From bb6237151c8ec9ee5ee70b9c3429cb6b071f9654 Mon Sep 17 00:00:00 2001 From: Alexey <247128645+axkurcom@users.noreply.github.com> Date: Fri, 3 Apr 2026 00:06:34 +0300 Subject: [PATCH] Update README.md --- README.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 90ef03c..4feed9a 100644 --- a/README.md +++ b/README.md @@ -51,8 +51,12 @@ - [FAQ EN](docs/FAQ.en.md) ### Recognizability for DPI and crawler -Since version 1.1.0.0, we have debugged masking perfectly: for all clients without "presenting" a key, -we transparently direct traffic to the target host! + +On April 1, 2026, we became aware of a method for detecting MTProxy Fake-TLS, +based on the ECH extension and the ordering of cipher suites, +as well as an overall unique JA3/JA4 fingerprint +that does not occur in modern browsers: +we have already submitted initial changes to the Telegram Desktop developers and are working on updates for other clients. - We consider this a breakthrough aspect, which has no stable analogues today - Based on this: if `telemt` configured correctly, **TLS mode is completely identical to real-life handshake + communication** with a specified host