logoalt Hacker News

Staying ahead of censors in 2025

139 pointsby ggeorgovassilistoday at 5:47 AM74 commentsview on HN

Comments

throwfaraway135today at 7:33 AM

Considering the staggering number of arrest for online/offensive communications in England & Wales, we should add Britain to the list of Russia and Iran

2017: ~5,500 arrests

2019: ~7,734 arrests

2023: ~12,183 arrests

show 12 replies
photiostoday at 7:26 AM

> No mention of EU chat control

> No mention of "age verification"

> No mention of people arrested for Twitter posts in the UK and the EU

What did they mean by this?

show 2 replies
grumbeltoday at 9:56 AM

Why is Tor making it so difficult to change the region/ExitNode then? Geo-Blocking is by far the most prevalent form of online censorship and while Tor can work around it, it requires fiddling with config files and restarting the service instead of clicking a button.

mmsctoday at 6:15 AM

Does anybody know what the situation is like in China these days? What's the most commonly used tool for proxying now?

Does basically all network leaving China still get ratelimited at a few megabytes per second?

show 3 replies
entropyneurtoday at 8:20 AM

Honest question: why no mention of China? I assume they've given up earlier due to lack of resources?

NoiseBert69today at 10:11 AM

I'd really love to see native DNS Tunneling in Tor.

mos87today at 9:19 AM

Do they have official instructions on how to setup (which URLs for STUN, etc - there are a couple required) TOR via Snowflake on desktop (bc on Android it all seems to be bundled inside Orbot)?

Fiveplustoday at 7:13 AM

The section on conjure is fascinating. For those who haven't followed the refraction networking space, the idea of leveraging unused address space at the ISP level is something academic papers have proposed for years [1]. Seeing it deployed in the wild is huge. The hardest part of this has always been non-technical by the way. Convincing ISPs to cooperate. If the Tor project has managed to get ISPs to route traffic destined for unallocated IPs to a station that handles the handshake, it completely breaks the censor's standard playbook of IP enumeration. You can't just block a specific subnet without risking blocking future legitimate allocations.

I'd be curious to know if these are smaller, sympathetic ISPs or if they managed to partner with larger backbone providers. I'm interested to hear more about this.

[1] look up tapdance

show 3 replies
reop2whiskeytoday at 9:58 AM

[dead]

meowmeowmeowatoday at 8:49 AM

[dead]

iwontberudetoday at 6:33 AM

Grape used to be a fine word.

keepamovintoday at 6:44 AM

Legal question for the Tor team (disclaimer, I love Tor and use it in BrowserBox):

- Does Tor need an OFAC license to supply to Russian and Iranian (and other sanctioned entities)? What's your approach to stay compliant and globally helpful? I know 50% of your funding comes from US government (or did a few years back, still?), does this give you extra pathways to engage those regions?

I'm wondering because the system would seem to fall under ITAR due to its encryption, and even if non-ITAR is still a cyber product and these countries are heavily OFAC listed rn.

This is relevant for me right now as I was recetnyl contact by a significant entity in a sanctioned region with a massive deal for BrowserBox. Applying for an OFAC license to see if it's possible to serve them (but we have to make final determination on ethics/legal even if license is approved, I guess). My feeling is that broad sanctions don't hurt the things they are meant to but punish people in all countries from forming transnational links that might actually help to prevent conflicts and build relations however small. Idk, just my reflections after encountring this situation.

show 4 replies