1. SSH tunneling
3. SOCKS5 proxy
4. HTTPS/HTTP CONNECT method tunneling
The proxy configuration in Postern is effectively globally on your device, meaning all Apps are automatically equipped with this proxy setting and network traffic initiated by them goes through the proxy server as configured. Simple configuration on Postern applies to the whole device.
Addresses that benefit from tunneling are configurable. Postern is responsible for differentiating addresses that need tunneling and ones that do not.
We recommend you use Postern to bypass firewall and censorship. As Postern is supporting Shadowsocks and SSH tunneling protocols, It also is very helpful to protect your network data with strong and reliable encryption at very low cost.