This tutorial mainly focuses on technically preventing monitoring and tracking by the censorship network and leaving usage records. But more importantly, do not harbor unrealistic illusions about the enemy, and do not promote your activities on the forum to others without confirming their political views, especially to parents and teachers.
This setup tutorial has priorities; the most important are the use of the VPN (梯子) and browser configuration, and these two aspects should be secured first.1. VPN (梯子) Tutorial (Important)
1. Preface
Due to the censorship needs of the Chinese government in ideological and public opinion control, the internet has been regulated, which makes it impossible to directly access many international websites and services in mainland China, such as:
- Google Search / Gmail / Google Scholar
- Some APIs and resource nodes on GitHub
- Our forum
If you need to view foreign websites and access our forum, using a “VPN” (梯子) is a common and necessary method.
2. What is a “VPN” (梯子)?
A “VPN” (Virtual Private Network) is a network proxy tool that helps you relay through foreign servers, bypassing domestic network restrictions to access blocked sites. This is usually achieved through two methods:
- VPN (Virtual Private Network): Use the official app, one-click connection, suitable for users who are not tech-savvy
- Proxy client + node subscription: Suitable for users who want flexible configuration and faster speeds (such as Clash / SingBox)
Therefore, using a VPN (梯子) can mask which website you are visiting. In the eyes of the censorship network, it only sees that you are connected to a foreign server, not which specific site you are accessing, thus protecting your safety.
3. General operation process (suitable for everyone)
- Register a VPN or subscription service account
- Download and install the client (VPN app or proxy client)
- Log in to the account / import subscription link
- Connect to a node, and once successful, you can access the international internet
4. Recommended tools (tested usable in 2025, supports domestic payment)
Name Type Payment Method Advantages Official Website / Address Description ZoogVPN VPN Supports Alipay / UnionPay Supports free trial, simple client, easy to use https://zoogvpn.com/zh Just My Socks Proxy (SS proxy subscription) Supports Alipay Well-established and stable, suitable for Clash / hiddify https://justmysocks.net HutaoNet Proxy (Vmess subscription) Supports WeChat / Alipay Supports SingBox, Clash, stable and high-speed https://hutao.cloud Note: “Proxy service” is a paid subscription service that provides proxy node links, suitable for long-term use; VPN is more suitable for users who do not understand configuration at all.
In addition, besides the listed proxies, you can also find suitable proxies from this URL. When using proxies, do not recharge too much at once, as proxies may shut down suddenly.
GitHub - hwanz/SSR-V2ray-Trojan: 机场推荐与机场评测
5. Mobile VPN (梯子) Tutorial
Download Android client
Currently, for convenience and to simplify the operation process while ensuring security, we recommend using Hiddify as the VPN client. Here is the download link:
Android download link (click to download)
After downloading, you will see an installation package. Tap it in your phone’s file manager to run the installer.
Once installed, you will see the software. Tap to launch, and you will see Hiddify’s dashboard.
Tap the top right corner or the middle button to add a configuration file.
After seeing the screen below, copy the subscription link obtained from the proxy service, and paste to import.
Client settings
Tap the options button in the top left corner to open the sidebar.
Enter “Settings”
Turn on and enter “Per-App Proxy”
Search for apps that need VPN (like browsers), check them, then select “Only proxy the selected apps”.
6. PC VPN (梯子) Tutorial
Download Windows client
Currently, for convenience and to simplify the operation process while ensuring security, we recommend using Hiddify as the VPN client. Here is the download link:
Windows download link (click to download)
After downloading, you will see an installer. Double-click to run the installation.
Choose the language shown during installation (does not affect the client language later), click OK.
Choose the installation location (you can keep the default or change “C” to “D” or other drive letters), click Next to continue.
Choose whether to create a desktop shortcut and set Hiddify to start automatically on boot, select as needed, then click Next.
Confirm installation options and click Install to begin.
Installing…
After installation completes, click Finish (Hiddify will start automatically).
After launching, you will see Hiddify’s dashboard.
Import nodes
On the Hiddify homepage, click “New configuration” or the plus button in the top right to add a configuration file.
After seeing the screen below, first copy the VPN link from the proxy service, then click “Copy from clipboard”.
As shown, the node was successfully added. Click the connect button.
Now you can access the internet freely.
Hiddify has four proxy modes. For convenience, just use “System Proxy” daily; the others are rarely used.
Hiddify only has proxy mode. As for traffic handling modes, i.e., the rules and global mode we are familiar with, depend on the “Region” in the “Configuration Options” (mentioned later).
