I am in Syria , and this report is worrying , i myself uses the latest snapshot of tor alone in linux , but my sister and most of the ppl that i know uses ultrasurf because it is simply much tech-dumb-proof.
and because the tor bundle disable the use of flash & js , while ultra-surf doesn't. so they think that tor is broken without knowing the full story.
Your blog posts don't really debunk any of the specific things Jacob Appelbaum talks about. Your blog posts sound much more like a personal attack on him than what he wrote about ultrasurf. The reply from the Ultrasurf developers is so vague and has no value. It sounds like you were seriously hurt (personally, financially?) by Jacobs review (or "critique") of Ultrasurf.
i create a rule to block Ultrasurf on top and a rule to allow any below it. but ultrasurf still can bypass. surprisingly once ultrasurf connected to its server, PAN unable to logged the traffic. No traffic looged in URL filtering, Threat and Traffic log.
and currently im applying the same method like yours, create a block rule for unknown-tcp with port 443 ...this will block ultrasurf user from browsing any site but in the ultrasurf status is still 'succesfully connected'.
When ultrasurf updates to a new version, PAN only recognize the APP as ssl. What i've noticed though is that ultrasurf calls to TAIWAN(hi-net) network, a dynamic network. So what i did was i created a rule that blocks TAIWAN & unknown-tcp. Problem solved for Ultrasurf.
df19127ead