shadowsocks · tls camouflage · v2ray-plugin

Works where
VPNs are
blocked.

Your traffic looks like ordinary HTTPS to any firewall or active probe. One QR scan to connect.

bash — store4gateway
store4gateway connect

resolving server endpoint...

tls handshake on port 44312ms
traffic fingerprint: https
active probe resistance: passed
connected

plan: standard · 200 GB remaining

$ store4gateway --help

options
--camouflageWebSocket-over-TLS on port 443 via v2ray-plugin. Traffic is classified as HTTPS by any DPI system or active probe. No proxy fingerprint.
--connect <key>QR code contains the full SIP002 access key URI. Scan with shadowsocks-android, shadowsocks-windows, ShadowsocksX-NG (macOS), or Shadowrocket (iOS) — no manual configuration. See /install for guides.
--privacyBandwidth is metered for billing. Destinations, timestamps, and content are never stored or logged.

$ store4gateway compare --protocols

VPNs fail against deep-packet inspection in Iran, Myanmar, and mainland China. Shadowsocks was built to defeat protocol fingerprinting — not to hide it.

dimensionvpnplain ssour stack
passive dpidetectedusually passeslooks like https
active probingpartial (obfs servers)exposed since ~2019probe sees real tls
cn/ir/mm recordblocked on std configsworks until probedresists known methods
full tunnelyes, by defaulttun mode availabletun mode available
setupapp install, one-tapqr scanqr scan

read more: why shadowsocks gets through when vpns don't →

$ store4gateway plans

planpricedata / mo
starter$3/mo50 GB
standard# most popular$6/mo200 GB
pro$10/mo500 GB

# included with all plans

shadowsocks over tls — censorship-resistant

works with shadowrocket, v2rayng, clash

unlimited devices

cancel anytime

$ store4gateway faq

Q:What is Shadowsocks and how is it different from a VPN?
[+]
A:

Shadowsocks is an encrypted proxy protocol, not a VPN. VPNs like WireGuard and OpenVPN produce a distinctive handshake that deep-packet inspection can identify and block. Shadowsocks was designed to look like random noise, and with v2ray-plugin and TLS camouflage, our stack wraps that traffic as HTTPS on port 443 — structurally indistinguishable from a normal encrypted web session.

Q:Why does this work when my VPN is blocked?
[+]
A:

Firewalls block VPNs by fingerprinting their handshake signatures and blacklisting known server IP ranges. Our Shadowsocks server uses TLS camouflage: your connection appears as a normal HTTPS session on port 443. Active probes from the firewall receive a valid TLS response from what looks like an ordinary web server. There is no VPN handshake to detect.

Q:Does this use TLS camouflage? What protocol exactly?
[+]
A:

Yes. We run shadowsocks-rust with v2ray-plugin in WebSocket-over-TLS mode on port 443. Your access key URL includes all plugin parameters in SIP002 format. Any compatible client — shadowsocks-android, shadowsocks-windows, ShadowsocksX-NG, or Shadowrocket — configures the full chain automatically from the QR code. No manual setup.

Q:Which app do I use?
[+]
A:

The original Shadowsocks apps are free and open-source: shadowsocks-android (Google Play or GitHub), shadowsocks-windows (GitHub), and ShadowsocksX-NG (macOS, GitHub). For iOS, Shadowrocket ($2.99, US App Store) is the standard choice. Any client that handles the SIP002 URI format will work. See store4gateway.com/install for step-by-step guides.

Q:What happens if I hit my data cap?
[+]
A:

Your connection slows to 1 Mbit/s for the rest of the month. No overage charges, ever.

Q:Do you keep logs?
[+]
A:

We log bandwidth counts for billing. We do not log destinations, timestamps, or content. No browsing history is stored.

Q:Can I pay with crypto?
[+]
A:

Yes. BTC, Bitcoin Lightning, and USDT-TRC20 (Tron) via BTCPay Server. We do not currently accept ETH or other ERC-20 tokens.

Store4Gateway — Works where VPNs are blocked