The four proxy modes are explained in the diagram; for daily use, “System Proxy” is sufficient.
On the left side, select “Proxy” to switch nodes. The lightning icon in the bottom right can test speed.
Client settings
Click “Configuration Options” on the left. Pay attention to several options: set “Region” to China, enable “Bypass LAN”, turn off “Resolve target addresses”, enable “IPv6 routing”, enable “DNS routing”, and “Strict routing” can be turned on (if website access fails, try turning it off). Keep other options at default.
You can refer to the PC version for the offline method, which is also to access the “History” interface, then select “Delete All History and Browsing Data” in the related settings. After clearing the data, you can choose whether to uninstall it or not.
\n## 3. Security Browser Security Configuration (Computer)
\n### 1) brave browser
\nOpen the brave browser, first start Incognito mode by clicking the three horizontal lines in the upper right corner. Open “Customize and Control Brave” to see options for Incognito mode and opening Incognito in Tor mode. Generally, opening Incognito in normal mode is sufficient. If you want to access forums via Tor, you can use a dedicated Onion Browser.
\n
\n
\nThe Incognito window appears as above.
\nThen continue to click the three horizontal lines in the upper right corner to open “Customize and Control Brave,” and click “Settings.”
\n
\nAfter opening Settings, click “Privacy and Security” to access security settings. Here, you can enable “Security,” set WebRTC IP handling policies, and choose “Disable UDP without proxy.”
\n
\nIn the “Security” settings, enable “Use secure DNS” and select Cloudflare 1.1.1.1 from the “Choose DNS provider” dropdown.
\n
\nIn “Privacy and Security,” you can also see the “Clear browsing data” option, click to open it.
\n
\nClick “Advanced,” set the time range to “All time,” select all options on the left, then click “Clear data” to delete all records.
\n
\nYou can then click “On exit,” select all options, and click “OK” to clear all data upon browser exit.
\n
\n### 2) chromium browser (for reference only, skip this part if only brave is installed)
\nChromium browser Windows download link
\nExtract the downloaded archive to get the chrome-win folder, which contains the browser files. You can place this folder in your usual file storage location or on a USB drive.
\nClick “Extract All”
\n
\nClick “Extract”
\n
\nA new folder will open; the chrome-win folder contains the extracted files.
\n
\nCreate a “Program Files” folder on drive D and place the extracted files inside. You can also put it on a USB drive.
\nOpen this folder and click “chrome.exe” to launch the browser.
\n
\nWhen opening, a security warning may appear. Click “More info,” then “Run anyway.”
\n
\nAfter opening the browser, it is not yet in Incognito mode. To prevent history from being saved, click the three vertical dots in the upper right corner, open “Customize and Control,” then select “New Incognito Window” or press Ctrl+Shift+N.
\n
\n
\n
\nThen click the three vertical dots again, open “Settings,” and go to “Privacy and Security.”
\n
\nIn “Privacy and Security,” many options are available. The first allows clearing all browsing data. To set secure DNS, click “Security Options.”
\n
\nScroll down to find “Use secure DNS.” If it’s off, turn it on. Then select a DNS provider from the dropdown, such as Cloudflare 1.1.1.1.
\n
\n## 4. Security Browser Security Configuration (Mobile)
\n### 1) brave browser
\nOpen the mobile version of Brave, tap the three dots in the lower right corner to access “Settings,” then tap “New Incognito Tab” to open Incognito mode, or go directly to “Settings.”
\n
\nIn Settings, open “Brave Shields and Privacy.”
\n
\nScroll down to see options for clearing browsing data. First, change the WebRTC IP handling policy to “Disable UDP without proxy,” then enable “Use secure DNS.”
\n
\nAfter enabling “Use secure DNS,” turn it on, then select “Choose another provider” and pick Cloudflare (1.1.1.1).
\n
\n### 2) Set as default browser
\nThe mobile security browser should be set as the default to prevent accidental opening of sensitive links in the built-in browser in non-incognito mode.
\nFor example, Firefox Focus defaults to Incognito mode.
\nGo to “Settings,” tap “Apps,” select “Default Apps,” and set Firefox Focus as the default browser.
\n
\n—
\n# 3. Using Onion Browser
\n> Besides using Brave as a security browser, Onion Browser is also an option. It not only has the features of a security browser but also adds Onion routing to hide your access target and your network address.
