amp;pid=20922#pid20922</link>
			<pubDate>Mon, 31 Jul 2023 04:41:38 -0400</pubDate>
			<dc:creator><![CDATA[cattleyavns]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3127&amp;pid=20922#pid20922</guid>
			<description><![CDATA[Google is evil, they gave up their sologan "Don't be evil".<br />
<br />
This and Google Chrome's Manifest V3 screams that they want to manipulate the web.]]></description>
			<content:encoded><![CDATA[Google is evil, they gave up their sologan "Don't be evil".<br />
<br />
This and Google Chrome's Manifest V3 screams that they want to manipulate the web.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A new threat to Internet freedom...]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3127&amp;pid=20920#pid20920</link>
			<pubDate>Tue, 25 Jul 2023 00:46:33 -0400</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3127&amp;pid=20920#pid20920</guid>
			<description><![CDATA[I just came across this, and it is really scary.<br />
<br />
<span style="font-style: italic;">https://arstechnica.com/gadgets/2023/07/googles-web-integrity-api-sounds-like-drm-for-the-web/</span><br />
<br />
Google (and maybe the rest of Big Tech in bed with them) wants to make it so sites will deny you access unless you use an "approved" browser as well as the rest of your software/hardware, which will likely mean no adblocking extensions, proxies, or other things they don't like. I have no doubt that us proxy users who choose to experience sites the way we want will be severely affected.<br />
<br />
It is currently still possible to bypass Cloudflare's blocking with the right tricks, but this new "remote attestation" technology will use cryptography to make it nearly impossible.<br />
<br />
There is already an increasing opposition, please spread the word if you can, and use a browser that isn't Google-controlled.]]></description>
			<content:encoded><![CDATA[I just came across this, and it is really scary.<br />
<br />
<span style="font-style: italic;">https://arstechnica.com/gadgets/2023/07/googles-web-integrity-api-sounds-like-drm-for-the-web/</span><br />
<br />
Google (and maybe the rest of Big Tech in bed with them) wants to make it so sites will deny you access unless you use an "approved" browser as well as the rest of your software/hardware, which will likely mean no adblocking extensions, proxies, or other things they don't like. I have no doubt that us proxy users who choose to experience sites the way we want will be severely affected.<br />
<br />
It is currently still possible to bypass Cloudflare's blocking with the right tricks, but this new "remote attestation" technology will use cryptography to make it nearly impossible.<br />
<br />
There is already an increasing opposition, please spread the word if you can, and use a browser that isn't Google-controlled.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Unreadable website...]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2624&amp;pid=20914#pid20914</link>
			<pubDate>Wed, 21 Jun 2023 10:05:35 -0400</pubDate>
			<dc:creator><![CDATA[Lamachine]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2624&amp;pid=20914#pid20914</guid>
			<description><![CDATA[<blockquote><cite><span> (Feb. 25, 2022 01:58 PM)</span>Anno Domini Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20350#pid20350" class="quick_jump">&nbsp;</a></cite>I was just wondering if someone had a fix for this website. If I right click and put Proxomitron in bypass it works fine, but if I don't do that, then the text on the website is unreadable. I tried adding the site to the Bypass List.txt, but it's still unreadable if I do that. I attached a photo below to show what I mean. Thank you for any tips !<br />
<br />
<a href="https://www.nowtheendbegins.com/" target="_blank">https://www.nowtheendbegins.com/</a></blockquote>
<br />
There could be several factors affecting the readability of the site, and I'd like to offer a few tips that may help you navigate through this issue.<br />
<br />
Check your browser settings: It's important to make sure your browser is updated to the latest version. Also, have a look at your browser settings, including font size, zoom level, and page style, ensuring they are set to their defaults.<br />
<br />
Disable browser extensions: Browser extensions, such as ad blockers, cookie blockers, or custom CSS, could interfere with how webpages are displayed. I would suggest disabling these extensions one by one to identify if any of them is the root of the problem.<br />
<br />
Clear your browser cache and cookies: At times, issues arise from old or corrupt data stored in your browser cache or cookies that can distort how webpages load. Clearing your cache and cookies can often rectify this.<br />
<br />
Try a different browser: If the issue persists on your current browser, trying to access the website from a different browser may help determine if the issue is specific to one browser.<br />
<br />
Check your internet connection: The speed and stability of your internet connection can affect how webpages load. If feasible, try accessing the website on a different network to verify if your connection is causing the problem.<br />
<br />
I hope these suggestions assist you in resolving the issue.]]></description>
			<content:encoded><![CDATA[<blockquote><cite><span> (Feb. 25, 2022 01:58 PM)</span>Anno Domini Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20350#pid20350" class="quick_jump">&nbsp;</a></cite>I was just wondering if someone had a fix for this website. If I right click and put Proxomitron in bypass it works fine, but if I don't do that, then the text on the website is unreadable. I tried adding the site to the Bypass List.txt, but it's still unreadable if I do that. I attached a photo below to show what I mean. Thank you for any tips !<br />
