_______               __                   _______
       |   |   |.---.-..----.|  |--..-----..----. |    |  |.-----..--.--.--..-----.
       |       ||  _  ||  __||    < |  -__||   _| |       ||  -__||  |  |  ||__ --|
       |___|___||___._||____||__|__||_____||__|   |__|____||_____||________||_____|
                                                             on Gopher (inofficial)
   URI Visit Hacker News on the Web
       
       
       COMMENT PAGE FOR:
   DIR   Ask HN: The government of my country blocked VPN access. What should I use?
       
       
        rd07 wrote 8 min ago:
        I live in Indonesia, and I don't find any recent news that mention X
        (formerly Twittwr) and or Discord being blocked by the government. The
        only relevant news from a quick Google search I can find is about the
        government threatened to block X due to pornography content in 2024.
        You can even check for yourself if a domain is blocked by visiting [1]
        .
        
        Also for your unability to access the VPN, as far as my experience
        goes, in the past some providers do block access to VPN. But, I am not
        experiencing that for at least the last 5 years.
        
        So, maybe you can try changing your internet provider and see if you
        can connect to VPN?
        
   URI  [1]: https://trustpositif.komdigi.go.id/
       
        lidder86 wrote 18 min ago:
        surfshark works also Im on MTM no issues! Same with Biznet
       
        dboreham wrote 19 min ago:
        The closest I've come to this is on an airplane where almost everything
        was blocked. SSTP to a server I spun up worked well.
       
        andrewinardeer wrote 25 min ago:
        Weird. I'm in Indonesia and can access VPNs, X and Discord.
       
          ies7 wrote 23 min ago:
          I just wake up in Jakarta and there is nothing wrong with X or
          Discord
       
        oleksandr_l5 wrote 29 min ago:
        SSTP or other HTTPS like VPN
       
        nneonneo wrote 33 min ago:
        An expensive but functional option is to enable roaming on a foreign
        eSIM. Getting an eSIM is relatively easy. Roaming mobile traffic is
        routed from the country in which the SIM is from, not the country that
        you're in, meaning that an eSIM from e.g. an American carrier will not
        be subject to the censorship in your country.
        
        I've used this on multiple trips to China over the past decade
        (including a trip last year). You can find carriers that will charge
        very low (or even no) roaming rates.
       
        breve wrote 33 min ago:
        You should use people power to work to make Indonesia a more open,
        democratic society.
        
        Yes, it's hard work. Yes, it will take a long time. Yes, you personally
        may not get very far with your efforts.
        
        But if Indonesians don't take responsibility for and work to improve
        Indonesia then the rest of it doesn't matter.
       
          protocolture wrote 28 min ago:
          Part of that is knowing whats happening inside the country, of which
          they were previously using tools like discord, which have now been
          blocked. So the first step to using people power to make Indonesia a
          more open, democratic society would be to find a way to tunnel out to
          get and share that information. To that end the OP has created this
          Ask HN thread.
       
            breve wrote 22 min ago:
            Nope. The outside doesn't matter. The problem is on the inside.
            External websites will never fix the internal problem.
            
            There are no technical solutions to what is fundamentally a problem
            of political culture.
       
        mlhpdx wrote 36 min ago:
        A question related to the question, for which I apologize:
        
        It seems to me that using WireGuard (UDP) in conjunction with something
        like Raptor Forward Error Correction would be somewhat difficult to
        block. A client could send to and receive from a wide array of
        endpoints without ever establishing a session and communicate privately
        and reliably, is that correct?
       
        lifeisstillgood wrote 50 min ago:
        I’m not sure this is the right conversation right now, but is this
        thread heading towards “how do we make totalitarian governments
        become liberal democracies?”
        
        It’s a nice technical question on how to run a VPN but the ultimate
        goal is not the best technical solution but the ability to avoid
        detection by the state. And that’s not a technical problem but an
        opsec one
        
        If someone is participating in online discussions (discord and twitter)
        to spread local news - then it’s hard to know who is who, and who to
        trust - and that’s kind of the why Arab spring did not spring “hey
        wear a red carnation and meet me by the corner” can become a death
        sentence
        
        The answer to opsec is avoid all digital comms - but at this point you
        are seriously into “regieme change”, or just as Eastern Europe did,
        keep your heads down for forty years and hope those who leave you
        economically behind will half bankrupt them selves bringing you back.
        
        I think in the end, a thriving middle class with a sufficient amount of
        land reform, wealth taxes which can over a generation push for
        liberalisation sounds a good idea.
        
        Our job in the very lucky liberal
        West is to keep what our forefathers won, and then push it further to
        show why our values are worth the sacrifice in copying
       
        Beijinger wrote 1 hour 1 min ago:
        Use Astrill - if you can afford. You could try AirVPN, much cheaper,
        but if Astrill does not work, probably no VPN will. [1] Why is
        Indonesia in chaos?
        
   URI  [1]: https://expatcircle.com/cms/privacy/vpn-services/
       
        RajT88 wrote 1 hour 4 min ago:
        Somewhat dated read here: [1] Some good ideas, though.    There seems to
        be OSS alternatives for TailScale control servers which would make it
        harder to block - I'd go that route.  The top recommendation boils down
        to, "Set up several different methods, and one will always work".
        
   URI  [1]: https://www.reddit.com/r/Tailscale/comments/16zfag4/traveling_...
       
        cabirum wrote 1 hour 11 min ago:
        sshuttle.  
        Tunnel your connections inside ssh.
       
        yegor wrote 1 hour 23 min ago:
        Full disclosure, I run a commercial VPN service (Windscribe).
        
        There are 2 paths you can take here:
        
        1. Roll your own VPN server on a VPS at a less common cloud provider
        and use it. If you're tech savvy and know what you're doing, you can
        get this going in <1hr. Be mindful of the downsides of being the sole
        user of your custom VPN server you pay for: cloud providers log all TCP
        flows and traffic correlation is trivial. You do something "bad", your
        gov subpoenas the provider who hands over your personal info. If you
        used fake info, your TCP flows are still there, which means your ISP's
        IP is logged, and deanonymizing you after that is a piece of cake (no
        court order needed in many countries).
        
        2. Get a paid commercial VPN service that values your privacy, has a
        diverse network of endpoints and protocols. Do not use any random free
        VPN apps from the Play/App stores, as they're either Chinese honeypots
        ( [1] ) or total scams ( [2] ).
        
        Do not go with a VPN service that is "mainstream" (advertised by a
        Youtuber) or one that has an affiliate program. Doing/having both of
        these things essentially requires a provider to resort so dishonest
        billing practices where your subscription renews at 2-5x of the
        original price. This is because VPNs that advertise or run affiliate
        programs don't make a profit on the initial purchase for that amazing
        deal thats 27 months with 4 months free or whatever the random numbers
        are, they pay all of this to an affiliate, sometimes more. Since
        commercial VPNs are not charities, they need ROI and that comes only
        when someone rebills. Since many people cancel their subscriptions
        immediately after purchase (to avoid the thing that follows) the rebill
        price is usually significantly more than the initial "amazing deal".
        This is why both Nord and Express have multiple class action lawsuits
        for dishonest billing practices - they have to do it, to get their bag
        (back). It's a race to the bottom of who can offer the most $ to
        affiliates, and shaft their customers as the inevitable result.
        
        Billing quirks aside, a VPN you choose should offer multiple VPN
        protocols, and obfuscation techniques. There is no 1 magic protocol
        that just works everywhere, as every country does censorship
        differently, using different tools.
        
        - Some do basic DNS filtering, in which case you don't need a VPN at
        all, just use an encrypted DNS protocol like DOH, from any provider
        (Cloudflare, Google, Control D[I also run this company], NextDNS,
        Adguard DNS)
        
        - Then there is SNI filtering, where changing your DNS provider won't
        have any effect and you will have to use a VPN or a secure proxy (HTTPS
        forward proxy, or something fancier like shadowsocks or v2ray).
        
        - Finally there is full protocol aware DPI that can be implemented with
        various degrees of aggressiveness that will perform all kinds of unholy
        traffic inspection on all TCP and UDP flows, for some or all IP
        subnets.
        
        For this last type, having a variety of protocols and endpoints you can
        connect to is what's gonna define your chance of success to bypass
        restrictions. Beyond variety of protocols, some VPN providers (like
        Windscribe, and Mullvad) will mess with packets in order to bypass DPI
        engines, which works with variable degree of success and is very
        region/ISP specific. You can learn about some of these concepts in this
        very handy project: [3] (we borrow some concepts from here, and have a
        few of our own).
        
        Soooo... what are good VPNs that don't do shady stuff, keeps your
        privacy in mind, have a reasonably sized server footprint and have
        features that go beyond basic traffic proxying? There is IVPN, Mullvad,
        and maybe even Windscribe. All are audited, have open source clients
        and in case of Windscribe, also court proven to keep no logs (ask me
        about that 1 time I got criminally charged in Greece for actions of a
        Windscribe user).
        
        If you have any questions, I'd be happy to answer them.
        
   URI  [1]: https://www.bitdefender.com/en-us/blog/hotforsecurity/china-li...
   URI  [2]: https://www.tomsguide.com/computing/vpns/this-shady-vpn-has-se...
   URI  [3]: https://github.com/ValdikSS/GoodbyeDPI
       
          king_of_shit wrote 24 min ago:
          TIL
       
        mulchpower wrote 1 hour 44 min ago:
        URnetwork works where many don't [1] . It used a grab bag of
        techniques, open source
        
   URI  [1]: http://ur.io
       
        moralestapia wrote 1 hour 45 min ago:
        Can you SSH outside the country?
        
        If so, then you have a VPN.
       
        jay-418 wrote 1 hour 51 min ago:
        Censorship circumvention tools specialize in this, and are extensively
        used in China, Iran, and Russia. I work on Lantern, and we're not
        seeing any significant interruptions to connections in Indonesia at the
        moment. [1] Hope it helps!
        
   URI  [1]: https://lantern.io/download
       
        joshryandavis wrote 2 hours 2 min ago:
        I lived in China for a while and there were several waves of VPN
        blocks. Also very few VPN services even try to actively support
        VPN-blocking nations anymore. Any commercial offering will be blocked
        eventually.
        
        What I settled on for decent reliability and speeds was a free-tier EC2
        hosted in an international region. I then setup a SOCKS5 server and
        connected my devices to it. You mentioned Cloudflare so whatever their
        VM service is might also work.
        
        It's very low profile as it's just your traffic and the state can't
        easily differentiate your host from the millions of others in that
        cloud region.
        
        LPT for surviving the unfree internet: GitHub won't be blocked and
        you'll find all the resources and downloads you need for this method
        and others posted by Chinese engineers.
        
        Edit: If you're worried about being too identifiable because of your
        static IP, well it's just a computer, you can use a VPN on there too if
        you want to!
       
          bekicot wrote 58 min ago:
          GitHub was briefly blocked a couple of years ago in Indonesia. SSH
          was also blocked briefly by one of the largest mobile providers.
       
          redleader55 wrote 1 hour 20 min ago:
          The VM instance is good for setting up a VPN tunnel, but it's not
          good in terms of bandwidth if it's hosted in. Because of DPI
          capacity, China has a very limited amount of "real internet"
          bandwidth. A more capable setup is to have one VM on each side of the
          firewall on an hosting service with peering between inside and
          outside - Aliyun (Alibaba Cloud) is an example. The "inside" VM could
          be just "socat UDP4-RECVFROM:,fork UDP4-SENDTO::" or something done
          using netfilter.
          
          Like others commented in this thread, having an obfuscator is a good
          idea to ensure the traffic is not dropped by DPI.
          
          When the inevitable ban comes and your VPN stops working, rotate the
          IP of the external VPN and update the firewall/socat config to
          reflect it. Usually, the internal VM's IP doesn't need to be updated.
       
            77pt77 wrote 1 hour 12 min ago:
            How easy is it to get a VPS in China.
            
            Could HK work?
       
              redleader55 wrote 1 hour 2 min ago:
              HK "outside" the firewall, for now. It's where you would place
              the outside VM.
       
          wulfstan wrote 1 hour 37 min ago:
          When I worked in China (not for long periods but frequently enough
          that the Great Firewall became an irritant) I hosted an OpenVPN
          server on port 443 and/or port 22 of a server I owned. That worked
          sufficiently well most of the time.
       
            77pt77 wrote 1 hour 10 min ago:
            Which is ridiculous because OpenVPN is trivial to identify, even
            when over TCP since it's different from "regular" HTTPS/SSL
            traffic.
            
            Why they chose this I have no idea.
            
            You can even port share.
            
            443 -> Web server for HTTPS traffic
            443 -> OpenVPN for OpenVPN traffic
            
            Still trivial to identify and not uncommon for even public WiFi to
            do so.
            