\n## 1. Why use Onion Browser
\nOnion routing (The Onion Router), or Tor, is a network anonymity technology. When using Tor to access the internet, data is sent from our browser but does not go directly to the target server as usual. Instead, it goes through three hops, finally reaching the target server, which helps hide the IP, protect data security, and achieve anonymity.
\nFirst, data is forwarded to the entry node (also called guard node). Then, the entry node forwards data to relay nodes. Next, relay nodes forward data to the exit node. The exit node finally transmits data to the target server. The server then sends data back through the reverse path, allowing us to access the webpage content.
\nBefore the three hops, data is encrypted three times with different keys, like three locks, each with its own key held by the respective node. During forwarding, the entry node only knows who we are (our IP address) but not what website we are visiting. Relay nodes do not know who we are or what website we are visiting. The exit node only knows what website we are visiting but not who we are.
\nThis means no one can fully access our internet activity. The reason we can use rule-based mode is because the data must go through three jumps. The nodes providing this service are called onion nodes, provided by volunteers worldwide, and are all public. Therefore, it is easy for the Chinese authorities to block our connection to these nodes, making direct connection almost impossible.
\nSimilarly, this is very dangerous because it reveals that we are accessing onion nodes. To avoid this, we need to use a VPN to access Tor. Since all onion nodes are blocked, we cannot connect directly, so we only need to use rule mode instead of global mode.
\nUsing rule mode also helps prevent detection by authorities. Main VPN tools disguise international traffic to bypass censorship. If we use global mode, our traffic appears as constant international access, which is suspicious and easily detected. Rule mode allows direct access to domestic sites, making our traffic less obvious. Connecting to domestic sites also increases concealment.
\nIn theory, authorities could block all international traffic, turning China’s network into a local area network like North Korea’s, but that would mean their demise.
\n## 2. Download and Install
\n### PC
\n1. Download Tor Browser
\nOfficial Chinese website: Tor Project | 在线匿名
\nIf the site is inaccessible, download directly from: Onion Browser Windows Download
\nDo not use third-party sites for the Tor installer for safety reasons
\n2. Install Tor Browser
\n1. Double-click the installer
\n2. Select language and click OK
\n
\n3. Choose installation location and click “Install”
\nTor Browser is portable; you can install it on a USB drive for convenience and to avoid traces on your PC
\n
\n4. After installation, you will see the Tor Browser folder in the installation directory.
\n
\n5. Open this folder and click the Tor Browser shortcut to launch Onion Browser.
\n
\n### Mobile
\n1. Download Tor Browser
\nOfficial Chinese website: Tor Project | 在线匿名
\nIf inaccessible, download directly from: Onion Browser Android Download
\nDo not use third-party sites for the Tor installer for safety reasons
\nClick the link in your browser to download. You will be warned that Tor is unsafe; confirm to proceed.
\nThen, open the downloaded file in your browser to install Onion Browser.
\nYou might see a prompt to allow installation; enable it. The installation will start.
\nOnce installed, you can find the Onion Browser icon on your home screen and open it.
\n
\n
\n
\n## 3. Configure Proxy
\nTorYou must use a VPN browser; connecting directly within China is difficult and dangerous.
The specific usage methods for proxy tools have been detailed above; they will not be repeated here.
System proxy mode:
Method 1: Enable Virtual Network Card (TUN) mode (simple, minimal configuration, but may have issues)
As mentioned earlier, the automatic system proxy mode generally cannot guarantee that all program traffic is intercepted by the proxy tool. If the software does not follow the system proxy settings, then whether using rule mode or global mode, the traffic of this software will not go through the proxy, meaning this program cannot connect through the VPN and cannot access the internet. Onion Browser is such a software that does not follow system proxy settings. If no special configuration is made, it defaults to direct connection. Therefore, when using Onion Browser, you can enable the virtual network card mode, which forwards all device traffic to a virtual network card, and access the proxy server through this virtual network card. In Hiddify, for VPN mode, enabling it requires administrator privileges.
Click “Service Mode”
Then select “VPN” mode
Note: Since the VPN on mobile devices is usually enabled by default in this mode, just turn on the VPN and you can directly use Onion Browser without configuring a proxy.
Method 2: Enable automatic system proxy mode (requires configuration inside Onion Browser, more convenient for other software use) (recommended mode)
Besides using TUN mode, you can also open Onion Browser in system proxy mode.
