←back to thread

1309 points rickybule | 10 comments | | HN request time: 1.201s | source | bottom

Indonesia is currently in chaos. Earlier today, the government blocked access to Twitter & Discord knowing news spread mainly through those channels. Usually we can use Cloudflare's WARP to avoid it, but just today they blocked the access as well. What alternative should we use?
Show context
_verandaguy ◴[] No.45055604[source]
Hello! I've got experience working on censorship circumvention for a major VPN provider (in the early 2020s).

- First things first, you have to get your hands on actual VPN software and configs. Many providers who are aware of VPN censorship and cater to these locales distribute their VPNs through hard-to-block channels and in obfuscated packages. S3 is a popular option but by no means the only one, and some VPN providers partner with local orgs who can figure out the safest and most efficient ways to distribute a VPN package in countries at risk of censorship or undergoing censorship.

- Once you've got the software, you should try to use it with an obfuscation layer.

Obfs4proxy is a popular tool here, and relies on a pre-shared key to make traffic look like nothing special. IIRC it also hides the VPN handshake. This isn't a perfectly secure model, but it's good enough to defeat most DPI setups.

Another option is Shapeshifter, from Operator (https://github.com/OperatorFoundation). Or, in general, anything that uses pluggable transports. While it's a niche technology, it's quite useful in your case.

In both cases, the VPN provider must provide support for these protocols.

- The toughest step long term is not getting caught using a VPN. By its nature, long-term statistical analysis will often reveal a VPN connection regardless of obfuscation and masking (and this approach can be cheaper to support than DPI by a state actor). I don't know the situation on the ground in Indonesia, so I won't speculate about what the best way to avoid this would be, long-term.

I will endorse Mullvad as a trustworthy and technically competent VPN provider in this niche (n.b., I do not work for them, nor have I worked for them; they were a competitor to my employer and we always respected their approach to the space).

replies(13): >>45055852 #>>45055945 #>>45056233 #>>45056299 #>>45056618 #>>45056673 #>>45057320 #>>45057400 #>>45057422 #>>45058880 #>>45061563 #>>45073976 #>>45074923 #
teeray ◴[] No.45056673[source]
> First things first, you have to get your hands on actual VPN software and configs.

It would be nice if one of the big shortwave operators could datacast these packages to the world as a public service.

replies(5): >>45056874 #>>45057270 #>>45057776 #>>45058196 #>>45059764 #
ianburrell ◴[] No.45058196[source]
There isn't enough bandwidth in HF to transmit data. Digital HF audio is 20 kHz wide so maybe 50kbps. The entire HF band is only 3-30 MHz.
replies(4): >>45058527 #>>45058633 #>>45059168 #>>45067499 #
zack6849 ◴[] No.45058633[source]
sure there is, you can send files over HF, it may not be FAST, but once you get it into the country, you can just copy the file with a faster method (eg: usb drive), WINLINK supports attachments, so you could absolutely send these files over HF
replies(2): >>45058717 #>>45061347 #
smallnamespace ◴[] No.45058717[source]
If you're going to be using USB drives anyway, then using them to move files into the country would be faster.
replies(1): >>45058956 #
1. nine_k ◴[] No.45058956[source]
More dangerous though. You'd need something like truecrypt, too.
replies(2): >>45059840 #>>45060220 #
2. youainti ◴[] No.45059840[source]
btw, veracrypt is the name if the follow up project. truecrypt shut down over a decade ago rather abruptly, so anything labeled truecrypt today is suspect as either out of date or potential malware.
replies(1): >>45064077 #
3. estimator7292 ◴[] No.45060220[source]
Nah, just drop a few thousand 1GB flash drives from a plane. Load them with a tor browser, a wireguard client, and instructions on finding a remote exit. Only one copy needs to survive and it can spread very quickly and irreversibly by foot.
replies(2): >>45060566 #>>45061435 #
4. ZaoLahma ◴[] No.45060566[source]
Yeah, this is a great approach if you're already at war with a country.

If you're not and they're still allowing your planes to fly through their airspace then this is a great way to ensure that they lock your (and your friends') planes out.

replies(1): >>45079668 #
5. GJim ◴[] No.45061435[source]
Plugging in a strange USB drive?

What could go wrong.

replies(1): >>45062729 #
6. ForOldHack ◴[] No.45062729{3}[source]
Would you like a short list, a long list or ...
7. cheeseomlit ◴[] No.45064077[source]
Wasn't the conspiracy theory that truecrypt got shut down because it was 'too effective', and the successor projects presumably have intentional backdoors or something?
replies(1): >>45076942 #
8. rOOb85 ◴[] No.45076942{3}[source]
Truecrypt was likely developed by only 1 man, Paul le roux, who likely shut it down because he was on the run for being an international drug/human smuggler/cartel member. It’s kind of a crazy story.

But either way both truecrypt and veracrypt were independently audited and no major flaws were found. Not sure when the last veracrypt audit was done.

9. chipsrafferty ◴[] No.45079668{3}[source]
Drop them from commercial planes via the toilet?
replies(1): >>45081003 #
10. daflip ◴[] No.45081003{4}[source]
When you flush the toilet in an airplane the contents is normally vacuumed in to a holding tank which gets emptied after the plane lands.