            Since I changed to tailscale+headscale with my own derp server all
            these issues have disappeared (for now).
       
            ykl wrote 1 hour 19 min ago:
            This doesn't work anymore; the GFW no longer detects VPN
            connections by port but instead by performing deep packet
            inspection to characterize the type of traffic going over every
            connection. Using this technique in combination with some advanced
            ML systems, they're able to detect any encrypted VPN connection and
            cut it off; it's basically not possible to run any kind of outbound
            VPN connection (even to private servers) from inside of China
            anymore, and it's usually not even possible to _tunnel_ a VPN
            connection through some other protocol because the GFW now detects
            that too.
            
            Stepping back and looking at it from a purely technical
            perspective, it's actually insanely impressive.
            
            Here's a USENIX paper from a few years ago on how it is done:
            
   URI      [1]: https://gfw.report/publications/usenixsecurity23/en/
       
              eqvinox wrote 55 min ago:
              This is what IPsec TFS is for [ [1] ]
              
              > the focus in this document is to enhance IP Traffic Flow
              Security (IP-TFS) by adding Traffic Flow Confidentiality (TFC) to
              encrypted IP-encapsulated traffic.  TFC is provided by obscuring
              the size and frequency of IP traffic using a fixed-size,
              constant-send-rate IPsec tunnel
              
              (If they block a constant rate stream, that'll hit a whole ton of
              audio/video streaming setups)
              
   URI        [1]: https://datatracker.ietf.org/doc/rfc9347/
       
              wulfstan wrote 58 min ago:
              That is impressive. Beyond bonkers, but impressive.
       
              tracker1 wrote 1 hour 3 min ago:
              Assuming they don't MITM SSH, you should still be able to use
              something like wireguard over an SSH tunnel.  At least I would
              think.. it's all SSH traffic as far as any DPI listener is
              concerned, you'd of course need to ensure the connection
              signature through another vector though.
       
              77pt77 wrote 1 hour 4 min ago:
              > it's basically not possible to run any kind of output VPN
              connection (even to private servers) from inside of China
              anymore.
              
              What if you run your own HTTPS server that look semi-legitimate
              and just encapsulate it in that traffic?
              
              Can they still detect it?
              
              What about a VPS in HK? Is this even doable?
       
              IshKebab wrote 1 hour 4 min ago:
              > it's basically not possible to run any kind of outbound VPN
              connection (even to private servers) from inside of China
              anymore.
              
              Really? Because the paper you linked says they don't block any
              TLS connections so you can just run a VPN over TLS:
              
              > TLS connections start with a TLS Client Hello message, and the
              first three bytes of this message cause the GFW to exempt the
              connection from blocking.
       
        tonymet wrote 2 hours 6 min ago:
        try Bright Data / luminati and the traffic is http to the proxy as
        well.
       
        thewanderer1983 wrote 2 hours 13 min ago:
        Go here. [1] Very helpful community.
        
   URI  [1]: https://github.com/net4people/bbs/issues
       
        Gud wrote 2 hours 15 min ago:
        Try a ssh socks5 proxy to a cheap vps.
        
        It worked well for me in UAE when other solutions didn’t
       
        pshirshov wrote 2 hours 15 min ago:
        You should use a jet. Actually that's a Russian joke.
       
        qwezxcrty wrote 2 hours 21 min ago:
        Chinese have developed a significant amount of sophisticated tools
        countering internet censorship. V2ray as far as I recall is the
        state-of-the-art.
        
        To use them, one need to first rent a (virtual) server somewhere from a
        foreign cloud provider as long as the payment does not pose a problem.
        The first step sometimes proves difficult for people in China, but
        hopefully Indonesia is not at that stage yet. What follows is
        relatively easy as there are many tutorials for the deployment like:
        
   URI  [1]: https://guide.v2fly.org/en_US/
       
          mrbluecoat wrote 2 hours 19 min ago:
          Agreed, the best tools for circumventing The Great Firewall of China
          are from Chinese developers. [1] comes to mind..
          
   URI    [1]: https://github.com/txthinking/brook
       
        puffybuf wrote 2 hours 27 min ago:
        I like mullvad. You can buy a prepaid card off amazon. I figured out
        how to setup wireguard on various unixes Mac/linux/openbsd
       
        ivape wrote 2 hours 29 min ago:
        SSH tunnel on cheap VPS, a couple.
       
        yannick wrote 2 hours 37 min ago:
        does this include bali? curious as that would impact the large
        international population.
       
        zhengiszen wrote 2 hours 39 min ago:
        Use an ethical one
        
   URI  [1]: https://www.boycat.io/vpn
       
        fruitworks wrote 2 hours 53 min ago:
        Try looking into tor bridges.
        
        You could also buy a VPS and use SSH tunneling to access a tor daemon
        running on a VPS. Host some sort of web service on the VPS so it looks
        inconspicuous
       
        arewethereyeta wrote 2 hours 53 min ago:
        Give Trojan proxy a try. It's supposed to go unnoticed since it works
        on the https port 443. Something like: [1] If you get it with a
        residential IP is even better. Works great in Iran and China and i
        suspect will wotk great for you too
        
   URI  [1]: https://www.anonymous-proxies.net/products/residential-trojan-...
       
        thinkingtoilet wrote 2 hours 55 min ago:
        Please consider the potential consequences of circumventing the ban. Do
        what you do, but above all stay safe!
       
        farceSpherule wrote 2 hours 55 min ago:
        If you are a journalist or other, contact Team Cymru.
       
        gudzpoz wrote 2 hours 57 min ago:
        As someone based in China, it's a bit surprising that techniques used
        by Chinese people get very few mentions here, while I do think they are
        quite effective against access blocking, especially after coevolving
        with GFW for the past decade. While I do hope blocking in Indonesia
        won't get to GFW level, I will leave this here in case it helps.
        
        I found this article [0] summarizing the history of censorship and
        anti-censorship measures in China, and I think it might be of help to
        you if the national censorship ever gets worse. As is shown in the
        article, access blocking in China can be categorized into several
        kinds: (sorted by severity)
        
        1. DNS poisoning by intercepting DNS traffic. This can be easily
        mitigated by using a DOT/DOH DNS resolver.
        
        2. Keyword-based HTTP traffic resetting. You are safe as long as you
        use HTTPS.
        
        3. IP blocking/unencrypted SNI header checking. This will require the
        use of a VPN/proxy.
        
        4. VPN blocking by recognizing traffic signatures. (VPNs with
        identifiable signatures include OpenVPN and WireGuard (and Tor and SSH
        forwards if you count those as VPNs), or basically any VPN that was
        designed without obfuscation in mind.) This really levels up the
        blocking: if the government don't block VPN access, then maybe any VPN
        provider will do; but if they do, you will have a harder time finding
        providers and configuring things.
        
        5. Many other ways to detect and block obfuscated proxy traffic. It is
        the worse (that I'm aware of), but it will also cost the government a
        lot to pull off, so you probably don't need to worry about this. But if
        you do, maybe check out V2Ray, XRay, Trojan, Hysteria, NaiveProxy and
        many other obfuscated proxies.
        
        But anyways, bypassing techniques always coevolve with the blocking
        measures. And many suggestions here by non-Indonesian (including mine!)
        might not be of help. My personal suggestion is to find a local tech
        community and see what techniques they are using, which could suit you
        better.
        
        [0]
        
   URI  [1]: https://danglingpointer.fun/posts/GFWHistory
       
          mxie-ca wrote 2 hours 32 min ago:
          Thanks for the link!
          
          Is there any good DoT/DoH DNS resolver that works well in China? I
          know I can build one myself, but forwarding all DNS requests to my
          home server in NA slows down all connections...
       
        more_corn wrote 2 hours 57 min ago:
        You could rent a cheapo instance at a cloud provider and tunnel https
        over ssh.
        
        That’s basically undetectable. Long lived ssh connection? Totally
        normal. Lots of throughput? Also normal. Bursts throughput? Same.
        
        Not sure how to do this on mobile.
        
        Tailscale might be an option too (they have a free account for
        individuals and an exit node out of country nearly bypasses your
        problem) It uses wireguard which might not be blocked and which comes
        with some plausible deniability. It’s a secure network overlay not a
        VPN. It just connects my machines, honest officer.
       
        weregiraffe wrote 3 hours 0 min ago:
        You should use another government.
       
        ryzvonusef wrote 3 hours 4 min ago:
        I live in Pakistan and two years back we had this exact same problem,
        (election interference) and frankly, you just try to scrape through
        solutions, but without an answerable government, there is little you
        can do.
        
        We tried things like Proton VPN and Windscribe VPN, as well as enabling
        MT proxy on Telegram, but soon govts find it easier to just mass ban
        internet access.
        
        Use Netblocks.org to analyse the level of internet blockage and try to
        react accordingly.
       
        asdefghyk wrote 3 hours 6 min ago:
        shortwave radios would enable you to still get news of major events -
        not 2 way though
       
        teaga wrote 3 hours 14 min ago:
        Launch an EC2 instance in the US region (Ubuntu, open ports 22 and
        1194), then connect via SSH and run the OpenVPN install script.
        Generate the .ovpn profile with the script and download it to your
        local machine. Finally, import the file into the OpenVPN client and
        connect to route traffic through the US server.
       
        nine_k wrote 3 hours 17 min ago:
        XRay / XTLS-Reality / VLESS work rather fine, and is said to be very
        hard to detect, even in China.
        
        I followed [1] to set up my own proxy, which works pretty fine. More
        config examples may be helpful, e.g. [2].
        
        [1]
        
   URI  [1]: https://cscot.pages.dev/2023/03/02/Xray-REALITY-tutorial/
   URI  [2]: https://github.com/XTLS/Xray-examples/blob/main/VLESS-TCP-XTLS...
       
          gck1 wrote 41 min ago:
          Also sing-box [1]. I don't use it for its primary use case of
          censorship circumvention, but rather for some highly complex routing
          configurations it supports.
          
          My use case consists of passing some apps on my Android through
          interface A (e.g. banking apps through my 5G modem), some apps
          through US residential proxy (for US banks that don't like me
          visiting from abroad), and all the rest through VPN. And no root
          required!
          
          It's wild that GFW triggered creation of this and nothing like it
          existed / exists.
          
          [1] 
          
   URI    [1]: https://github.com/SagerNet/sing-box
       
          taminka wrote 1 hour 11 min ago:
          im curious, isn't ALL of your traffic appearing to be to just one
          website the most obvious giveaway?
       
            akho wrote 38 min ago:
            *ray clients typically allow configuration of routing. So you can
            send only blocked stuff through the tunnel; or, in reverse, send
            some known-working stuff (e. g. local domain) direct. Also works as
            adblock.
       
          zeropointsh wrote 2 hours 53 min ago:
          The great thing about China's Great Firewall is that really good
          options to circumvent censorship have been around for a while. Was
          waiting for someone to bring up XRay! Alternatively, here is a great
          write up of using V2Ray[1]. May be worth OP looking into, as a
          blogger I found noted[2] is an alternative to a VPN, and may work.
          [1]
          
   URI    [1]: https://www.v2ray.com/en/
   URI    [2]: https://sequentialread.com/v2ray-caddy-to-access-the-interne...
       
        theyknowitsxmas wrote 3 hours 19 min ago:
        OVH VPS-1 and your own configuration.
       
        swe_dima wrote 3 hours 23 min ago:
        Personally, I like Amnezia VPN, it has some ways to work around blocks:
        [1] You can very easily self-host it, their installer automatically
        works on major cloud platforms.
        
        Though if Indonesia has blocked VPNs only now, possibly they only block
        major providers and don't try to detect the VPN protocol itself, which
        would make self-hosting any VPN possible.
        
   URI  [1]: https://amnezia.org/en
       
        teekert wrote 3 hours 26 min ago:
        What is going on if you don’t mind my asking? Our local news does not
        mention anything. Nor does ddging help? Any sources?
       
          nograpes wrote 3 hours 10 min ago:
          Massive protests have occurred due to obvious government corruption.
          In particular the housing allowance for a month for a parliamentarian
          is now ten times the minimum wage for a month. [1] Sorry I don't have
          a better freely accessible source, maybe someone with more knowledge
          can fill it in.
          
   URI    [1]: https://www.theguardian.com/world/2025/aug/26/indonesia-prot...
       
            jacobgkau wrote 2 hours 42 min ago:
            > the housing allowance for a month for a parliamentarian is now
            ten times the minimum wage for a month.
            
            I'm almost positive that everyone in the US Congress is making at
            least ten times the minimum wage in this country. The "housing
            allowance" being referred to is separate from their normal salary
            in Indonesia, but still, interesting to imagine how much more
            seriously people there would take that disparity than in many other
            countries.
            
            This caught my attention more:
            
            > Indonesia passed a law in March allowing for the military to
            assume more civilian posts, while this month the government
            announced 100 new military battalions that will be trained in
            agriculture and animal husbandry. In July the government said the
            military would also start manufacturing pharmaceuticals.
            
            They're replacing civilian industry with military, apparently not
            out of any emergency requirement but just to benefit the military
            with jobs (and the government with control over those sectors) at
            the expense of civilian jobs.
       