Onion Browser does not follow system proxy settings by default, but we can manually configure the proxy to make Onion Browser follow the system proxy, meaning its traffic will follow the VPN. The specific method is as follows:
On the homepage of Onion Browser, click “Configure Connection…”
In the “Connection” list, scroll to the bottom, click “Configure how Tor connects to the Internet” on the right side of “Advanced…”
In the popup “Connection Settings” window, set as follows:
Check “Use a proxy to connect to the Internet”
Select “Proxy Type” asSOCKS5
Fill in “Address” as127.0.0.1
“Port” needs to be checked according to your proxy tool. Different proxy tools have different default ports. You can view and modify them here. For example, v2RayN uses 10808, ClashVergeRev uses 7897, Hiddify uses 12334. Fill in according to your actual setup.
Different client proxy ports
Finally, click “OK” to complete the setup.
Traffic handling mode: To ensure safety, it is recommended to use the global mode, but rule mode can also be used.
As mentioned earlier, the global mode is safer, ensuring all intercepted traffic by the proxy tool goes through the proxy. However, for convenience when using Onion Browser to access other websites (especially domestic sites), and to prevent traffic features from being too obvious and being detected, it is recommended to use rule mode during long-term use of Onion Browser.
4. Onion Speed-up Configuration (PC only)
Currently, Onion Browser needs to connect through three different nodes, which may be located far apart (e.g., one node in Asia, Europe, and America respectively), leading to long access times and high latency. But Onion Browser can set specific entry, relay, and exit nodes. By setting all three nodes to Onion nodes in the US, the access speed can be greatly improved.
Search for Onion nodes at: Relay Search
Check IP location at: GeoIP web services demo | MaxMind
1) Open the folder where Onion Browser is located and open the torrc file
File locations:
Windows: Tor Browser\\Browser\\TorBrowser\\Data\\Tor\\torrc
Linux: \~/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc
2) Open with Notepad or Notepad++, add the following at the end of the document, and save:
exitnode specifies the exit node, middlenode the relay node, and change the country code to the US. Although traffic will be routed through the US, it will be much faster than globally. You can also change to other countries.
ExitNodes {us}
MiddleNodes {us}
EntryNodes {us}
StrictNodes 1
4. Mobile Clone Tutorial
To prevent files on the phone from being detected and to delete them promptly when discovered, set up a mobile clone. Also, due to monitoring by authorities, it is recommended to use international versions of Samsung, Motorola, etc., when using forums or downloading files (best purchased on second-hand sites or Taobao).
1. Clear Phone Data
Before creating a clone or setting up a privacy space, back up important data and then clear the device data. The method is the same as clearing data for the main device: go to your phone settings, enter General/System & Settings, and select “Erase All Data/Factory Reset” (using Samsung as an example).
During daily computer use, records of which files you have opened are left in certain folders. Clearing these files is also very important. This section provides scripts for quick clearing. The scripts mentioned in this tutorial are recommended to be used before shutting down every day.
Preparations
We need to download Sdelete as a cleanup tool.
The download link for Sdelete on Windows is as follows; click to download:
After downloading, place sdelete64.exe (for 64-bit systems) into the C:\\Windows\\System32 directory.
Download Cleaner Script File
cleaner.zip (2.0 KB)
After downloading, extract the compressed package, then right-click the file and run the script as an administrator. Wait for the process to complete to clear usage records of cleaning software.
Clear browsing history of Word and PDF readers
When you open the Word file in the top-left corner, you can see a large number of recently used files, which also need to be deleted.
Click on File - Options,
Then in the options, click Advanced, find “Display,” and you can see the number of recent documents and favorite folders displayed, both set to 50.
You can turn them off and set the number to 0, so they will no longer be displayed.
The same method applies to Excel and PowerPoint.
If your PDF reader also has recent files, they need to be cleared as well.
6. Software Cleaning Tutorial
To avoid being monitored by middle-level police and parents or teachers, files downloaded from forums should be deleted after reading. Simply right-click and delete is not enough, as recovery software can restore the data. This section uses cleaning software to thoroughly erase data.
Computer Cleaning Software Tutorial
HDCleaner Tutorial
HDCleaner is convenient for deleting sensitive files separately and has a simple interface. It is recommended for use when deleting files on the computer.
Download
- Download from the official website KurtZimmermann Software (or click to download):
- Choose the download path, recommended to install on a USB drive to clean multiple devices and prevent traces.
- After downloading, open the download path and double-click the “exe” file to open.
- After opening, a window appears. Select installation options and installation path. The default path is the previous download location. If you have already downloaded to a safe place, you can leave it unchanged.
