SSH tunneling is a method of transporting arbitrary networking data over an encrypted SSH connection. It can be used to add encryption to legacy applications. It can also be used to implement VPNs (Virtual Private Networks) and access intranet services across firewalls.
SSH is a standard for secure remote logins and file transfers over untrusted networks. It also provides a way to secure the data traffic of any given application using port forwarding, basically tunneling any TCP/IP port over SSH.
We can improve the security of data on your computer when accessing the Internet, the SSH account as an intermediary your internet connection, SSH will provide encryption on all data read, the new send it to another server.
Using SSH accounts for tunneling your internet connection does not guarantee to increase your internet speed. But by using SSH account, you use the automatic IP would be static and you can use privately.
n unidentifiable mechanism that helps you bypass GFW.
Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations.
Trojan is not a fixed program or protocol. It's an idea, an idea that imitating the most common service, to an extent that it behaves identically, could help you get across the Great FireWall permanently, without being identified ever. We are the GreatER Fire; we ship Trojan Horses.
On penetrating GFW, people assume that strong encryption and random obfuscation may cheat GFW’s filtration mechanism. However, trojan implements the direct opposite: it imitates the most common protocol across the wall, HTTPS, to trick GFW into thinking that it is HTTPS.