Is DPI bypassing software appropriate for your threat model? (should only bother you if your ISP/government explicitly spies on your activity): https://github.com/ValdikSS/GoodbyeDPI?tab=readme-ov-file#similar-projects
link quote
- zapret by @bol-van (for MacOS, Linux and Windows)
- Green Tunnel by @SadeghHayeri (for MacOS, Linux and Windows)
- DPI Tunnel CLI by @zhenyolka (for Linux and routers)
- DPI Tunnel for Android by @zhenyolka (for Android)
- PowerTunnel by @krlvm (for Windows, MacOS and Linux)
- PowerTunnel for Android by @krlvm (for Android)
- SpoofDPI by @xvzc (for macOS and Linux)
- GhosTCP by @macronut (for Windows)
- ByeDPI for Linux/Windows + ByeDPIAndroid for Android (no root)
- youtubeUnblock by @Waujito (for OpenWRT/Entware routers and Linux)
It won’t require a Google account since your IP hasn’t been changed, while still obtaining access to YouTube videos.