by throwfaraway135
21 subcomments
- Considering the staggering number of arrest for online/offensive communications in England & Wales, we should add Britain to the list of Russia and Iran
2017: ~5,500 arrests
2019: ~7,734 arrests
2023: ~12,183 arrests
- > No mention of EU chat control
> No mention of "age verification"
> No mention of people arrested for Twitter posts in the UK and the EU
What did they mean by this?
- The "Mimicry" Angle (Best for technical discussion)
The shift from "obfuscation" to "mimicry" is the real story here. In 2025, "random-looking" traffic is itself a signature for DPI. Tools like WebTunnel that mimic standard HTTPS/SNI and Conjure that hides in unused ISP space force censors into a "collateral damage" dilemma: they can't block Tor without breaking their own web.
- Why is Tor making it so difficult to change the region/ExitNode then? Geo-Blocking is by far the most prevalent form of online censorship and while Tor can work around it, it requires fiddling with config files and restarting the service instead of clicking a button.
- Does anybody know what the situation is like in China these days? What's the most commonly used tool for proxying now?
Does basically all network leaving China still get ratelimited at a few megabytes per second?
by jimnotgym
1 subcomments
- I think we could have a more thoughtful discussion if people didn't start off with an assumption that the way the US manages free speech is unquestionably better than the rest of the world. Take a breath and think before you write.
It seems to me that what you are allowed to say in the US is very dependent on how much the person you are saying it about is able to spend on lawyers, for instance.
- The section on conjure is fascinating. For those who haven't followed the refraction networking space, the idea of leveraging unused address space at the ISP level is something academic papers have proposed for years [1]. Seeing it deployed in the wild is huge. The hardest part of this has always been non-technical by the way. Convincing ISPs to cooperate. If the Tor project has managed to get ISPs to route traffic destined for unallocated IPs to a station that handles the handshake, it completely breaks the censor's standard playbook of IP enumeration. You can't just block a specific subnet without risking blocking future legitimate allocations.
I'd be curious to know if these are smaller, sympathetic ISPs or if they managed to partner with larger backbone providers. I'm interested to hear more about this.
[1] look up tapdance
- Russia was already complicated two years ago, most of-the-shelf VPNs blocked, and with Intel/Microsoft websites blocking themselves due to sanctions it was rather difficult to set up a fresh laptop - it couldn't download drivers, and obvious channels were all blocked.
This year they've blocked almost all of the VPNs and additionally calls in all messenger apps and FaceTime. The only thing that works is Outline - but one has to set up the server somehow, and if you're in Russia without a western credit card it might be difficult to do. For some reason the iOS app for Outline is still in the Russian App Store.
- You can’t fix censorship with tech. The only solution is booting the facists out.
by entropyneur
0 subcomment
- Honest question: why no mention of China? I assume they've given up earlier due to lack of resources?
by 1vuio0pswjnm7
0 subcomment
- "As the severity of censorship in Russia has increased, WebTunnel has also received several fixes, such as SNI imitation and safe non-WebPKI certificate support with certificate-chain pinning to ensure it can withstand more kinds of censorship, including SNI allowlisting and the rapid blocking of distributed bridges."
"SNI imitation" and "non-WebPKI certificate support" sounds like it could be useful for purposes other than evading censorship in any particular country
Discerning web users around the globe might also be interesting evading data collection, surveillance and ads by so-called "tech" companies, for example
https://blog.torproject.org/introducing-webtunnel-evading-ce...
- Do they have official instructions on how to setup (which URLs for STUN, etc - there are a couple required) TOR via Snowflake on desktop (bc on Android it all seems to be bundled inside Orbot)?
by keepamovin
5 subcomments
- Legal question for the Tor team (disclaimer, I love Tor and use it in BrowserBox):
- Does Tor need an OFAC license to supply to Russian and Iranian (and other sanctioned entities)? What's your approach to stay compliant and globally helpful? I know 50% of your funding comes from US government (or did a few years back, still?), does this give you extra pathways to engage those regions?
I'm wondering because the system would seem to fall under ITAR due to its encryption, and even if non-ITAR is still a cyber product and these countries are heavily OFAC listed rn.
This is relevant for me right now as I was recetnyl contact by a significant entity in a sanctioned region with a massive deal for BrowserBox. Applying for an OFAC license to see if it's possible to serve them (but we have to make final determination on ethics/legal even if license is approved, I guess). My feeling is that broad sanctions don't hurt the things they are meant to but punish people in all countries from forming transnational links that might actually help to prevent conflicts and build relations however small. Idk, just my reflections after encountring this situation.
- I love how this goes on about Iran and Russia but not the obvious issues elsewhere.
by NoiseBert69
0 subcomment
- I'd really love to see native DNS Tunneling in Tor.
- Oh now you care, while conservatives were censored since 2020...
by reop2whiskey
0 subcomment
- [dead]
by Slava_Propanei
0 subcomment
- [dead]
- [dead]
by meowmeowmeowa
0 subcomment
- [dead]
by iwontberude
0 subcomment
- [flagged]
by KnuthIsGod
0 subcomment
- [flagged]