If you're just looking for remote access, openvpn on port 443 should (in theory) be indistinguishable from normal https traffic.
Gellis12
Tor. It's free, it works, and there's nobody to sell you out when the cops come knocking.
I'm out of the loop, what's the context for all this?
Here's a quick bash script if anyone wants to help flood the attackers with garbage data to hopefully slow them down: while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date) | shasum | sed 's/.\{3\}$//' | base64); sleep 1; done
Once every second, it grabs your computer name and the current system time, hashes them together to get a completely random string, trims off the shasum control characters and base64 encodes it to make everything look similar to what the attackers would be expecting, and sends it as a request to the same endpoint that their xss attack uses. It'll run on Linux and macOS (and windows if you have a WSL vm set up!) and uses next to nothing in terms of system resources.
I still run my own xmpp server!
But I'm the only one who has an account on it :/
If they did, I haven't heard about it. China has been trying and failing to block tor for decades though, so I kinda doubt Russia managed to beat them to it overnight.