←back to thread

259 points the-mitr | 1 comments | | HN request time: 0.234s | source
Show context
nesk_ ◴[] No.45048967[source]
What a shameful government!

clicks the link

blocked

Oh right, France government is shameful too.

replies(11): >>45049003 #>>45049143 #>>45049219 #>>45049260 #>>45049381 #>>45049851 #>>45049951 #>>45050019 #>>45050024 #>>45050125 #>>45051123 #
Pooge ◴[] No.45049219[source]
Genuine question: won't having your own—or independant—DNS server completely bypass that block?
replies(4): >>45049300 #>>45049782 #>>45049885 #>>45049902 #
adithyassekhar ◴[] No.45049885[source]
Most ISPs nowadays use DPI to do these blocks which are actually redirects. And with how ssl certificates work, users will only see an error page instead of the redirected domain.

If you're on Android you can use Intra from google https://getintra.org/intl/en-GB/#!/

Or if you're on Windows you can use GoodbyeDPI https://github.com/ValdikSS/GoodbyeDPI

Both will split up your dns requests into chunks so the ISPs filter won't catch it.

replies(1): >>45049960 #
psnehanshu ◴[] No.45049960[source]
If you have DNS-over-HTTPS enabled, then ISP won't be able to interfere with DNS. Right?
replies(1): >>45050811 #
1. adithyassekhar ◴[] No.45050811[source]
Yes that is correct. But some then look into the headers after DNS resolution. They are not blocking ip addresses returned by the dns because everything is on a cdn nowadays.

These tools obfuscates your headers as well.