        VortexLain wrote 3 hours 32 min ago:
        The most effective solution is to use X-ray/V2ray with VLESS, or VMESS,
        or Trojan as a protocol.
        
        Another obfuscated solution is Amnezia
        
        If you are not ready to set up your own VPN server and need any kind of
        connection right now, try Psiphon, but it's a proprietary centralized
        service and it's not the best solution.
       
        trhway wrote 3 hours 34 min ago:
        HTTPS to you own proxy on a foreign VPS.
       
        o999 wrote 3 hours 39 min ago:
        AmneziaWG client worked just fine with normal Wireguard servers in
        Egypt where official Wireguard clients doesn't, WGTunnel app on android
        support both protocols. [1]
        
   URI  [1]: https://github.com/amnezia-vpn/amneziawg-go
   URI  [2]: https://github.com/wgtunnel/wgtunnel
       
        leishman wrote 3 hours 41 min ago:
        I'd recommend Obscura because it uses Wireguard over QUIC and it pretty
        good at avoiding these blocks. It's also open source.
       
        throwpoaster wrote 3 hours 41 min ago:
        Emigration.
       
        gwbas1c wrote 3 hours 41 min ago:
        Just curious: Anyone know if things like Starlink are viable?
       
          akho wrote 29 min ago:
          Starlink, by policy, connects you through a ground station in the
          same country. They wouldn't be allowed to operate otherwise.
       
        nromiun wrote 3 hours 43 min ago:
        Usually when countries block websites they don't block major cloud
        providers, like AWS and Google Cloud. Because most websites are hosted
        on them. So you can get a cheap VPS from AWS or GCP (always free VM is
        available) and host OpenVPN on it.
       
        darkhorn wrote 3 hours 47 min ago:
        People in Turkey use [1] together with DNS over HTTPS (DoH).
        
   URI  [1]: https://github.com/ValdikSS/GoodbyeDPI
       
        jeffbee wrote 3 hours 48 min ago:
        Use an Actual Private Network? Radio links that you control. Peer with
        someone who owns a Starlink terminal. Rent instances in GCP's Jakarta
        datacenter.
       
          jasonjayr wrote 3 hours 12 min ago:
           [1] <-- "Radio links you control", and is hard to block/detect.
          
   URI    [1]: https://en.wikipedia.org/wiki/AMSAT-OSCAR_7#Use_by_Polish_an...
       
        afh1 wrote 3 hours 52 min ago:
        Depending on the circumstances, maybe ditch the landline local ISP for
        a satellite connection with a foreign ISP?
       
        jinnko wrote 3 hours 52 min ago:
        AmneziaVPN has censorship circumvention options and makes it easy to
        set up a self hosted instance of that's what you prefer, or use their
        hosted service.
        
   URI  [1]: https://amnezia.org/
       
        database64128 wrote 3 hours 52 min ago:
        You could use something like [1] to obfuscate WireGuard traffic.
        
        Using full-blown VPNs under such environments has the disadvantage of
        affecting your use of domestic web services. You might want to try
        something like [2] , which allows you to route traffic based on domain
        and IP geolocation rules.
        
   URI  [1]: https://github.com/database64128/swgp-go
   URI  [2]: https://github.com/database64128/shadowsocks-go
       
        ck2 wrote 3 hours 59 min ago:
        Just please be safe and necessarily paranoid
        
        One way they tend to "solve" workarounds is making examples of people
       
        ok123456 wrote 4 hours 6 min ago:
        ssh -D 48323 -p 61423 my-vps.big-company.com
       
        ddtaylor wrote 4 hours 7 min ago:
        Your first option until you get settled is to use an SSH reverse proxy:
        
            ssh -D 9999 user@my.server
        
        Then configure your browser to use local port 9999 for your SOCKS5
        proxy.
        
        This gets you a temporarily usable system and if you can tunnel this
        way successfully installing some WireGuard or OpenVPN stuff will likely
        work.
        
        EDIT: Thanks it's -D not -R
       
          hdgvhicv wrote 3 hours 33 min ago:
          It’s -D, -R is for forwarding specific ports.
       
            ddtaylor wrote 3 hours 5 min ago:
            Thanks I have updated my comment as well.
            
            Sorry for the brain rot!
       
        TZubiri wrote 4 hours 8 min ago:
        
        
   URI  [1]: https://www.youtube.com/watch?v=lbOtyWTRZ_g
       
        princevegeta89 wrote 4 hours 8 min ago:
        OP, you can rent a VPS from a reputable and cheap provider within the
        NA region - OVH, Vultr, Linode etc. are decent. Also check out
        lowendtalk.com
        
        Then, setup Tailscale on the server. You can VPN into it and
        essentially browse the internet as someone from NA.
       
          teekert wrote 3 hours 13 min ago:
          From some of the comments here I get why you are downvoted. But tbh I
          would also have gone that route. So are we just inexperienced? I read
          here indeed that wireguard is very easily blocked. It was at the
          company I worked for but then I just set port 23 (who uses ftp
          anyways??). And it worked. But why is this still bad then?
          
          Obviously I have 0 real experience with this.
       
            princevegeta89 wrote 2 hours 25 min ago:
            Well, I mean, Tailscale is pretty easy overall. When client apps
            get blocked, you can literally hook up your router into Tailscale
            if needed, or you can run a headless version of Tailscale on your
            home server or the very machine you are on.
            
            It should also be possible to use a tunnel to get around the
            blocking of WireGuard, for example.
            
            You can then use it as an exit node if needed. It should work in
            theory, I have never tried this though. I just speak as a very
            frequent user of Tailscale with a bunch of nodes that are
            geographically located in different cities around me.
       
              teekert wrote 1 hour 46 min ago:
              Sure, I know and use it too. But I saw you being downvoted so I
              responded to that. I think, reading the rest of the thread, your
              response (as mine would be) does not work as signals 0 experience
              with actually oppressing regimes. Not?
       
        _verandaguy wrote 4 hours 11 min ago:
        Hello! I've got experience working on censorship circumvention for a
        major VPN provider (in the early 2020s).
        
        - First things first, you have to get your hands on actual VPN software
        and configs. Many providers who are aware of VPN censorship and cater
        to these locales distribute their VPNs through hard-to-block channels
        and in obfuscated packages. S3 is a popular option but by no means the
        only one, and some VPN providers partner with local orgs who can figure
        out the safest and most efficient ways to distribute a VPN package in
        countries at risk of censorship or undergoing censorship.
        
        - Once you've got the software, you should try to use it with an
        obfuscation layer.
        
        Obfs4proxy is a popular tool here, and relies on a pre-shared key to
        make traffic look like nothing special. IIRC it also hides the VPN
        handshake. This isn't a perfectly secure model, but it's good enough to
        defeat most DPI setups.
        
        Another option is Shapeshifter, from Operator ( [1] ). Or, in general,
        anything that uses pluggable transports. While it's a niche technology,
        it's quite useful in your case.
        
        In both cases, the VPN provider must provide support for these
        protocols.
        
        - The toughest step long term is not getting caught using a VPN. By its
        nature, long-term statistical analysis will often reveal a VPN
        connection regardless of obfuscation and masking (and this approach can
        be cheaper to support than DPI by a state actor). I don't know the
        situation on the ground in Indonesia, so I won't speculate about what
        the best way to avoid this would be, long-term.
        
        I will endorse Mullvad as a trustworthy and technically competent VPN
        provider in this niche (n.b., I do not work for them, nor have I worked
        for them; they were a competitor to my employer and we always respected
        their approach to the space).
        
   URI  [1]: https://github.com/OperatorFoundation
       
          ivanstepanovftw wrote 1 hour 13 min ago:
          This is no 'nothing special' with Obfs4proxy. DPI sees it as random
          byte stream, thus your government can decide to block unknown
          protocols. Instead, you should trick DPI into thinking it sees HTTPS.
          Unless your government decides to block HTTPS.
       
            rafram wrote 19 min ago:
            > your government can decide to block unknown protocols
            
            Has any government ever done that? Seems like it would just break
            everything (because the world is full of devices that use custom
            protocols!) at great computational expense.
       
          77pt77 wrote 1 hour 15 min ago:
          Obfs4proxy and Shapeshifter are an absolute PITA to install.
          
          Get your own VPS server (VPS in EU/US with 2GB of ram, 40GB of disk
          space and TBs/month of traffic go for $10 a year, it's that cheap).
          Never get anything in the UK and even USA is weird. I'd stick with
          EU.
          
          Install your software (wireguard + obsfuscation or even tailscale
          with your own DERP server)
          
          Another simpler alternative is just `ssh -D port` and use it as a
          SOCKS server. It's usually not blocked but very obvious.
       
            extraduder_ire wrote 13 min ago:
            Where are you finding a VPS in the EU for $10/year? Any I've seen
            are about 5-6 times that much.
       
            mrb wrote 53 min ago:
            In my experience, in China as of 2016, "ssh -D" vasn't reliable at
            all, I wrote more details at [1] (see "idea 1")
            
   URI      [1]: https://blog.zorinaq.com/my-experience-with-the-great-fire...
       
          mulchpower wrote 1 hour 23 min ago:
          There are some techniques like fragmented TLS and reordered packets
          that work in some cases. Also using vanilla HTTPS transport is a good
          start for many places. URnetwork is an open source, decentralized
          option that does all of these out of the box. You can get it on the
          major stores or F-Droid.
       
          teeray wrote 2 hours 32 min ago:
          > First things first, you have to get your hands on actual VPN
          software and configs.
          
          It would be nice if one of the big shortwave operators could datacast
          these packages to the world as a public service.
       
            mfiro wrote 1 hour 28 min ago:
            The problem is the countries, which censor Internet and block VPNs,
            also jam shortwave radio signals.
       
              SahAssar wrote 17 min ago:
              Could I ask for a source on that and how common it is?
              
              Seems like it was used way back in the cold war (and even then
              not blocked/jammed) and I'd guess that current authoritarian
              regimes would perhaps not bother considering how few could use
              it.
       
            downrightmike wrote 2 hours 10 min ago:
            
            
   URI      [1]: https://github.com/StreisandEffect/streisand
       
              NamTaf wrote 7 min ago:
              Streisand is extremely out of date and wouldn’t last long in
              China, but I don’t know how sophisticated Indonesia’s
              firewall is
       
          myshoemouth wrote 2 hours 38 min ago:
          I'm curious. How does a state actor do actual DPI without pushing
          certs to end user devices?
       
            trod1234 wrote 12 min ago:
            There are a couple of ways.
            
            The main one is called an Eclipse Attack in cyber circles, and it
            can be done at any entity operating at the ASN layer so long as
            they can position themselves to relay your traffic.
            
            The adversary can invisibly (to victim PoV) modify traffic if they
            have a cooperating rootPKI cert (anywhere in the ecosystem) that
            isn't the originating content provider, so long as they recognize
            the network signature (connection handshake); solely by terminating
            encryption early.
            
            Without a cert, you can still listen in with traffic analysis, the
            fetched traffic that's already been encrypted with their key (bit
            for bit), as known plaintext the math quickly reduces. SNI and a
            few other artifacts referencing the resources/sites are not part of
            the encrypted payload.
            
            Its more commonly known in a crypto context, but that kind of
            attack can happen anywhere. It even works against TOR. One of the
            first instances (afaik) was disclosed by Princeton researches in
            2015, under the Raptor paper.
       
            dev_l1x_be wrote 1 hour 15 min ago:
            Because you are leaking information left and right with TCP / DNS
            and all these basic protocols that powering the internet today.
            When these were designed people were happy that it worked at all
            and nobody really tought that it should be state actor proof.
            Except maybe DJB.
            
   URI      [1]: https://www.curvecp.org/
       
            unethical_ban wrote 2 hours 15 min ago:
            Patterns of data transmission (network behavioral analysis, I just
            made that term up), analyzing IP and ports, inspecting SSL
            handshakes for destination site. In short, metadata.
       
            mrbluecoat wrote 2 hours 21 min ago:
            Network fingerprinting, like
            
   URI      [1]: https://github.com/FoxIO-LLC/ja4
       
            oasisbob wrote 2 hours 24 min ago:
            DPI refers to a broad class of products which attempt to find
            signals and categorize traffic according to a ruleset, either to
            block it or throttle the speeds, etc.
            
            While access to plaintext is useful, it's not required for other
            rules which are eg looking at the timing and frequency of packets.
       
            teraflop wrote 2 hours 25 min ago:
            The "inspection" part of DPI isn't limited to encrypted payloads.
            It's straightforward enough to look at application-level protocol
            headers and identify e.g. a Wireguard or OpenVPN or SSH connection,
            even if you can't decrypt the payload. That could be used as
            sufficient grounds to either block the traffic or punish the user.
       
          exe34 wrote 3 hours 9 min ago:
          I wonder if it can be embedded in a video stream, like a video of a
          lava lamp that you always have open, but the lsb of ever byte is
          meaningful.
       
