by xanthine on 10/16/22, 5:37 AM with 33 comments
by vmoore on 10/16/22, 3:03 PM
I once blacklisted a bunch of Amazon IPs that I found in some random Gist on Github, and surfed the web, and so much stuff was broken. It's staggering just how entangled AWS is with the web. The dream of the 'decentralized web' would be hard to implement. You would need to root out any dependence on AWS, Google, Cloudflare etc
But if this means we can reliably hide traffic in these centralized networks, then maybe it's a good thing they exist. Sort of like steganography with cloud services.
by jkhdigital on 10/16/22, 10:59 AM
The real weakness of all such systems is setup and rendezvous: how do clients find friendly servers, and how do you prevent the censoring regime from finding and blocking them? It's not an easy problem to solve.
by Haemm0r on 10/16/22, 6:31 PM
First time I could not connect successfully from a public Wifi to my server was Qatar airport this summer... Maybe they work with whitelists for access control.
by luckylion on 10/16/22, 8:50 AM
by netheril96 on 10/16/22, 10:57 AM
by MasterYoda on 10/16/22, 4:22 PM
by grondilu on 10/16/22, 12:01 PM
Whether we agree with these policies or not, the fact remains that these impediments to free speech can be seen as a form of censorship. At the end of the day, I think what makes censorship acceptable is very much subjective, and tied to political beliefs. I can't help noticing for instance that on this github page, there are a few flags illustrating "censoring regimes", and the Russian one is there, but not the European Union one, even though the European Council blocked RT and Sputnik throughout the whole EU after the Russian special military operations in Ukraine. This blocking, regardless of what one can think of its legitimacy, is hard not to consider as censorship. If it's not, how is it called then?
by RichardCNormos on 10/16/22, 1:55 PM
by justshowpost on 10/16/22, 6:49 PM
When tampering gubment censorship, one should apply the usual opsec rules and thus stick to mature and proven solutions and refrain from experimenting. This means Tor or reputable commercial VPN provider, not yet-another-tor-killer. And the developers in general should invest more efforts into low-level attacks like GoodbyeDPI instead.