<br />
<a href="https://www.nowtheendbegins.com/" target="_blank">https://www.nowtheendbegins.com/</a></blockquote>
<br />
There could be several factors affecting the readability of the site, and I'd like to offer a few tips that may help you navigate through this issue.<br />
<br />
Check your browser settings: It's important to make sure your browser is updated to the latest version. Also, have a look at your browser settings, including font size, zoom level, and page style, ensuring they are set to their defaults.<br />
<br />
Disable browser extensions: Browser extensions, such as ad blockers, cookie blockers, or custom CSS, could interfere with how webpages are displayed. I would suggest disabling these extensions one by one to identify if any of them is the root of the problem.<br />
<br />
Clear your browser cache and cookies: At times, issues arise from old or corrupt data stored in your browser cache or cookies that can distort how webpages load. Clearing your cache and cookies can often rectify this.<br />
<br />
Try a different browser: If the issue persists on your current browser, trying to access the website from a different browser may help determine if the issue is specific to one browser.<br />
<br />
Check your internet connection: The speed and stability of your internet connection can affect how webpages load. If feasible, try accessing the website on a different network to verify if your connection is causing the problem.<br />
<br />
I hope these suggestions assist you in resolving the issue.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20878#pid20878</link>
			<pubDate>Sun, 20 Nov 2022 09:56:12 -0500</pubDate>
			<dc:creator><![CDATA[cattleyavns]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20878#pid20878</guid>
			<description><![CDATA[Hi, I'm here again, just want to update the progress of TLS Fingerprint cracking, this curl-impersonate-win project managed to crack TLS Fingerprint (tested), download link: <a href="https://github.com/depler/curl-impersonate-win/releases/tag/7.84.0" target="_blank">https://github.com/depler/curl-impersona...tag/7.84.0</a><br />
<br />
To test, type:<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>curl_chrome104.bat https://alternativeto.net</code></div></div>
<br />
Success, return 200 status.<br />
<br />
Download "normal" curl ( <a href="https://curl.se/windows/" target="_blank">https://curl.se/windows/</a> ), and test again:<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>curl https://alternativeto.net</code></div></div>
<br />
WILL fail, return 403.<br />
<br />
So yeah, I think people are starting to fight back this degeneration technology, and have made success.<br />
<br />
For some high-level language like Python, or libraries with very limited customization like OpenSSL, it's still pretty hard to crack TLS Fingerprint because Python doesn't support changing TLS's ClientHello packet, sadly and it's very popular.]]></description>
			<content:encoded><![CDATA[Hi, I'm here again, just want to update the progress of TLS Fingerprint cracking, this curl-impersonate-win project managed to crack TLS Fingerprint (tested), download link: <a href="https://github.com/depler/curl-impersonate-win/releases/tag/7.84.0" target="_blank">https://github.com/depler/curl-impersona...tag/7.84.0</a><br />
<br />
To test, type:<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>curl_chrome104.bat https://alternativeto.net</code></div></div>
<br />
Success, return 200 status.<br />
<br />
Download "normal" curl ( <a href="https://curl.se/windows/" target="_blank">https://curl.se/windows/</a> ), and test again:<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>curl https://alternativeto.net</code></div></div>
<br />
WILL fail, return 403.<br />
<br />
So yeah, I think people are starting to fight back this degeneration technology, and have made success.<br />
<br />
For some high-level language like Python, or libraries with very limited customization like OpenSSL, it's still pretty hard to crack TLS Fingerprint because Python doesn't support changing TLS's ClientHello packet, sadly and it's very popular.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20594#pid20594</link>
			<pubDate>Thu, 02 Jun 2022 09:40:42 -0400</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20594#pid20594</guid>
			<description><![CDATA[I'm just very busy with other things, and I suspect others are too...<br />
<blockquote><cite><span> (Apr. 10, 2022 08:46 AM)</span>cattleyavns Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20416#pid20416" class="quick_jump">&nbsp;</a></cite>And BoringSSL is a very good candidate.</blockquote>
Unfortunately not. I did a little more research and the very first thing its description says is "Although BoringSSL is an open source project, it is not intended for general use, as OpenSSL is. We don't recommend that third parties depend upon it. Doing so is likely to be frustrating because there are no guarantees of API or ABI stability." I am reminded of the difficulties caused by switching from the 0.9.x that Scott originally used and the 1.0.x that Proxomitron Reborn uses, and think patched OpenSSL will probably be the best choice for now. I haven't had time to figure out how to compile OpenSSL 1.1 yet (TLS 1.3 - might be part of future fingerprinting - is the most needed from that) but once more sites start doing this stuff I'll be forced to do it at some point.]]></description>
			<content:encoded><![CDATA[I'm just very busy with other things, and I suspect others are too...<br />
<blockquote><cite><span> (Apr. 10, 2022 08:46 AM)</span>cattleyavns Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20416#pid20416" class="quick_jump">&nbsp;</a></cite>And BoringSSL is a very good candidate.</blockquote>
