It shouldn't work — but k2 does it.
k2cc rewrites the rules of congestion control. Where other protocols collapse under heavy packet loss, k2 maintains stable, high throughput. Built on ECH stealth encryption + QUIC/TCP-WS dual-stack transport, deploy in one command.
Proprietary k2cc algorithm automatically finds optimal send rates. Censorship-aware mechanism distinguishes censorship drops from congestion. Far outperforms BBR under GFW high-loss conditions
Encrypted Client Hello hides SNI completely. TLS handshake is undetectable, DPI deep packet inspection is ineffective
Prioritises QUIC for low-latency transport. Automatically falls back to TCP-WebSocket when QUIC is blocked. Seamless switching, imperceptible to users
One curl command installs both server and client. Auto-generates k2v5:// connection URI. No manual certificate configuration needed
Built-in reverse proxy forwards non-k2 traffic to a real website. Active probing returns legitimate HTTPS responses
Self-signed certificate with certificate pinning. Zero CT log exposure. No certificate purchase required. Server domain completely hidden
k2v5 vs. mainstream anti-censorship protocols across key dimensions
| Protocol | ECH Stealth | TLS Fingerprint Spoofing | Active Probe Defence | QUIC Transport | TCP Fallback | Congestion Control | Zero-Config Deploy | Zero CT Log Exposure | Port Reuse |
|---|---|---|---|---|---|---|---|---|---|
| k2v5★ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| WireGuard | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
| VLESS+Reality | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ |
| Hysteria2 | ✗ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✓ | ✗ |
| Shadowsocks | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |