この感じだと、Mukllvadでひっかかった通信と同じでから、Obscuraでも検知されそうね
---
Obscura’s servers relay the WireGuard tunnel between your device and Mullvad’s servers. Essentially, WireGuard-over-QUIC.
This looks something like:
<user> --> Obscura Server --> Mullvad Server --> <internet>
This ensures that no single party has the information to leak or correlate your traffic and your identity, since:
Obscura’s servers are unable to decrypt the WireGuard packets it relays, since they are encrypted to a Mullvad server’s WireGuard pubkey.
Mullvad’s servers never see your connecting IP since Obscura’s servers are effectively doing NAT.
Your device connects to Obscura’s servers over QUIC, meaning:
Obscura connections are harder to detect or block since they look like regular internet traffic (HTTP/3 uses QUIC for transport).
Obscura avoids the TCP-over-TCP meltdown problem since we use QUIC’s unreliable datagram extension.
Still curious? Read our blog post on Obscura’s design.