Most active commenters
  • Humorist2290(4)
  • akho(4)
  • 77pt77(3)

←back to thread

1309 points rickybule | 32 comments | | HN request time: 1.129s | source | bottom

Indonesia is currently in chaos. Earlier today, the government blocked access to Twitter & Discord knowing news spread mainly through those channels. Usually we can use Cloudflare's WARP to avoid it, but just today they blocked the access as well. What alternative should we use?
1. Humorist2290 ◴[] No.45054496[source]
- Tor. Pros: Reasonably user friendly and easy to get online, strong anonymity, free. Cons: a common target for censorship, not very fast, exit nodes are basically universally distrusted by websites.

- Tailscale with Mullvad exit nodes. Pros: little setup but not more than installing and configuring a program, faster than Got, very versatile. Cons: deep packet inspection can probably identify your traffic is using Mullvad, costs some money.

- Your own VPSs with Wireguard/Tailscale. Pros: max control, you control how fast you want it, you can share with people you care about (and are willing to support). Cons: the admin effort isn't huge but requires some skill, cost is flexible but probably 20-30$ per month minimum in hosting.

replies(12): >>45054512 #>>45054517 #>>45054567 #>>45054628 #>>45054699 #>>45054720 #>>45055029 #>>45055389 #>>45055401 #>>45055431 #>>45056362 #>>45059374 #
2. msgodel ◴[] No.45054512[source]
IMO most people should have a VPS even if you don't need it for tunneling. Living without having a place to just leave services/files is very hard and often "free" services will hold your data hostage to manipulate your behavior which is annoying on a good day.
3. nisegami ◴[] No.45054517[source]
Minimums for a VPS should be closer to $5-10 a month, no?
replies(3): >>45054581 #>>45055576 #>>45077190 #
4. Humorist2290 ◴[] No.45054567[source]
And using another VPN like NordVPN or ProtonVPN is probably in the same category as Mullvad, but worth being cautious. If it's free, you are the product. If you pay, you're still sending your traffic to a publicly (usually) known server of a VPN. That metadata alone in some jurisdictions can still put you in danger.

Stay safe

5. Humorist2290 ◴[] No.45054581[source]
Yeah they can be cheap, but I would definitely recommend having at least 3 for redundancy. If one get shut down or it's IP blacklisted you still hopefully have a backup line to create a replacement.
6. zargon ◴[] No.45054628[source]
> 20-30$ per month minimum in hosting

Typo? Wireguard-capable VPSes are available for $20-$30 per year. (https://vpspricetracker.com/ is a good site for finding them.)

replies(1): >>45054684 #
7. Humorist2290 ◴[] No.45054684[source]
I mean multiple VPSs for redundancy. Contabo is maybe the cheapest I've seen and it's like 3$ mtl for the smallest?
replies(2): >>45059885 #>>45061589 #
8. vaylian ◴[] No.45054699[source]
Tor also has anti-censorship mechanisms (snowflakes, ...). Depending on how aggressive the blocking is, Tor might be the most effective solution.
9. cm2187 ◴[] No.45054720[source]
or simply RDP into a windows VPS.
10. rickybule ◴[] No.45055029[source]
Thank you so much for this. It is very helpful.
11. weinzierl ◴[] No.45055389[source]
This is good overview, I just wanted to add that a VPS IP is not a residential IP. You will encounter roadblocks when you try to access services if you appear to be coming from a VPS. Not that I had a better solution, just to clarify what you can expect.
12. codethief ◴[] No.45055401[source]
> - Tailscale with Mullvad exit nodes

Tailscale is completely unnecessary here, unless OP can't connect to Mullvad.net in the first place to sign up. But if the Indonesian government blocks Mullvad nodes, they'll be out of luck either way.

> - Your own VPSs with Wireguard/Tailscale

Keep in mind that from the POV of any websites you visit, you will be easily identifiable due to your static IP.

My suggestion would be to rent a VPS outside Indonesia, set up Mullvad or Tor on the VPS and route all traffic through that VPS (and thereby through Mullvad/Tor). The fastest way to set up the latter across devices is probably to use the VPS as Tailscale exit node.

replies(1): >>45056373 #
13. dingi ◴[] No.45055431[source]
> cost is flexible but probably 20-30$ per month minimum in hosting.

$4/month VPS from DigitalOcean is more than enough to handle a few users as per my experience. I have a Wireguard setup like this for more than a year. Didn't notice any issues.