But read below first, do not click install directly
- If installed on a USB drive, remember to disable these options:
① Create a system restore point (key point): Backs up a system snapshot for recovery, like saving a file. If you delete files, a backup remains, which others can see. You might not know how to delete it.
② Create Start Menu shortcut: Adds a shortcut in your Windows “Start” menu. You can access it anytime, but if installed on a USB, unplugging it makes it inaccessible. For safety, do not leave it. Just open it from your installation folder.
③ Create Desktop shortcut: Same as above, creates a shortcut on the desktop. For safety, do not click it.
④ Add HDCleaner to Explorer context menu: This makes opening easier. For example, right-click a file and select “Delete with HDCleaner.” However, this option writes entries into the registry, which can be detected if checked strictly. Non-technical users should avoid enabling it.
- Now, click Install to complete installation.
After installation, the HDCleaner icon will look like this.
Usage
- Double-click the “exe” to run HDCleaner.
- After opening, this interface appears. To delete files, click this button.
- Click “Permanently delete files.”
- Use the “Add Files” or “Add Folder” options to select files and folders to delete, or drag files/folders directly into the box.
- The “Options” button shows the method of shredding files. Usually, the default option (US Army (AR380 - 19) - 3 Passes) is sufficient. Then click “Shred Files.”
- The new version includes a “Restore Files” feature, which can check if files are thoroughly deleted. It can scan entire partitions or search for specific files. Click “Scan Now.”
PG (Partition Guru) Tutorial
- Download and open PG:
Find and open “Partition Guru” in the installation path.
After opening, the interface appears as follows:
- In the left directory, locate the folder containing the files to delete. Right-click the files to delete, then select “Thoroughly Delete Files.”
- Click “Thorough Delete.”
- Click “Delete.”
Mobile Cleaning Software Tutorial
SDelete Tutorial
- After installation, the screen shows all folders in phone storage. Press the small house button below the red header in the top right to return to this initial page. The upward arrow on the right can go back to the previous folder.
- Tap the three dots in the top right, and a popup appears. Select “Setting.”
- The interface shows this screen. Turn on “Display hidden files” to view hidden files, then click “Deletion standard.”
- After clicking, a popup appears. Usually, the default “1 pass” option is selected after installation, which does not delete thoroughly.
Choose the top “3 pass”
- You can continue deleting. Tap folders to view contained files. The folder path is displayed above. Long-press a file to select it. Tap the trash bin icon in the top right to delete. The dashed box with a solid line on the right is “Select All,” which allows selecting all files and folders within a folder. If all sensitive files are in one folder, this button is very useful.
- After clicking the delete button mentioned earlier, a popup appears, indicating that files cannot be recovered once deleted. Confirm if you want to delete. The line below “Standard:” indicates the deletion standard set in step 2. If no issues, click “YES” to complete deletion.
7. Using Memory to Set Up Virtual Disk for Sensitive Files
We know that in a computer, memory (RAM) is used to temporarily store running programs and data. Once power is lost, data is also lost. Therefore, we can consider downloading sensitive files to memory for viewing. After shutting down and clearing download records, no traces will remain on the computer. We can use a cube memory disk to achieve this temporary storage. Here is the tutorial.
First, download the software:
ramdisk1.1.0 i2i2.cn.zip (275.8 KB)
After extracting, you get the software shown below:

Double-click to run directly.
Click “Create Memory Disk.”
Set the memory disk size as needed (generally 1GB is sufficient), uncheck “Automatically load this memory disk at startup,” then click “Browse.”
You can save the created image file in an encrypted volume, named “ram” here. When actually setting up, try to choose a common image filename like recovery.img and place it in the same folder as other normal images. Click Save, then go back to the previous interface and click Create. Reopen the software; the list shows the created and loaded memory disk Z. To ensure data security, do not select any save options so that sensitive files are cleared after shutdown.
You can also view this memory disk in the file manager. Download sensitive files to this memory disk.

If you no longer use this memory disk, select it in the list and click “Unmount.”
Click “Yes” to unmount.
Choose “No” to avoid saving sensitive files.
If you want to delete the image file ram.img stored on the physical disk, select the memory disk in the list and click “Unmount and Remove.”
Choose “Yes,” and the image file ram.img on the physical disk will be deleted.
When using data recovery software DiskGenius to view, this image file contains no valid information, ensuring greater safety.



































































