            _verandaguy wrote 3 hours 2 min ago:
            That's an interesting idea, and probably something you might be
            able to achieve with a tool like h26forge.
            
            It's also probably more useful to just have a connection be fully
            dedicated to a VPN, and have the traffic volume over time mimic
            what you'd see in a video, rather than embedding it in a video --
            thanks to letsencrypt, much of the web's served over TLS these days
            (asterisks for countries like KZ and TM which force the use of a
            state-sponsored CA), so going to great lengths to embed your VPN in
            a video isn't really practical.
       
          btown wrote 3 hours 16 min ago:
          This makes me wonder: are there "cloud drive virtual sneakernet"
          systems that will communicate e.g. by a client uploading URL
          request(s) as documents via OneDrive/SharePoint/Google Drive/Baidu
          etc., a server reacting to this via webhook and uploading (say) a PDF
          version of the rendered site, then allowing the client to download
          that PDF? You effectively use the CDN of that service as a (very
          slow) proxy.
          
          Of course, [1] applies in full force, and I don't have any background
          in the space to make this a recommendation!
          
   URI    [1]: https://xkcd.com/538/
       
            cluckindan wrote 1 hour 14 min ago:
            How about IPv6 over S3?
            
   URI      [1]: https://xeiaso.net/blog/anything-message-queue/
       
            jack_pp wrote 2 hours 59 min ago:
            It doesn't apply imo as OP is probably not a high value target of
            the govt, he just wants to bypass his govt restrictions and I doubt
            the situation is so bad that the govt will send people physically
            to deal with people circumventing the block.
            
            Your solution could technically work over any kind of open
            connection / data transfer protocol that isn't blocked by the
            provider but it would be an absolute pain to browse the web that
            way and there are probably better solutions out there.
       
          hsbauauvhabzb wrote 3 hours 39 min ago:
          I’m curious about what makes it difficult to block a vpn provider
          long term. You said getting the software is difficult, but can a
          country not block known vpn ingress points?
       
            _verandaguy wrote 3 hours 25 min ago:
            A country can and absolutely will block known VPN ingress points.
            There are two tricks that we can use to circumvent this:
            
            - Host on a piece of infrastructure that's so big that you can't
            effectively block it without causing a major internet outage
            (think: S3, Cloudflare R2, etc). Bonus points if you can leverage
            something like ECH (ex-ESNI) to make it harder to identify a single
            bucket or subdomain.
            
            - Keep spawning new domains and subdomains to distribute your
            binaries.
            
            There are complications with both approaches. Some countries block
            ECH outright. Some have no problem shutting the internet down
            wholesale for a little bit. The domain-hopping approach presents
            challenges w/r/t establishing trust (though not insurmountable
            ones, much of the time).
            
            These are thing that have to be judged and balanced on a
            case-by-case basis, and having partners on the ground in these
            places really helps reduce risk to users trying to connect from
            these places, but then you have to be very careful talking to then
            since they could themselves get in trouble for trying to organize a
            VPN distribution network with you. It's layers on layers, and at
            some point it helps to just have someone on the team with a
            background in working with people in vulnerable sectors and someone
            else from a global affairs and policy background to try and keep
            things as safe as they can be for people living under these
            regimes.
       
              hsbauauvhabzb wrote 2 hours 47 min ago:
              Sorry I’m referring to WireGuard/ovpn server IPs, not the
              binaries/configs used to setup a client. Unless you’re talking
              about fronting for both, but I imagine it is not economical to
              run a commercial -scale privacy vpn via a cloud provider.
       
              shawa_a_a wrote 3 hours 15 min ago:
              I've heard of domain fronting, where you host something on a
              subdomain of a large provider like Azure or Amazon. Is this what
              you're talking about when you say
              
              > - Host on a piece of infrastructure that's so big that you
              can't effectively block it without causing a major internet
              outage (think: S3, Cloudflare R2, etc).
              
              How can one bounce VPN traffic through S3? Or are you just
              talking about hosting client software, ingress IP address lists,
              etc?
       
                incrediblesulk wrote 43 min ago:
                I thought a lot of the domain-fronting approaches have largely
                been closed from policy changes at major CDNs (e.g. [1] ) . Or
                is it still possible through other approaches?
                
   URI          [1]: https://techcommunity.microsoft.com/blog/azurenetworki...
       
                _verandaguy wrote 3 hours 8 min ago:
                That's generally for distribution, but yeah, it's a form of
                domain fronting.
                
                There are some more niche techniques that are _really_ cool but
                haven't gained widespread adoption, too, like refractive
                routing. The logistics of getting that working are particularly
                challenging since you need a willing partner who'll undermine
                some of their trustworthiness with some actors to support (what
                is, normally, to them) your project.
       
          azalemeth wrote 3 hours 48 min ago:
          Thank you very much for a detailed answer. Might I rudely ask -- as
          you're knowledgeable in this space, what do you think of Mullvad's
          DAITA, which specifically aims to defeat traffic analysis by moving
          to a more pulsed constant bandwidth model?
       
            zelphirkalt wrote 35 min ago:
            If you are on a limited data plan, beware, DAITA produces a lot of
            traffic.
       
            _verandaguy wrote 3 hours 40 min ago:
            DAITA was introduced after my time in the industry, but this isn't
            a new idea (though as far as I know, it's the first time this kind
            of thing's been commercialized).
            
            It's clever. It tries to defeat attacks against one of the tougher
            parts of VPN connections to reliably obfuscate, and the effort's
            commendable, but I'll stop short of saying it's a good solution for
            one big reason: with VPNs and censorship circumvention, the data
            often speaks for itself.
            
            A VPN provider working in this space will often have aggregate (and
            obviously anonymized, if they're working in good faith) stats about
            success rates and failure classes encountered from clients
            connecting to their nodes. Where I worked, we didn't publish this
            information. I'm not sure where Mullvad stands on this right now.
            
            In any case -- some VPN providers deploying new technology like
            this will partner with the research community (because there's a
            small, but passionate formal research community in this space!) and
            publish papers, studies, and other digests of their findings. Keep
            an eye out for this sort of stuff. UMD's Breakerspace in the US in
            particular had some extremely clever people working on this stuff
            when I was involved in the industry.
       
              paxcoder wrote 1 hour 58 min ago:
              Have you heard about Safing's "SPN"? Could you comment on that?
       
        vander_elst wrote 4 hours 12 min ago:
        Set up a VM on AWS/azure/gcp/... in the desired cell, install a VPN
        server and done. Once you have automation in place it takes ~2 minutes
        to start, you can run it on demand so you can pay per minute.
       
        pbiggar wrote 4 hours 12 min ago:
        There's a new VPN that you might try, built by Boycat. [1] Don't know
        if it will help in this situation as it's designed to be a VPN not
        controlled by Israel, but it might be worth a try.
        
   URI  [1]: https://www.boycat.io/vpn
       
        bitbasher wrote 4 hours 14 min ago:
        Make your own VPN using a VPS and something like openvpn.
        
        Not every website will allow it, but it should get you access to more
        than you have now.
       
        ACCount37 wrote 4 hours 15 min ago:
        AmneziaWG is a decent option for censorship resistance, and it can be
        installed as a container on your own server.
       
          o999 wrote 3 hours 38 min ago:
          AmneziaWG clients works just fine with normal Wireguard servers by
          the way.
       
        mhitza wrote 4 hours 16 min ago:
        Use the Tor browser window in Brave. It's nowhere near as anonymous as
        the Tor browser, but the built in ad blocking makes browsing via Tor
        usable. And that's what you and your compatriots are interested in.
        
        Prepare to fill in Cloudflare captchas all day, but that's what it
        takes to have a bit of privacy nowadays.
       
        ddbb33 wrote 4 hours 17 min ago:
        Psiphon works
       
        Arubis wrote 4 hours 20 min ago:
        If you can still get SSH access and can establish an account with a VPS
        provider with endpoints outside your country of origin, [1] is a little
        long in the tooth but may still be viable.
        
   URI  [1]: https://github.com/StreisandEffect/streisand
       
          kccqzy wrote 4 hours 8 min ago:
          Tunneling via SSH (ssh -D) is super easy to detect. The government
          doesn't need any sophisticated analysis to tell SSH connections for
          tunneling from SSH connections where a human is typing into a
          terminal.
          
          Countries like China have blocked SSH-based tunneling for years.
          
          It can also block sessions based on packet sizes: a typical web
          browsing session involves a short HTTP request and a long HTTP
          response, during which the receiving end sends TCP ACKs; but if the
          traffic traffic mimics the above except these "ACKs" are a few dozen
          bytes larger than a real ACK, it knows you are tunneling over a
          different protocol. This is how it detects the vast majority of VPNs.
       
            mnw21cam wrote 3 hours 44 min ago:
            One alternative would be to set up a VPS, run VNC on it, run your
            browser on that to access the various web sites, and connect over
            an SSH tunnel to the VNC instance. Then it actually is an
            interactive ssh session.
       
              galaxy_gas wrote 2 hours 15 min ago:
              Anything more then small text bandwidth use is also detected .
              Not about interactivity instead this case
       
          bsimpson wrote 4 hours 17 min ago:
          15 years ago, I was using EC2 at work, and realized it was
          surprisingly easy to SSH into it in a way where all my traffic went
          through EC2. I could watch local Netflix when traveling. It was a de
          facto VPN.
          
          Details are not at the top of my mind these years later, but you can
          probably rig something up yourself that looks like regular web dev
          shit and not a known commercial VPN. I think there was a preference
          in Firefox or something.
       
            mikestorrent wrote 3 hours 38 min ago:
            The issue these days is that all of the EC2 IP ranges are well
            known, and are usually not very high-reputation IPs, so a lot of
            services will block them, or at least aggressively require CAPTCHAs
            to prevent botting.
            
            Source: used to work for a shady SEO company that searched Google
            6,000,000 times a day on a huge farm of IPs from every provider we
            could find
       
            hinkley wrote 4 hours 5 min ago:
            I watched a season of Doctor Who that way back when the BBC were
            being precious about it. But Digital Ocean, so $5.
       
        jwong_ wrote 4 hours 25 min ago:
        A proxy service like shadow socks works. There are thousands of
        providers for $X/month for a decent amount of traffic
       
        liveoneggs wrote 4 hours 28 min ago:
        All the various proxy solutions offered are good (although the simplest
        ones - like squid - haven't been mentioned yet). You can also use a
        remote desktop or even just ssh -Y me@remote-server "firefox"
       
        reisse wrote 4 hours 29 min ago:
        You've come to a wrong place to ask. Most people here (judging by
        recommendations of own VPN instances, Tor, Tailscale/other
        Wireguard-based VPNs, and Mullvad) don't have any experience with
        censorship circumvention.
        
        Just look for any VPNs that are advertised specifically for China,
        Russia, or Iran. These are the cutting edge tech, they may not be so
        privacy-friendly as Mullvad, but they will certainly work.
       
          ailun wrote 2 hours 12 min ago:
          Mullvad worked okay in China in June for me. I imagine it will be
          better in Indonesia with their less sophisticated blocking.
       
            77pt77 wrote 1 hour 2 min ago:
            This makes no sense.
            
            On the one hand they do DPI with ML.
            
            On the other hand a major player is open!
            
            Something is not right here...
       
          cogman10 wrote 2 hours 27 min ago:
          IMO, the safest route for an individual with tech competency is to
          setup a small instance server in the cloud outside your country and
          use ssh port forwarding and a proxy to get at information you want.
          
          For an example of a proxy service [1] That will give you a hard to
          snoop proxy service that should completely circumvent a government
          blockaid (they likely aren't going to be watching or blocking ssh
          traffic).
          
   URI    [1]: https://www.digitalocean.com/community/tutorials/how-to-set-...
       
            asqueella wrote 1 hour 39 min ago:
            Advanced enough censors (who have DPI) do block or slow down ssh,
            e.g.:
            
   URI      [1]: https://serverfault.com/questions/1122015/ssh-blockedfor-f...
       
          arewethereyeta wrote 2 hours 33 min ago:
          Actually I do, we sell a lot of proxy types designed specifically to
          circumvent such filters. Trojan works great for our Iran and China
          users:
          
   URI    [1]: https://www.anonymous-proxies.net/products/residential-troja...
       
          more_corn wrote 2 hours 55 min ago:
          ^ this comment is right on. The cutting edge of VPN circumvention is
          the one marketed to people in China. Last I poked at this there were
          a lot of options.
       
            johnisgood wrote 2 hours 35 min ago:
            Can I have a list of these options?
       
              girvo wrote 1 hour 32 min ago:
              v2/Vless
       
          genericuser256 wrote 2 hours 57 min ago:
          I would recommend Psiphon [1,2] most (all?) of their code is open
          source and their main goal is to get around censorship blocks. They
          do have some crypto side projects but the main product is very solid.
          [1]
          
   URI    [1]: https://psiphon.ca/
   URI    [2]: https://github.com/Psiphon-Inc
       
          Hizonner wrote 3 hours 21 min ago:
          Hmm. People who recommend widely used approaches, and well-known,
          well-established providers, "don't have any experience with cenorship
          circumvention".
          
