Remix.run Logo
mrtksn 5 hours ago

Do they have something like intranet with some local services, like in DPRK&Cuba? is this the case of completely losing connection and devices practically bricked for anything other than displaying the time?

siev 5 hours ago | parent [-]

We do. It's not very good. As in, there isn't even a properly functioning domestic search engine that can match the quality of anything past AltaVista. The only local platforms worth a damn are the ones you'd be using anyway. (the local equivalents to Uber, Maps etc.)

All other platforms (instant messengers, social media, news) are massively unpopular for being horrid to use at best, and government spyware at worst.

To slow down the immediate damage the government has rolled back a few of the recent restrictions, hence why I can access HN. Among Google and a handful of other basic websites. But they are obviously experimenting and trying to figure out how much censorship they can get away with. There is talk of a planned "whitelisting" of the country's internet. Where almost all but a few big important services are blocked completely. This would have the bonus effect of making circumvention using VPNs and other methods even more difficult than it already is.

breppp 4 hours ago | parent [-]

for someone with a tech background, how hard is it to setup your own tunnel? I'd assume cloud providers are whitelisted due to economic reasons?

e-khadem 4 hours ago | parent [-]

Lol. That was _before_ these new restrictions. And don't assume that you could setup a simple wireguard server and be done with it. No, it had to be a proper low fingerprint method (e.g., you had to hide the tls-in-tls timing pattern and do traffic shaping). Now, something like dnstt sometimes works, sometimes doesn't. You may be able to open gmail in 10 minutes if it does, and you explicitly have to block the fonts.

yard2010 3 hours ago | parent | next [-]

Dam I feel so sorry for you :( At first I thought like gp, bypass it, then I realized you don't have the privilege to bypass it and leave trails behind. It's not like using a vpn to watch netflix of another country, as netflix won't knock on your door.

I wish you all the best. Stay safe my friend.

haute_cuisine an hour ago | parent | prev | next [-]

What about SSH? Does it work? If yes, you can use some TUI browser as it would only pass updated SSH screen

N19PEDL2 2 hours ago | parent | prev | next [-]

> it had to be a proper low fingerprint method (e.g., you had to hide the tls-in-tls timing pattern and do traffic shaping).

Can anyone recommend a good book, video course or other material to learn more about these topics?

e-khadem an hour ago | parent | next [-]

FOCI papers[1] are great IMO, but some of submissions are just an academic curiosity, not a practical solution that works for the average Joe at a low cost and scale. For practical methods that are heavily used, you can take a look at popular opensource implementations and their documentation. Sing-box, Xray core, hiddify (their patches on top of xray and singbox), shadowsocks and shadowtls, and many more. ShadowTLS provides a good starting point with a fairly detailed documentation and clearly describes the development process.

The way that I see it, its not just a technical problem anymore. It's about making the methods as diverse as possible and to some extent messing up the network for everyone. In other words, we should increase the cost and the collateral damage of widespread censorship. As an anecdotal data point, the network was quite tightly controlled / monitored around 2023 in Iran and nothing worked reliably. Eventually people (ab)used the network (for example the tls fragments method) to the extent that most of the useful and unrelated websites (e.g., anything behind cloudflare, most of the Hetzner IPv4 addresses, and more) stopped working or were blocked. This was an unacceptably high collateral damage for the censors (?), so they "eased" some of the restrictions. Vless and Trojan were the same at that time and didn't work or were blocked very quickly, but they started working ~reliably again until very recently.

[1] https://www.petsymposium.org/foci/

nerdsniper 2 hours ago | parent | prev [-]

https://people.cs.umass.edu/~amir/papers/parrot.pdf

Here's an overview. Be warned, the conclusion is:

> We enumerate the requirements that a censorship-resistant system must satisfy to successfully mimic another protocol and conclude that “unobservability by imitation” is a fundamentally flawed approach.

breppp 2 hours ago | parent | prev [-]

sorry if it came out as patronizing, I was genuinely curious as to the difficulty of bypassing these