▲ | HDThoreaun a day ago | |||||||||||||||||||||||||
There are ways around this too. When the VPN entrance point is a static IP a ban may work but what happens when a product shows up that spins up dynamic VPSs in the public cloud? All the cloud providers have free trials that let people do this for free forever. Sounds difficult but surely people will come up with a streamlined approach if push comes to shove. Even in china where using a VPN is a major crime they are unable to stop people from using them. | ||||||||||||||||||||||||||
▲ | gorgoiler a day ago | parent [-] | |||||||||||||||||||||||||
Off the top of my head here are some ways you could fairly easily shut down VPNs. The big one is to start whitelisting good protocols only. That means everything must be https and you have to at least pass the hostname in plaintext. Random traffic on UDP ports is now illegal as it is assumed to be VPN traffic. Another one is to pass a law telling ISPs to flag customers with traffic patterns only to a single IP address, set of IP addresses, or a single ASN. This means that you can’t just tunnel everything to your VPS in Amsterdam. You might also pass a law that still allows, say, ssh and random UDP traffic, but with the provision that bandwidth on any non HTTPS ports is capped at 200kbps. You only use ssh for running a shell after all — why would you need more than that! /s ASNs are a fun feature of the internet in that there are a lot of them but they are finite and scale on the order of organised human activity, mostly businesses. That means it is eminently tractable to categorize them all and regulate traffic from residential ISPs to commercial services ISPs only, and throttle traffic from home users to hosting providers. This already happens — try connecting to Reddit from anything other than a residential IP address. | ||||||||||||||||||||||||||
|