          So the solution is no-name providers using random ad-hoc hackery,
          chosen according to a criterion more or less custom designed to lead
          you into watering hole attacks.
          
          Right.
       
            adamfisk wrote 1 hour 16 min ago:
            @reisse is 100% right. Most people outside of heavily censored
            regions have no clue what technology is actually used in those
            countries. The well-known, well-established providers don't
            actually work in censored regions because:
            
            1) The problem is very difficult and requires a lot of engineering
            resources
            2) It's very hard to make money in these countries for many
            reasons, including sanctions or the government restricting payments
            (Alipay, WeChatPay, etc)
            
            The immediate response would be: "If the problem is so difficult,
            how can it be solved if not be well-known, well-established
            providers?"
            
            The answer is simple: the crowdsourcing power of open source
            combined with billions of people with a huge incentive to get
            around government blocking.
       
            reisse wrote 3 hours 3 min ago:
            None of the things I listed are "widely used approaches, and
            well-known, well-established providers" in the parts of the world
            where it does matter.
            
            Yeah, maybe V* and derivatives are random ad-hoc hackery, but they
            also are the well-known standard now.
       
              Hizonner wrote 2 hours 45 min ago:
              > Yeah, maybe V* and derivatives are random ad-hoc hackery, but
              they also are the well-known standard now.
              
              A lot of people use Telegram and think it's private, too.
              
              What about the part about choosing your VPN provider in the way
              most likely to get you an untrustworthy one who's after you
              personally?
       
          tomaskafka wrote 3 hours 49 min ago:
          > Just look for any VPNs that are advertised specifically for China,
          Russia, or Iran.
          
          If I was working for a secret service for these countries, I would
          set up many "VPNs that are advertised specifically for x" as
          honeypots to gather data about any dissidents.
       
            refulgentis wrote 3 hours 36 min ago:
            Mr. Kafka, suspicion is healthy. However, abstraction provides no
            way forward when faced with practicalities instead of theory.
            Creates a Kafka-esque situation - anything suitable is by
            definition unsuitable. Better to focus on practical technical
            advice.
       
              sebastiennight wrote 59 min ago:
              I think you might want to read about the Anom phone [0],
              supposedly encrypting messages for drug dealers to avoid law
              enforcement, which was actually sold by... the FBI.
              
              [0]:
              
   URI        [1]: https://www.inc.com/jennifer-conrad/the-fbi-created-its-...
       
              s1mplicissimus wrote 2 hours 17 min ago:
              I don't see parent abstracting. They are simply pointing out a
              very real risk, which you don't provide any counter points to.
              Instead you seem to dismiss their point based on a strawman
       
            dmantis wrote 3 hours 46 min ago:
            It doesn't matter, he should look into the open source protocols
            that these services use. He doesn't have to use them.
            
            VLESS / v2ray works in Russia, as far as I know.
       
              spinagon wrote 3 hours 26 min ago:
              Yeah, I'm using v2less on rented VPS, it's been workin for almost
              2 years already (Russia)
       
          esosac wrote 3 hours 57 min ago:
          what's wrong with those solutions?
       
            leshenka wrote 59 min ago:
            Wrong threat model. Solutions like mullvad/proton focus on privacy
            not breaking the blockade. They have well known entry points and
            therefore easily blocked. You can play cat and mouse game switching
            servers faster than censorship agency blocks them (e.g. Telegram vs
            Roskomnadzor circa 2018 [1]) but that gets expensive and not really
            focus of these companies.
            
            What you need is open protocols and hundreds of thousands of small
            servers only known to their owners and their family/friends
            
            1:
            
   URI      [1]: https://archive.is/sxiha
       
          kragen wrote 3 hours 59 min ago:
          VPNs that are advertised are for-profit products, which means:
          
          1. They are in most cases run by national spy agencies.
          
          2. They will at least appear to work, i.e., they will provide you
          with access to websites that are blocked by the country you are in. 
          Depending on which country's spies run the system, they may actually
          work in the sense of hiding your traffic from that country's spies,
          or they may mark you as a specific target and save all your traffic
          for later analysis.
          
          My inclination is to prefer free (open-source) software that isn't
          controlled by a company which can use that control against its users.
       
            reisse wrote 3 hours 29 min ago:
            Well, you have to host your free open-source VPN software
            somewhere. And then, (N. B.: technical and usability stuff aside,
            I'm talking only about privacy bits here) everything boils down to
            two equally nightmarish options.
            
            First, you use well-known cloud or dedicated hoster. All your
            traffic is now tied to the single IP address of that hoster. It may
            be linked to you by visiting two different sites from the same IP
            address. Furthermore, this hoster is legally required to do
            anything with your VPN machine on demand of corresponding state
            actors (this is not a speculative scenario; i. e. Linode literally
            silently MitMed one of their customers on German request). Going
            ever further, residential and company IPs have quite different
            rules when it comes to law enforcement. Seeding Linux ISOs from
            your residential IP will be overlooked almost everywhere (sorry,
            Germany again), but seeding Linux ISOs from AWS can easily be a
            criminal offense.
            
            Second, you use some shady abuse-proof hosting company, which keeps
            no logs (or at least says that) and accepts payments in XMR. Now
            you're logging in to your bank account from an IP address that is
            used to seedbox pirate content or something even more illegal, and
            you still don't know if anyone meddles with your VPN instance
            looking for crypto wallet keys in your traffic.
            
            VPN services have a lot of "good" customers for a small amount of
            IP addresses, so even if they have some "bad" actors, their IPs as
            a whole remain "good enough". And, as the number of customers is
            big, each IP cannot be reliably tied to a specific customer without
            access logs.
       
              kragen wrote 3 hours 17 min ago:
              Tor is a third option, at least as one layer, and seeding Linux
              ISOs is not, to my knowledge, a criminal offense in any
              jurisdiction, not even in China.  I don't know where you got that
              idea.
       
                close04 wrote 2 hours 56 min ago:
                I read that as a euphemism for piracy.
       
                  kragen wrote 1 hour 19 min ago:
                  Pirating Linux ISOs is legal, though.
       
            tiahura wrote 3 hours 53 min ago:
            For 99% of use cases - piracy and porn, does that matter?
       
              jacobgkau wrote 3 hours 23 min ago:
              This thread's not about that 99% use case.
       
            some_random wrote 3 hours 57 min ago:
            Do you have any evidence for either of these claims?
       
              jack_pp wrote 2 hours 48 min ago:
              From gemini.. (edited for brevity)
              
              Kape Technologies Owns: ExpressVPN, CyberGhost, Private Internet
              Access, Zenmate
              
              > is there any suspicion that Kape Technologies is influenced or
              has ties to the Mossad?
              
              Yes, there is significant suspicion and public discussion about
              Kape Technologies having ties to former Israeli intelligence
              personnel. While a direct operational link to Mossad has not been
              proven, the concerns stem from the company's history, its key
              figures, and their backgrounds.
              
              ...
              
              Kape Technologies is owned by Israeli billionaire Teddy Sagi.
              While Sagi himself does not have a documented intelligence
              background, his business history, which includes a conviction for
              insider trading in the 1990s, has been a point of concern for
              some privacy advocates. The consolidation of several major VPN
              providers under his ownership has raised questions about the
              potential for centralized data access.
              
              ----
              
              Sure there isn't direct proof but there wasn't any proof the CIA
              was driving drug trade while it was happening. Proof materializes
              when the dust settles on such matters.
       
              Daishiman wrote 3 hours 54 min ago:
              It is absolutely self-evident that VPNs are considered high-value
              targets and that all spy agencies invest a chunk of resources to
              go after high-value targets.
       
                gnfargbl wrote 3 hours 33 min ago:
                I would invite you to read again the two claims made, and
                consider whether your statement actually addresses the veracity
                of either.
                
                To be a little trite: we all agree that chickens like grain,
                but it does not follow that a majority of grain producers are
                secretly controlled by a cabal of poultry.
       
          hinkley wrote 4 hours 9 min ago:
          I have a little, maybe enough to be dangerous. SSH won’t be
          sufficient to avoid all traffic analysis. Everyone can see how much
          traffic and the pattern of that traffic, which can leak info about
          the sort of things you’re doing.
          
          If you’re worried about ending up on a list, using things that look
          like VPNs while the VPNs are locked down is likely to do so.
          
          Also… your neighbors in Myanmar didn’t do a lockdown during the
          genocide and things got pretty fucking dire as a result. People have
          taken different lessons from this. I’m not sure what the right
          answer is, and which is the greater evil. Deplatforming and arresting
          people for inciting riots and hate speech is probably the best you
          can do to maintain life and liberty for the most people.
       
            logicchains wrote 2 hours 28 min ago:
            >Also… your neighbors in Myanmar didn’t do a lockdown during
            the genocide and things got pretty fucking dire as a result
            
            The genocide in Myanmar was incited _by_ the government there;
            giving it more power to censor it's citizens' communications would
            have done absolutely nothing to help the people being genocided.
            Genocides don't just suddenly happen; the vast majority of genocide
            over the past century (including Indonesian genocides against
            ethnically Chinese Indonesians) had the support of the state.
       
              hinkley wrote 40 min ago:
              This has been simmering for a very long time. The first I heard
              of it was violence that broke out after the defacement of a
              Buddhist temple statue. That would have been almost 20 years ago.
              Buddhists murdering people tends to lead one to ask a lot of
              questions.
              
              At that time I think the government was hands off, let it happen
              rather than tried to stop it.
              
              Regardless of who was behind the violence, the whole region has
              thought about what to do in such situations and they aren’t the
              same answers the West would choose.
       
          yogorenapan wrote 4 hours 9 min ago:
          You can always do v2ray -> Mullvad in a docker container routed with
          gluetun for censorship avoidance and privacy
       
          mrtesthah wrote 4 hours 12 min ago:
          
          
   URI    [1]: https://www.reddit.com/r/dumbclub/
       
          riehwvfbk wrote 4 hours 13 min ago:
          OP: look into VLESS (and similar).  And read up on ntc.party (through
          Google translate).  There are certain VPN providers that offer the
          protocol.
       
            yogorenapan wrote 4 hours 10 min ago:
            I think REALITY is the newer protocol. I remember VLESS being
            somewhat more detectable
       
              taminka wrote 3 hours 36 min ago:
              nah, vless is the protocol, reality is a newer obfuscation method
              that works over vless
              
              edit: op, protonvpn has a free tier that works in russia, so
              likely works everywhere, or if you're comfortable with buying a
              vps, sshing into it and running some commands, look up x-ray, and
              use on of their gui panels
       
          wat10000 wrote 4 hours 15 min ago:
          Mullvad worked OK in China for me recently. Sometimes I'd have to try
          a few different endpoints before it worked. Something built
          specifically to work in those places would probably be better, but it
          wasn't too much trouble. Not necessarily a recommendation, just
          sharing one data point.
       
            Liftyee wrote 4 hours 6 min ago:
            I remember always needing obfuscation enabled in Mullvad, but it
            would work in the end (as you said, after trying a few endpoints).
       
          Nextgrid wrote 4 hours 19 min ago:
          Furthermore, you can always run another VPN on top of that if you
          don’t trust the outer one with the actual plaintext traffic.
       
            05 wrote 1 hour 4 min ago:
            Not on mobile - iOS doesn't support nested VPNs, and neither does
            stock Android.
       
        whalesalad wrote 4 hours 29 min ago:
        SSH SOCKS proxy if you have an SSH host somewhere that is not
        Indonesia.
       
        guluarte wrote 4 hours 29 min ago:
        SSH tunneling on port 80 could work since it's rarely blocked, rent a
        cheap vps.
       
        TimCTRL wrote 4 hours 30 min ago:
        I can relate to this because my country has an election soon and I'm
        sure we wont have internet for 3 - 5 days then.
       
        yupyupyups wrote 4 hours 32 min ago:
        Residential VPNs, but try to find ones that are ran ethically.
       
        rurban wrote 4 hours 33 min ago:
        In this case the blockage will probably just be up for a few days,
        until the protests calmed down.
        
        Other than that: tor
       
        jauntywundrkind wrote 5 hours 6 min ago:
        Nations severing peoples connections to the world is awful. I'm so
        sorry for the chaos in general, and the state doing awful things both.
        
        Go on [1] and get a cheap cheap cheap VPS. Use ssh SOCKS proxy in your
        browser to send web traffic through it.
        
        Very unfancy, a 30+ year old solution, but uses such primitive internet
        basics that it will almost certainly never fail. Builtin to everything
        but Windows (which afaik doesn't have an ssh client built-in).
        
        Tailscale is also super fantastic.
        