14. shellwizard ◴[] No.45055576[source]
No, unless you pay month to month. If you wait till BF you can find some really good deals on sites like lowendspirit
15. akho ◴[] No.45056362[source]
Wireguard is not censorship-resistant, and most VPN-averse countries block cross-border Wireguard. Why reply a practical question in an area in which you have no experience?
replies(2): >>45056505 #>>45056516 #
16. jkaplowitz ◴[] No.45056373[source]
Tailscale + Mullvad does have a privacy advantage over either one by itself: the party that could potentially spy on the VPN traffic (Mullvad) doesn’t know whose traffic it is beyond that it’s a Tailscale customer. Any government who wanted to trace specific traffic back to OP would need to get the cooperation of both Mullvad and Tailscale, which is a lot less likely than even the quite unlikely event of getting Mullvad to cooperate.
replies(1): >>45058728 #
17. more_corn ◴[] No.45056505[source]
Because Indonesia is new to the game and might still be catching up. They’re probably playing whackamole with the most common public VPN providers and might not be doing deep packet inspection yet. I worked with someone getting traffic out of Hong Kong a year ago and there was a lot trial and error figuring out what was blocked and what was not. Wireguard was one that worked.
replies(1): >>45056729 #
18. LeoPanthera ◴[] No.45056516[source]
Is it possible to identify wireguard traffic that isn't on a common port?
replies(1): >>45056586 #
19. akho ◴[] No.45056586{3}[source]
Yes. Fixed packet headers, predictable packet sizes. I don't know what "a common port" means in relation to wg.
replies(2): >>45057307 #>>45057416 #
20. akho ◴[] No.45056729{3}[source]
They recommend Tailscale in particular. Tailscale control plane and DERPs (which are functionally required on mobile) will be among the first to go.

Outline (shadowsocks-based) and amnezia (obfuscated wg and xray) both offer few-click install on your own VPS, which is easier than setting up headscale or static wg infrastructure, and will last you longer.

Also, you did not answer my "why" question. I'm not sure what question you were answering.

21. kube-system ◴[] No.45057307{4}[source]
They mean UDP port 51820
replies(1): >>45057391 #
22. akho ◴[] No.45057391{5}[source]
Yeah. Tailscale uses 41641, and you can generally use whatever. I don't think there's any consensus, or majority.
23. ItsHarper ◴[] No.45057416{4}[source]
51820 is the one they use in the docs, that's probably the most common one.
24. codethief ◴[] No.45058728{3}[source]
True, but OP's threat model doesn't involve state actors outside Indonesia, so traffic analysis of the "last mile" between Mullvad node and whatever non-Indonesian service OP is trying to use (Twitter, Discord, …) is not really relevant here. (Assuming Indonesia doesn't have capabilities we don't know of.)

What might be more interesting is the case where the Indonesian government forces Twitter/Discord to give up IP addresses (which I find hard to believe but it's certainly not impossible). But then they'd still have to overcome Mullvad. It's much more likely that if OP has an account on Twitter/Discord, it is already tied to their person in many ways, and this would probably be the main risk here.

25. 77pt77 ◴[] No.45059374[source]
> cost is flexible but probably 20-30$ per month minimum in hosting

Like I've written here.

VPS in EU with 2GB RAM, 40 GB disk and >1TB a month of traffic go for $10 PER YEAR!

https://billing.chunkserve.com/cart.php?a=confproduct&i=0

https://my.servitro.com/cart.php?a=view

https://manager.ouiheberg.com/cart.php?a=confproduct&i=0

replies(1): >>45077195 #
26. notpushkin ◴[] No.45059885{3}[source]
Sure, but ten servers is a bit too much redundancy, no? Depending on how many people you want to share it with it might make sense though.
27. prmoustache ◴[] No.45061589{3}[source]
You don't need multiple vps at all time and can start them dynamically using the vps provider api.

I regularly spawn temporary vps for a few hours to use as socks proxy and view sporting event from my country of origin. There is no reason one couldn't write a script that can spin a VPS choosing a provider and country randomly from a list of supported providers.

28. majorchord ◴[] No.45077190[source]
The cheapest AWS EC2 instance is $3/mo
29. majorchord ◴[] No.45077195[source]
In my experience, not only do a lot of sites block access from datacenter/cloud IPs, but you will routinely encounter captcha loops.
replies(1): >>45079914 #
30. 77pt77 ◴[] No.45079914{3}[source]
This is true, keeps getting worse, but depends heavily on the datacenter/IP.
replies(1): >>45082957 #
31. ranger_danger ◴[] No.45082957{4}[source]
I've also had online shopping orders flagged or unable to buy at all by doing this. They seem to consider traffic as automatically suspicious when it's not through a residential ISP.

Although with the amount of "compromised" residential hosts these days that are for hire through grey-market proxy dealers, I don't know what to think anymore.

replies(1): >>45083900 #
32. 77pt77 ◴[] No.45083900{5}[source]
Also true, but also happens in workplaces.

It will be even worse using a normal VPN so no solution there.

Also, if you're signed in it will be fine.