New: SlipGate (NaiveProxy + SSH)
- New tunnel type: SlipGate — chains NaiveProxy (Chromium-based HTTPS tunnel) with SSH for a fully encrypted, censorship-resistant connection: https://github.com/anonvector/slipgate
- NaiveProxy mimics Chrome's TLS fingerprint, making tunnel traffic indistinguishable from normal HTTPS browsing
- NaiveBridge: manages NaiveProxy process lifecycle with SOCKS5 local proxy
- NaiveSocksProxy: bridges hev-socks5-tunnel to NaiveProxy with CONNECT and FWD_UDP support
- Pre-resolves server IP before connecting to prevent ISP DNS poisoning
Network Resilience
- SlipGate survives network changes (wifi ↔ cellular) — full two-phase reconnection (NaiveProxy restart, then SSH re-establishment)
- Auto-tune SSH max channels per tunnel type for better performance
Reachability Test
- "Test Server Reachability" now works for all tunnel types (DNSTT, Slipstream, DoH, SlipGate) — only Snowflake/Tor is skipped
- Smart ping target selection per tunnel type (resolver host, DoH server, SSH host, etc.)
Deep Links
- Added slipnet:// URI deep link support — tap a link to import profiles directly