   URI  [1]: https://lowendbox.com
       
          int_19h wrote 3 hours 19 min ago:
          >  uses such primitive internet basics that it will almost certainly
          never fail.
          
          It already fails in China and Russia. Simply tunneling HTTP through
          SSH is too easy to detect with DPI.
          
          > Windows (which afaik doesn't have an ssh client built-in)
          
          It has had both SSH client and SSH server built-in since Win10.
       
          sertsa wrote 3 hours 31 min ago:
          Windows has had both ssh client/server for years
       
        dongcarl wrote 5 hours 8 min ago:
        Give Obscura a try, we get around internet restrictions by using QUIC
        as transport, which looks like HTTP/3 and doesn't suffer from
        TCP-over-TCP meltdown: [1] Technical details: [1]
        blog/bootstrapping-trust/
        
        Let us know what you think!
        
        Disclaimer: I'm the creator of Obscura.
        
   URI  [1]: https://obscura.net/
   URI  [2]: https://obscura.net/blog/bootstrapping-trust/
       
          McNulty2 wrote 4 hours 22 min ago:
          If they're blocking other protocols then likely they're blocking quic
          also.
       
            dongcarl wrote 3 hours 58 min ago:
            Very possible, though many of our users are saying that in network
            environments where WireGuard is blocked they were able to use
            Obscura.
       
              tmpfs wrote 3 hours 36 min ago:
              Hey, I went to take a look at Obscura and I like the ideas but I
              can't find the source code.
              
              You are making some bold claims but without the source I can't
              verify those claims.
              
              Any plans to open-source it?
       
                dongcarl wrote 3 hours 13 min ago:
                We should link it in more places, apologies!
                
                Here it is:
                
   URI          [1]: https://github.com/Sovereign-Engineering/obscuravpn-cl...
       
        whyleyc wrote 5 hours 18 min ago:
        I'd recommend using Outline - it's a one click setup that lets you
        provision your own VPN on a cloud provider (or your own hardware).
        
        Since you get to pick where the hardware is located and it is just you
        (or you and a small group of friends & family) using the VPN, blocking
        is more difficult.
        
        If you don't want the hassle of using your own hardware you can rent a
        Digital Ocean droplet for <$5 per month.
        
   URI  [1]: https://getoutline.org/
       
          lucasban wrote 3 hours 10 min ago:
          I’ve set this up for friends in fairly heavily censored countries
          before, it has been working well so far, but as others have said,
          this is a cat and mouse game
       
        Jigsy wrote 5 hours 20 min ago:
        I was wondering something like this but in a different capacity.
        
        What with certain countries (they know who they are) and their hatred
        for encryption, it got me wondering how people would communicate
        securely if - for example - Signal/WhatsApp/etc. pulled out and the
        country wound up disconnecting the submarine cables to "keep
        $MORAL_PANIC_OF_THE_DAY safe."
        
        How would people communicate securely and privately in a domestic
        situation like that?
       
          wsintra2022 wrote 3 hours 49 min ago:
          Encrypted hand written notes tied to pigeons
       
          RansomStark wrote 4 hours 22 min ago:
          In person or not at all.
          
          At that point you've essentially lost.
          
          You either hope another country sees value in spreading you some
          democracy, or you rise up and hope others join you.
          
          Or not and you accept the protection the state is graciously
          providing to you.
       
            Jigsy wrote 4 hours 4 min ago:
            SneakerNet or bust, eh? That sucks.
       
        nomilk wrote 5 hours 32 min ago:
        Australia and UK might soon go down this path.
        
        Something quite depressing is if we (HN crowd) find workarounds, most
        regular folks won't have the budget/expertise to do so, so citizen
        journalism will have been successfully muted by government / big media.
       
          SlowTao wrote 1 hour 52 min ago:
          In oz personally and yes, I warned folks of this a few years back,
          especially in the 12 months or so. Every time I was met with a fair
          bit of push back.
          
          They would argue back on technical merits, I was talking political, a
          politics doesn't give a damn about the tech. We have slowly been
          going down this path for a while now.
          
          “The laws of mathematics are very commendable, but the only law
          that applies in Australia is the law of Australia,” - PM Malcolm
          Turnbull in 2017.
       
          dijit wrote 4 hours 4 min ago:
          Don't worry, you shouldn't underestimate the capability of society.
          
          I grew up in a pretty deprived area of the UK, and we all knew "a
          guy" who could get you access to free cable, or shim your electric
          line to bypass the meter, or get you pirated CD's and VHS' and
          whatever.
          
          There will always be "that guy down the pub" selling raspberry pi's
          with some deranged outdated firmware that runs a proxy for everything
          in the house or whatever. To be honest with you, I might end up being
          that guy for a bunch of people once I'm laid off from tech like the
          rest. :)
       
            primitivesuave wrote 1 hour 43 min ago:
            I suppose that for this case, an underground black market of VPN
            providers might emerge - average individuals setting up VPN
            software on a cloud service provider, and then selling monthly
            access to people. Aside from the obvious danger of getting ripped
            off (someone might put you on a slow shared VPN with many other
            people, or shut down the server at any time), there is also the
            possibility of someone monitoring all your Internet activity.
       
              nomilk wrote 1 hour 33 min ago:
              I'd default assume black market VPNs will monitor internet
              activity since it's both easy and profitable
       
            int_19h wrote 3 hours 24 min ago:
            Normally I would agree with you, but the ability to pull this kind
            of thing off hinges on there being enough shadows that the Eye
            doesn't look at for prolonged periods of time. And the overall
            trajectory of technological advance lately is such that those
            shadows are rapidly shrinking. First it was the street cameras (and
            UK is already one of the most enthusiastic adopters in the world).
            And now comes AI which can automatically sift through all the mined
            data, performing sentiment analysis etc. I feel that the time will
            come pretty soon when "a guy" will need to be so adept at
            concealing the tracks in order to avoid detection that most people
            wouldn't have access to one.
       
              isaacremuant wrote 2 hours 10 min ago:
              The eye doesn't care as long as you're not politically efficient
              in opposing their narratives or power.
              
              Authoritarianism in the UK doesn't correlate with crime.  The
              economy does.
              
              The point of these things is not really to help citizens.
              "there's no money for that" like there's no money for healthcare
              or education (although there is for bombings in foreign
              countries). The point is protecting power from any threat that
              could mount against it.
       
                SlowTao wrote 1 hour 43 min ago:
                I think both sides of this are fair. Power is interested in
                stability of itself, to keeps its back to the wall so that
                nobody can sneak up on it. But also political power has teamed
                up with corporate power/determination to create a far more
                nasty beast.
                
                Seeing companies like Palantir (and many lesser known ones)
                buddy up to everyone that wants it, its a clear statement on
                how they want to monitor and control the populace.
                
                Long term I don't think it can be done, but the pain mid term
                can be vast.
       
              dijit wrote 3 hours 18 min ago:
              I wouldn’t worry about it.
              
              They can barely handle wolf-whistlers let alone pedophile rape
              gangs consisting of the lowest IQ dregs of our society.
              
              I know it’s only painfully stupid people who think the law is
              stupid, but dodgy Dave down the way tends to fly under the radar.
              Otherwise there wouldn’t be so many of them.
       
                alisonatwork wrote 37 min ago:
                One of the problems with authoritarianism is that even though
                most dodgy Daves will be fine because the political apparatus
                doesn't have the time or energy to arrest everyone for
                everything, they retain the ability to arrest anyone for
                anything.
                
                The moment your dodgy Dave offends your local cadre, even for
                reasons entirely other than being dodgy, they'll throw the book
                at him. And because there is now unpredictability around who
                will be arrested and for what reason, it acts as a chilling
                effect for everyone who values some degree of stability in
                their lives. So the arc of dodgy Daves bends toward compliance.
       
                ljsprague wrote 2 hours 47 min ago:
                It's not that they couldn't handle the rape gangs; it's that
                they turned a blind eye towards them.
       
            jama211 wrote 3 hours 32 min ago:
            That absolutely sounds like a world I should be worried about,
            where our only choices are dodgy ones
       
            Ray20 wrote 3 hours 41 min ago:
            Don't worry, you shouldn't underestimate the capability of society.
            
            You should be worried. Don't underestimate the capabilities of the
            government bureaucrats. That "guys down the pub" will quickly
            disappear once they start getting jail time for their activities.
       
              doix wrote 3 hours 27 min ago:
              I think you really overestimate the capability of the UK to
              enforce laws. Yes, they can write them and yes they can fine
              large corporations, that's basically it.
              
              They cannot enforce laws against such "petty" crimes, the reason
              society mostly functions in the UK is because most people don't
              try to break the law.
              
              Pretty sure the local punters would kick the cops out if they
              came for one of their own, especially if he got them their porn
              back.
       
                Ray20 wrote 2 hours 54 min ago:
                It's not just about UK abilities to enforce laws, but also
                about other factors. The described activities are extremely
                unattractive as criminal: small market, small margin, the need
                for planning, preparation and qualification.
                
                There is no need for special efforts to enforce the law. Put a
                few people in jail - and everyone else will quickly find safer
                and more legal ways to spend their time. No one will do
                something like that unless they are confident of their
                impunity.
       
              mikestorrent wrote 3 hours 31 min ago:
              Yes, it's also dystopian to pin one's future on such hopes.
              People need to stick it to the government and demand their
              freedoms. Far too many things are being forced on us in the West
              that go against fundamental values that have been established for
              centuries.
              
              Somehow, things that could be unifying protests where the working
              class of every political stripe are able to overlook their
              differences and push back against government never seem to
              happen. It is always polarized so that it's only ever one side at
              a time, and the other side is against them. How does that work?
       
                isaacremuant wrote 2 hours 8 min ago:
                > People need to stick it to the government and demand their
                freedoms.
                
                It will only work if they admit that they supported this and
                all forms of totalitarianism during COVID.  You can't fall for
                that and then be surprised when the world keeps going down that
                obvious path.
       
                  multjoy wrote 1 hour 43 min ago:
                  In matters of public health, you cannot trust the public to
                  do the right thing.
                  
                  The problem with covid is that we weren't totalitarian
                  enough. Regulations you could drive a coach & horses through
                  and no way to enforce is a sop.
                  
                  The first lock down needed to be a proper 'papers, please'
                  affair. When we get a properly lethal pandemic, we're fucked.
                  Hopefully Laurence Fox and Piers Corbyn will catch it quickly
                  and expire in a painful and televised way, it's the only hope
                  of people complying with actual quarantine measures.
       
                nemomarx wrote 2 hours 59 min ago:
                Reflex. People's opinion on a subject changes if you tell them
                which political group supports it, sometimes even if they get
                asked twice in a row. Tribal identity determines ideology more
                than the other way around for a lot of people.
                
                So as soon as Labour comes out for something, Cons are inclined
                to be against it and so on. The only way to have neutral
                protests is if no one visibly backs them and they don't become
                associated with a side, but then how do they get support and
                organization?
       
          JustExAWS wrote 4 hours 21 min ago:
          I am just waiting for red states in the US to try this too since
          their current laws requiring ID verification for porn sites aren’t
          effective.
       
            curiousgal wrote 3 hours 42 min ago:
            > red states
            
            Well you'd be surprised to find out that this stupid policy (and
            many more) have been brought forward by Labour (Left).
       
              SlowTao wrote 1 hour 38 min ago:
              Yep, here in Australia the social media age restriction was
              pushed through by both sides. Two sides of the same coin.
       
              cherryteastain wrote 2 hours 40 min ago:
              Labour supported it but it was proposed and passed by Parliament
              in 2023 during the Tory government
       
              int_19h wrote 3 hours 23 min ago:
              It has been my impression that in UK, both parties are strongly
              authoritarian, with the sole difference being what kinds of
              speech and expression, precisely, they want to police.
       
              mikestorrent wrote 3 hours 28 min ago:
              At this point, anyone who has been watching politics for a few
              decades understands that the left/right dichotomy is primarily
              one designed to keep the majority of people within a certain set
              of bounds. We see it revealed when politicians and ideologies
              that should be in opposition to one another still cooperate on
              the same strategies, like this one.
              
              The goal right now is to make online anonymity impossible. Adult
              content is the wedge issue being used to make defending it
              unpalatable for any elected official, but nobody actually has it
              as a goal to prevent teenagers from looking at porn - if they
              did, they would be using more direct and efficient strategies. 
              No, it's very clear that anonymous online commentary is hurting
              politicians and they are striking back against it.
       
              nomilk wrote 3 hours 34 min ago:
              Both the major Australian parties (Liberal and Labor) seem as
              spineless as each other.
              
              They're being pushed by media conglomerates News Corp and Nine
              Entertainment [0] to crush competition (social media apps). With
              the soon-to-be-introduced 'internet licence' (euphemism: 'age
              verification'), and it's working. If they ban VPN's, it will make
              social media apps even more burdensome to access and use.
              