Unfortunately not. I did a little more research and the very first thing its description says is "Although BoringSSL is an open source project, it is not intended for general use, as OpenSSL is. We don't recommend that third parties depend upon it. Doing so is likely to be frustrating because there are no guarantees of API or ABI stability." I am reminded of the difficulties caused by switching from the 0.9.x that Scott originally used and the 1.0.x that Proxomitron Reborn uses, and think patched OpenSSL will probably be the best choice for now. I haven't had time to figure out how to compile OpenSSL 1.1 yet (TLS 1.3 - might be part of future fingerprinting - is the most needed from that) but once more sites start doing this stuff I'll be forced to do it at some point.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20593#pid20593</link>
			<pubDate>Thu, 26 May 2022 10:34:12 -0400</pubDate>
			<dc:creator><![CDATA[ProxRocks]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20593#pid20593</guid>
			<description><![CDATA[Kind of a bummer that this topic seems to have died.]]></description>
			<content:encoded><![CDATA[Kind of a bummer that this topic seems to have died.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20416#pid20416</link>
			<pubDate>Sun, 10 Apr 2022 04:46:42 -0400</pubDate>
			<dc:creator><![CDATA[cattleyavns]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20416#pid20416</guid>
			<description><![CDATA[I don't think so, all secrets are very likely revealed, we just need to implement our anti-TLS Fingerprint algorithms/code.<br />
Just we'll need to use non-OpenSSL code/recompile OpenSSL to achieve perfection. And BoringSSL is a very good candidate.]]></description>
			<content:encoded><![CDATA[I don't think so, all secrets are very likely revealed, we just need to implement our anti-TLS Fingerprint algorithms/code.<br />
Just we'll need to use non-OpenSSL code/recompile OpenSSL to achieve perfection. And BoringSSL is a very good candidate.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20415#pid20415</link>
			<pubDate>Thu, 07 Apr 2022 07:55:35 -0400</pubDate>
			<dc:creator><![CDATA[ProxRocks]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20415#pid20415</guid>
			<description><![CDATA[Has there been any behind-the-scenes advancements regarding Proxomitron Reborn not playing nicely with Cloudfare captchas?]]></description>
			<content:encoded><![CDATA[Has there been any behind-the-scenes advancements regarding Proxomitron Reborn not playing nicely with Cloudfare captchas?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare captcha [split] prox-config-sidki_2019-01-26b1]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20414#pid20414</link>
			<pubDate>Sat, 26 Mar 2022 00:20:11 -0400</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2623&amp;pid=20414#pid20414</guid>
			<description><![CDATA[<blockquote><cite><span> (Mar. 22, 2022 03:02 AM)</span>cattleyavns Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20381#pid20381" class="quick_jump">&nbsp;</a></cite>Should I share the whole progress ?</blockquote>
I think you've given sufficient information already; on the other hand, browsers' ciphersuites and user-agent strings are not exactly secret either. There's a nice list of their ciphersuites here:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>https://www.ssllabs.com/ssltest/clients.html</code></div></div>
Removing the SCSV from OpenSSL requires a patch/recompile (it's hardcoded) so it is not easy to do, but on the other hand, looking through that list, it seems besides bots some older Android and Apple systems will send it. (They might also be using OpenSSL internally.)<br />
<br />
The other thing I'm considering is allowing Proxomitron Reborn to use one of the varyingly-compatible forks of OpenSSL like BoringSSL, which is used in e.g. Chrome and doesn't send SCSV. Another alternative is the native Windows Schannel, but it's <span style="font-style: italic;">significantly</span> different in API and would require quite a lot more work. Stock OpenSSL is indeed quite bot-like in its default fingerprint, no doubt because it's a widely used default SSL library for everything---except, unfortunately, most browsers.]]></description>
			<content:encoded><![CDATA[<blockquote><cite><span> (Mar. 22, 2022 03:02 AM)</span>cattleyavns Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=20381#pid20381" class="quick_jump">&nbsp;</a></cite>Should I share the whole progress ?</blockquote>
I think you've given sufficient information already; on the other hand, browsers' ciphersuites and user-agent strings are not exactly secret either. There's a nice list of their ciphersuites here:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>https://www.ssllabs.com/ssltest/clients.html</code></div></div>
Removing the SCSV from OpenSSL requires a patch/recompile (it's hardcoded) so it is not easy to do, but on the other hand, looking through that list, it seems besides bots some older Android and Apple systems will send it. (They might also be using OpenSSL internally.)<br />
<br />
The other thing I'm considering is allowing Proxomitron Reborn to use one of the varyingly-compatible forks of OpenSSL like BoringSSL, which is used in e.g. Chrome and doesn't send SCSV. Another alternative is the native Windows Schannel, but it's <span style="font-style: italic;">significantly</span> different in API and would require quite a lot more work. Stock OpenSSL is indeed quite bot-like in its default fingerprint, no doubt because it's a widely used default SSL library for everything---except, unfortunately, most browsers.]]></content:encoded>
		</item>
	</channel>
</rss>