              [0] News Corp and Nine Entertainment together own 90% of
              Australian print media, and are hugely influential in radio,
              digital and paid and free-to-air TV. They have a lot to gain by
              removing access to social media apps, where many (especially
              young) people get their information now days.
       
                SlowTao wrote 1 hour 36 min ago:
                How long until they produce an    generative AI version of Burt
                Newton to do new episodes of 20 to 1 based on some social media
                slop?
                
                Yep, not a great time line here.
       
          GlacierFox wrote 4 hours 32 min ago:
          I would have laughed in your face if you wrote this comment merely 6
          months ago. Now I'm just depressed. (UK)
       
            isaacremuant wrote 2 hours 14 min ago:
            Don't worry. You'll call us conspiracy theories once you get used
            to the new goalposts and we warn you about the next thing.
            
            How about instead of being depressed you start being vocal and
            defiant?
       
            jll29 wrote 2 hours 43 min ago:
            When ES leaked his info to the Guardian people, they could still
            (2013) use the Guardian's US base to publish, protected by the US'
            stronger freedom of speech laws. Now, in 2025, if the same were to
            happen again, I'm not sure that would work quite the same way, with
            Trump aggressively taking American citizens' rights away.
            
            Maybe The Guardian should open a branch in Sealand...
       
              SlowTao wrote 1 hour 48 min ago:
              It was David Graeber that said we should be wary of places like
              The Guardian. They are a wolf in sheeps clothing. Used a lot of
              the more liberal momentum of the early 2010s combined with
              promoting some of the more left leaning writters to gain a fair
              bit of clout. But underneath, they will conform to the power
              structures if it comes down to survival. Alas, they nay not be a
              Sealand edition although that would be neat.
       
          hdgvhicv wrote 4 hours 34 min ago:
          90% of “citizen journalism” is nothing of the sort. Just like
          “citizen science” researching vaccines.
       
            logicchains wrote 2 hours 21 min ago:
            Citizen journalism avoids the main weakness of a centralised
            system: it's incredible suspectible to capture. A prime example of
            this is the mass opposition around the world to Israel's genocide
            in Gaza.  Israel committed such genocides prior to the event of
            social media, such as the Nakba, but it was rarely reported on, due
            to media ownership being concentrated in the hands of a few
            pro-Zionist individuals.
       
            nomilk wrote 4 hours 10 min ago:
            > 90% of “citizen journalism” is (trash)
            
            You're right. But compared to what?
            
            I guess 99% of mainstream "journalism" is irrelevant and/or
            inaccurate, hence citizen journalism is a 10x improvement in
            accuracy and relevancy! Not 10% better, 900% better! This makes a
            huge difference to our society as a whole and in our daily lives!
            
            But this misses the most important point which is that the user
            should have the right to choose for themselves what they say and
            read. Making citizen journalism unduly burdensome deprives everyone
            of that choice.
       
            RansomStark wrote 4 hours 18 min ago:
            Preach comrade!
            
            Those citizen journalists with their primary sources, disgusting.
            
            Thats nothing but propaganda.
            
            Remember it doesnt matter what the video shows, it only matters who
            showed it to you.
       
              anigbrowl wrote 10 min ago:
              You really think someone would do that? Just go on the internet
              and tell lies?
       
              p_j_w wrote 1 hour 4 min ago:
              > Remember it doesnt matter what the video shows, it only matters
              who showed it to you.
              
              Both matter.
       
              Barrin92 wrote 4 hours 7 min ago:
              >Remember it doesnt matter what the video shows, it only matters
              who showed it to you
              
              In an age of mass media (where there's a video for anything) or
              now one step further synthetic media knowing who makes something
              is much more important than the content, given that what's being
              shown can be created on demand. Propaganda in the modern world is
              taking something that actually happened, and then framing it as
              an authentic piece of information found "on the street", twisting
              its context.
              
              "what's in the video" is now largely pointless, and anyone who
              isn't gullible will obviously always focus on where the promoter
              of any material wants to direct the audiences attention to, or
              what they want to deflect from.
       
        WarOnPrivacy wrote 5 hours 32 min ago:
        I'm reading posts that indicate (at least some of) the blocking is at
        the DNS level. [1] Cloudflare says some issue affecting Jakarta has
        been resolved. They aren't saying what the issue was.
        
   URI  [1]: https://old-reddit-com.translate.goog/r/WkwkwkLand/comments/1n...
   URI  [2]: https://www.cloudflarestatus.com/incidents/1chpg2514kq8
       
          rickybule wrote 5 hours 0 min ago:
          What I'm worried most are that most people are not even aware of what
          is DNS and how to change it.
          
          I can't imagine those who are caught in the chaos with only their
          phone and unable to access information that could help them to be
          safe.
       
            jhanschoo wrote 4 hours 41 min ago:
            Generally speaking, the general population that wants to use
            blocked services will develop enough technical know-how to
            circumvent it. The biggest risk is that there are bad actors giving
            malicious advice and to such learners, looking to defraud or
            otherwise exploit them.
       
        SirMaster wrote 5 hours 34 min ago:
        Remote desktop (RDP/AnyDesk/etc) into a VM hosted somewhere else?
       
        jedisct1 wrote 5 hours 36 min ago:
        Get a cheap VPS anywhere, and use DSVPN [1] Uses TCP and works pretty
        much anywhere.
        
   URI  [1]: https://github.com/jedisct1/dsvpn
       
        roscas wrote 5 hours 39 min ago:
        Blocking Twitter is a good start, now Facebook, Instagram, Whatsup and
        TikTok.
        
        This is a good start but more should be blocked. Then force ISP to
        block ads.
        
        Not just for Indonesia but all countries. But we still have a lot more
        to do to fix the web.
       
          platevoltage wrote 3 hours 40 min ago:
          I can't stand most of these things you want blocked but this is
          bonkers.
       
          mr90210 wrote 5 hours 36 min ago:
          The issue with that is where do they draw the line. Next thing you
          know each country becomes North Korea.
       
        drake99 wrote 5 hours 41 min ago:
        In this scenario, Chinese have very rich experience.
        you need to use the advance proxy tool like clash ,v2ray, shadowsocks
        etc.
       
          mezyt wrote 3 hours 45 min ago:
          shadowsocks was the winner of the state of the art I had to do at
          work. It address the "long-term statistical analysis will often
          reveal a VPN connection regardless of obfuscation and masking (and
          this approach can be cheaper to support than DPI by a stat)" comment.
       
        scotty79 wrote 5 hours 42 min ago:
        Maybe you could buy VPS in another country and set up VPN server
        yourself?
       
        doix wrote 5 hours 45 min ago:
        I'm currently traveling in Uzbekistan and am surprised that wireguard
        as a protocol is just blocked. I use wireguard with my own server,
        because usually governments just block well known VPN providers and a
        small individual server is fine.
        
        It's the first time I've encountered where the entire protocol is just
        blocked. Worth checking what is blocked and how before deciding which
        VPN provider to use.
       
          atmosx wrote 3 hours 14 min ago:
          Cloak + wireguard should work fine on the server side. The problem is
          that I didn't find any clients for Android and I doubt there are
          clients for iOs that can (a) open a cloak tunnel and then (b) allow
          wireguard to connect to localhost...
       
            akho wrote 43 min ago:
            AmneziaWG is obfuscated, wireguard-based, and has clients for
            whatever.
       
          wereHamster wrote 3 hours 36 min ago:
          A year ago I was traveling through Uzbekistan while also partly
          working remotely. IKEv2 VPN was blocked but thankfully I was able to
          switch to SSL VPN which worked fine. I didn't expect that, everything
          else (people, culture) in the country seemed quite open.
       
          dmantis wrote 3 hours 44 min ago:
          XRay protocol based VPN worked for me in Uzbekistan when I were
          travelling there.
          
          Wireguard is indeed blocked.
       
            akho wrote 42 min ago:
            xray is a proxy. They may have needed an actual VPN.
       
          slt2021 wrote 3 hours 44 min ago:
          how can they detect it is wireguard, I thought the traffic is
          encrypted?
          
          how does it differ from regular TLS 1.3 traffic?
       
            dmantis wrote 3 hours 31 min ago:
            It's UDP, not TCP (like TLS) and has a distinguishable handshake.
            Wireguard is not designed as a censorship prevention tool, it's
            purely a networking solution.
            
            The tunnel itself is encrypted, but the tunnel creation and
            existence is not obfuscated.
       
          sintezcs wrote 3 hours 46 min ago:
          Same in Russia
       
          Flere-Imsaho wrote 3 hours 53 min ago:
          > surprised that wireguard as a protocol is just blocked.
          
          Honestly this is the route I'm sure the UK will decide upon in the
          not too distant future.
          
          The job of us hackers is going to become even more important...
       
          VTimofeenko wrote 4 hours 20 min ago:
          WireGuard by itself has a pretty noticeable network pattern and I
          don't think they make obfuscating it a goal.
          
          There are some solutions that mimic the traffic and, say, route it
          through 443/TCP.
       
          aabdelhafez wrote 4 hours 58 min ago:
          Same in Egypt.
       
          daveidol wrote 5 hours 34 min ago:
          Wow, kinda crazy to think about a government blocking a protocol that
          just simply lets two computers talk securely over a tunnel.
       
            mikestorrent wrote 3 hours 34 min ago:
            Well, think about it - almost every other interaction you can have
            with an individual in another country is mediated by government.
            Physical interaction? You need to get through a border and customs.
            Phone call? Going through their exchanges, could be blocked, easy
            to spy on with wiretaps. Letter mail? Many cases historically of
            all letters being opened before being forwarded along.
            
            We lived through the golden age of the Internet where anyone was
            allowed to open a raw socket connection to anyone else, anywhere.
            That age is fading, now, and time may come where even sending an
            email to someone in Russia or China will be fraught with
            difficulty. Certainly encryption will be blocked.
            
            We're going to need steganographic tech that uses AI-hallucinated
            content as a carrier, or something.
       
            roscas wrote 5 hours 19 min ago:
            That is how you know they haven't got a clue on what they're doing.
       
          bryanlarsen wrote 5 hours 41 min ago:
          We've had success using wireguard over wstunnel in places where
          wireguard is blocked.
          
   URI    [1]: https://github.com/erebe/wstunnel
       
            vehemenz wrote 2 hours 40 min ago:
            This looks great, thanks.
       
              bryanlarsen wrote 1 hour 52 min ago:
              I should have mentioned that our use case isn't avoiding
              government firewalls, it's transiting through broken network
              environments.
       
        Joel_Mckay wrote 5 hours 46 min ago:
        There are many options, but avoiding the legal consequences may be a
        grey area: [1] [2] [3] ..and many many more, as networks see reduced
        throughput as an error to naturally route around. =3
        
   URI  [1]: https://www.stunnel.org/index.html
   URI  [2]: https://github.com/yarrick/iodine
   URI  [3]: https://infocondb.org/con/black-hat/black-hat-usa-2010/psudp-a...
       
        yogorenapan wrote 5 hours 49 min ago:
        WireGuard should still work. Tons of different providers. I trust
        Mullvad but ProtonVPN has a free tier. If they start blocking
        WireGuard, check out v2ray and xray-core. If those get blocked... that
        means somehow they're restricting all HTTPS traffic going out of the
        country
       
        herodoturtle wrote 5 hours 50 min ago:
        On a related note, does anyone have insight into *why* the Indonesian
        government is doing this?
       
          jofer wrote 3 hours 38 min ago:
          If it helps, here's some recent coverage:
          
   URI    [1]: https://www.theguardian.com/world/2025/aug/26/indonesia-prot...
       
            teekert wrote 3 hours 18 min ago:
            “Some demonstrators on Monday were seen on television footage
            carrying a flag from the Japanese manga series One Piece, which has
            become a symbol of protest against government policies in the
            country.”
       
          rickybule wrote 5 hours 29 min ago:
          there is a major protest currently happening due to the legislative
          body representative just giving themselves a monthly domicile stipend
          of ~$3300 on top of their salaries (yes, multiple), while the average
          people earned ~$330 monthly. the information about the protest are
          not broadcasted on local TVs, so the only spread of information is
          through social media. i guess since a lot of people went around it
          using VPN, the gov decided to block it too.
       
          TheChaplain wrote 5 hours 41 min ago:
          The official word is to counter gambling. Lately the government is
          not really popular after some decisions that could be interpreted as
          authoritative, and as citizens have spoken out about it online,
          causing more voices to join and protests erupting..
          
          So well, my guess is they're trying to control it.
       
          geephroh wrote 5 hours 45 min ago:
          
          
   URI    [1]: https://tech.yahoo.com/social-media/articles/indonesia-urges...
       
        Humorist2290 wrote 5 hours 55 min ago:
        - Tor. Pros: Reasonably user friendly and easy to get online, strong
        anonymity, free. Cons: a common target for censorship, not very fast,
        exit nodes are basically universally distrusted by websites.
        
        - Tailscale with Mullvad exit nodes. Pros: little setup but not more
        than installing and configuring a program, faster than Got, very
        versatile. Cons: deep packet inspection can probably identify your
        traffic is using Mullvad, costs some money.
        
        - Your own VPSs with Wireguard/Tailscale. Pros: max control, you
        control how fast you want it, you can share with people you care about
        (and are willing to support). Cons: the admin effort isn't huge but
        requires some skill, cost is flexible but probably 20-30$ per month
        minimum in hosting.
       
          akho wrote 3 hours 2 min ago:
          Wireguard is not censorship-resistant, and most VPN-averse countries
          block cross-border Wireguard. Why reply a practical question in an
          area in which you have no experience?
       
            LeoPanthera wrote 2 hours 49 min ago:
            Is it possible to identify wireguard traffic that isn't on a common
            port?
       
              akho wrote 2 hours 41 min ago:
              Yes. Fixed packet headers, predictable packet sizes. I don't know
              what "a common port" means in relation to wg.
       
                ItsHarper wrote 1 hour 14 min ago:
                51820 is the one they use in the docs, that's probably the most
                common one.
       
                kube-system wrote 1 hour 25 min ago:
                They mean UDP port 51820
       
                  akho wrote 1 hour 17 min ago:
                  Yeah. Tailscale uses 41641, and you can generally use
                  whatever. I don't think there's any consensus, or majority.
       
            more_corn wrote 2 hours 50 min ago:
            Because Indonesia is new to the game and might still be catching
            up. They’re probably playing whackamole with the most common
            public VPN providers and might not be doing deep packet inspection
            yet. I worked with someone getting traffic out of Hong Kong a year
            ago and there was a lot trial and error figuring out what was
            blocked and what was not. Wireguard was one that worked.
       
              akho wrote 2 hours 26 min ago:
              They recommend Tailscale in particular. Tailscale control plane
              and DERPs (which are functionally required on mobile) will be
              among the first to go.
              
              Outline (shadowsocks-based) and amnezia (obfuscated wg and xray)
              both offer few-click install on your own VPS, which is easier
              than setting up headscale or static wg infrastructure, and will
              last you longer.
              
              Also, you did not answer my "why" question. I'm not sure what
              question you were answering.
       
          dingi wrote 4 hours 26 min ago:
          > cost is flexible but probably 20-30$ per month minimum in hosting.
          
          $4/month VPS from DigitalOcean is more than enough to handle a few
          users as per my experience. I have a Wireguard setup like this for
          more than a year. Didn't notice any issues.
       
          codethief wrote 4 hours 28 min ago:
          > - Tailscale with Mullvad exit nodes
          
          Tailscale is completely unnecessary here, unless OP can't connect to
          Mullvad.net in the first place to sign up. But if the Indonesian
          government blocks Mullvad nodes, they'll be out of luck either way.
          
          > - Your own VPSs with Wireguard/Tailscale
          
          Keep in mind that from the POV of any websites you visit, you will be
          easily identifiable due to your static IP.
          
          My suggestion would be to rent a VPS outside Indonesia, set up
          Mullvad or Tor on the VPS and route all traffic through that VPS (and
          thereby through Mullvad/Tor). The fastest way to set up the latter
          across devices is probably to use the VPS as Tailscale exit node.
       
            jkaplowitz wrote 3 hours 1 min ago:
            Tailscale + Mullvad does have a privacy advantage over either one
            by itself: the party that could potentially spy on the VPN traffic
            (Mullvad) doesn’t know whose traffic it is beyond that it’s a
            Tailscale customer. Any government who wanted to trace specific
            traffic back to OP would need to get the cooperation of both
            Mullvad and Tailscale, which is a lot less likely than even the
            quite unlikely event of getting Mullvad to cooperate.
       
          weinzierl wrote 4 hours 29 min ago:
          This is good overview, I just wanted to add that a VPS IP is not a
          residential IP. You will encounter roadblocks when you try to access
          services if you appear to be coming from a VPS. Not that I had a
          better solution, just to clarify what you can expect.
       
          rickybule wrote 5 hours 3 min ago:
          Thank you so much for this. It is very helpful.
       
          cm2187 wrote 5 hours 35 min ago:
          or simply RDP into a windows VPS.
       
          vaylian wrote 5 hours 37 min ago:
          Tor also has anti-censorship mechanisms (snowflakes, ...). Depending
          on how aggressive the blocking is, Tor might be the most effective
          solution.
       
          zargon wrote 5 hours 44 min ago:
          > 20-30$ per month minimum in hosting
          
          Typo? Wireguard-capable VPSes are available for $20-$30 per year. (
          [1] is a good site for finding them.)
          
   URI    [1]: https://vpspricetracker.com/
       
            Humorist2290 wrote 5 hours 39 min ago:
            I mean multiple VPSs for redundancy. Contabo is maybe the cheapest
            I've seen and it's like 3$ mtl for the smallest?
       
          Humorist2290 wrote 5 hours 49 min ago:
          And using another VPN like NordVPN or ProtonVPN is probably in the
          same category as Mullvad, but worth being cautious. If it's free, you
          are the product. If you pay, you're still sending your traffic to a
          publicly (usually) known server of a VPN. That metadata alone in some
          jurisdictions can still put you in danger.
          
          Stay safe
       
          nisegami wrote 5 hours 53 min ago:
          Minimums for a VPS should be closer to $5-10 a month, no?
       
            shellwizard wrote 4 hours 12 min ago:
            No, unless you pay month to month. If you wait till BF you can find
            some really good deals on sites like lowendspirit
       
            Humorist2290 wrote 5 hours 48 min ago:
            Yeah they can be cheap, but I would definitely recommend having at
            least 3 for redundancy. If one get shut down or it's IP blacklisted
            you still hopefully have a backup line to create a replacement.
       
          msgodel wrote 5 hours 53 min ago:
          IMO most people should have a VPS even if you don't need it for
          tunneling. Living without having a place to just leave services/files
          is very hard and often "free" services will hold your data hostage to
          manipulate your behavior which is annoying on a good day.
       
        acuozzo wrote 5 hours 58 min ago:
        Grab a VPS and use SOCKS5 tunneling via SSH.
       
          Joel_Mckay wrote 5 hours 33 min ago:
          SSH is often targeted by deep packet inspection and protocol binding
          filters.
          
          i.e. One is better off tunneling over [1] include SSH traffic
          protocol auto-swapping on your server (i.e. no way to tell the
          apparent web page differs between clients), as some corporate
          networks are infamously invasive.   People can do this all day long,
          and they do... =3
          
   URI    [1]: https://www.praise-the-glorious-leader.google.com.facebook.c...
       
            bitwize wrote 5 hours 17 min ago:
            lolwut
            
            At least it isn't goatse...
       
              Joel_Mckay wrote 5 hours 5 min ago:
              It is not a real URI... lol
              
              The point was to include something clowns can't filter without
              incurring collateral costs, and wrapping the ssh protocol in
              standard web traffic. =3
       
                chrisweekly wrote 4 hours 17 min ago:
                tangent: what is the significance of the "=3" you sign your
                messages with?
       
                  Joel_Mckay wrote 4 hours 14 min ago:
                  Don't worry about it... =3
       
        defulmere wrote 5 hours 59 min ago:
        SOCKS proxy over SSH?
       
          pmlnr wrote 5 hours 51 min ago:
          Android doesn't come with system wide socks proxy support, and i
          couldn't find an open source app for it either. Is anyone aware of
          one?
          
          Nonetheless this is a surprisingly simple and bullet proof solution:
          SSH, that's not vpn boss, i need it for work.
       
            kevindamm wrote 4 hours 28 min ago:
            Outline is an open source shadowsocks client, and you provision
            your own server to act as the proxy.  You can use it against any
            Shadowsocks server you want, and the protocol makes it look like
            regular https traffic. [1] Android & iOS & Linux & Mac & Windows
            
            their server installer will help set up a proxy for users that
            aren't familiar with shadowsocks, too
            
   URI      [1]: https://github.com/Jigsaw-Code/outline-apps
       
            newlisp wrote 5 hours 34 min ago:
            For web browsing, Firefox lets you configure socks on android.
       
        jszymborski wrote 6 hours 0 min ago:
        Mastodon is not easy for regimes to completely block, and most
        instances won't block you for using Tor. Mastodon saw a huge migration
        from Brazil when X was blocked there.
        
   URI  [1]: https://joinmastodon.org/
       
          int_19h wrote 3 hours 21 min ago:
          It would be easy to block on protocol level. Countries that block
          VPNs usually progress to that level pretty fast once they discover
          that simple IP blocks don't work.
       
            jszymborski wrote 2 hours 33 min ago:
            The traffic looks like any other web page.
       
              int_19h wrote 2 hours 9 min ago:
              I doubt that is the case once you do statistical analysis of it.
              
              Advanced VPN tunneling protocols, for example, have to take a lot
              of special measures to conceal their nature from China's and
              Russia's deep packet inspecting firewalls.
       
          barbazoo wrote 4 hours 34 min ago:
          Wouldn't it be easy to block the individual servers, e.g. [1] ?
          
   URI    [1]: https://mastodon.social
       
            kragen wrote 4 hours 3 min ago:
            Sure, but if you have an account on a different server, you can
            still see things posted on mastodon.social if you have followed
            someone there.
       
            evulhotdog wrote 4 hours 12 min ago:
            There are many instances of Mastodon, and due to its federated
            nature, you can use any of them to access it, and even host your
            own.
       
              Ray20 wrote 3 hours 35 min ago:
              What's stopping them from just blocking them all and continuing
              to block new ones?
       
                mayneack wrote 2 hours 12 min ago:
                The long tail is very long
       
                evulhotdog wrote 3 hours 29 min ago:
                Nothing is stopping them, but like most things in blocking free
                speech, it’s a game of cat and mouse.
       
        reactordev wrote 6 hours 0 min ago:
        localtunnel.me, some node in the cloud, tunnel…
       
        Aachen wrote 6 hours 1 min ago:
        Aren't there local (online or print) newspapers to get news from, as an
        alternative to Discord? Hope I'm not asking a dumb question
       
          wafflemaker wrote 5 hours 44 min ago:
          It's not a dumb question at all. Level on hn really got down lately
          if you're getting downvoted.
          
          Think about it Aachen. If the government has enough power to censor
          internet traffic, that what was the first thing it censored? Which
          media is traditionally known for being censored or just speaking
          propaganda? That's the classical newspapers. It's not uncommon in
          authoritarian countries for editors to need state to sign off on the
          day's paper. And if not that, articles are signed and publishers are
          known. They will auto-censor to avoid problems. Just like creators on
          YouTube don't comment on this one country's treatment of civilians to
          avoid problems.
       
          alluro2 wrote 5 hours 53 min ago:
          In countries where it comes to government blocking/censoring internet
          traffic, traditional media is cleared of all dissent and fully
          controlled long before. Last stages of that are happening in my
          country, Serbia, currently.
       
            Aachen wrote 5 hours 16 min ago:
            Right, that makes sense. Did some looking up and nonfree press
            seems to be indeed the case for Indonesia: [1] It's a mixed bag
            apparently, free press is technically legal since 1998 but
            selective prosecution and harassment of those actually uncovering
            issues (mainly becomes clear in the last section, "Safety")
            
            Tried looking up Serbia next on that website but got a cloudflare
            block. I'm a robot now...
            
   URI      [1]: https://rsf.org/en/country/indonesia
       
        jszymborski wrote 6 hours 2 min ago:
        Folks who are looking to bypass censorship, and those who live in
        countries where their internet connection is not currently censored who
        would like to help, can look to
        
   URI  [1]: https://snowflake.torproject.org/
       
        rthnbgrredf wrote 6 hours 3 min ago:
        In case known VPN providers are blocked you can pick a small VPS from a
        hoster like Hetzner and setup your own VPN.
       
        lemper wrote 6 hours 4 min ago:
        megavpn, should be around a dollar a month for 5 devices.
       
        diggan wrote 6 hours 4 min ago:
        Tor should be pretty good even for environments where they crack down
        on VPNs, although it can be a bit slow, at least it works.
       
          immibis wrote 6 hours 3 min ago:
          Then you will be blocked by Twitter and Discord, which is the same
          thing.
       
            diggan wrote 5 hours 56 min ago:
            Yeah, sucks, but really should find better places for people to
            gather regardless, if you're in that sort of environment.
       
              redserk wrote 4 hours 19 min ago:
              How is this practical advice in a thread where someone mentions
              that the clampdown happened without notice?
              
              The "shoulda done..." advice isn't useful in the slightest, and
              I'd argue is malicious with how often it's done simply to satiate
              a poster's ego.
       
        sturza wrote 6 hours 14 min ago:
        Mullvad
       
          reisse wrote 4 hours 32 min ago:
          Mullvad doesn't really have any modern censorship circumvention
          options.
       
            octo888 wrote 3 hours 58 min ago:
            Genuine question is Shadowsocks outdated? Because it supports it
       
       
   DIR <- back to front page