I’m sure I’d be preaching to the choir if I told you that it’s time for us to immigrate from übercorp owned social media and services. All of you have done so, so that’s not the point of this post. Even though we are on these new platforms, the fediverse is still sensitive to requests from governmental bodies and organizations. Lemmy.zip has already blocked UK users and Lemmy.world will almost certainly do the same. Due to the size of Matrix’s biggest homeserver matrix.org, the admins of said homeserver are beginning to follow the OSA and have already raised their minimum age to 18+. And instances who don’t follow the Act could be subjected to insurmountable paperwork and even blocked from the UK, Australia and other countries enacting these outrageous laws soon.
Blocking UK users to avoid this is almost a necessity, and as Labour is attempting to get lawmakers to outlaw VPNs, we could be seeing the equivalent of the UK Great Firewall soon. However, it will take significant amounts of time, money and paperwork to outlaw VPNs and to get ISPs to block sites and protocols. This is where federated and open source platforms have an advantage, without being shackled by bureaucracy they are able to quickly adapt. But this is not sustainable, and eventually the UK will become even more overreaching in order to gain more control over people’s Internet usage.
Darknets such as Tor, I2P and Yggdrasil are a potential solution, however they have multiple issues. Tor is slow and has a reputation of being used by pedophiles and drug traffickers. I2P is scattered in implementation and cannot handle high load. Yggdrasil is alpha software and requires IPv6, which in many countries is simply not possible to use. Whilst these darknets are extremely resistant to censorship from other countries, with the only way to fully dismantle them would be to shutoff all access to the Internet, they still are not capable of handling modern Internet usage.
We might need new completely independent mediums seperate from the Internet to avoid this. Physical bluetooth mesh networks or other technology is an example. Maybe even a new version of dial-up. All I know is that governments will not stop here. I might seem like I’m overreacting here, but we need to be prepared for what is coming.
CORRECTION: I was told by a peer that Yggdrasil peers must have IPv6, however one does not need an IPv6 enabled network to use it, they just need an IPv6 operating system/device, which virtually every modern operating system including Windows and Linux does. Yggdrasil is actually Beta software.
You are not overreacting, an alternative to internet is needed and it’s not that hard to create, there are many projects already of networks working over radio and wifi, we should probably just stick to one of these and work to expand it
Meshtastic-Based Web?
The UK moves are very worrying. We’re trying to help people to move away from big tech at our site https://www.rebeltechalliance.org/
We recommend fediverse protocols wherever possible - so I’m interested in the comments here about how that is affected
This site would be more compelling if it didn’t look so much like a you wouldn’t steal a car ad.
I have always wondered about distributed hosting, like BitTorrent, but for websites. You go to a webpage, and it gets seeded from however many people host the file. It should be harder to take down. I do not code at all. Is that a thing? Why not?
So like IPFS?
I tried really hard to use IPFS. I set up a syncthing and did some auto-publishing scripts.
It’s slow AF, and unless you pay some big player to pin your files there’s only about a 1 in 10 chance of it actually being available everywhere. I had to actually peer my computers together to get sure fire access to my own data.
Then there’s very little in the way of privacy. I did some JavaScript crypto self-decrypting archives that was kind of fun But with the distribution problems it just became more of a hassle to use than anything.
That has already been done: https://zeronet.io/
I just jack off into the camera every once Ina a while in case any government agent is watching. I don’t have to do it. But they have to watch it
Hate being assigned to this guy
Tor is not that slow for normal internet usage. You can even watch videos in SD.
you can at it’s current usage level, if new limits spark new usage, we’ll need a lot more exit nodes.
Tribler has inbuilt onion routing. If I understand it correctly, tribler <-> tribler connections don’t need exit nodes and it’s fast enough to stream video
We need to install fusion rockets on the far-side of the moon and crash it into Earth! All Problems solved!
Trouble is, there is little that can be done.
Enough folks drank the coolaid, and now we’re stuck with surveillance laws masquerading as child protection laws.
Those laws can, and will, get worse over time. However, new mediums will arise, or old ones will rise to the occasion (IRC goes brr). The main thing to do is remain calm, make it a key voter issue, and watch the bastards fold right before the next election.
The main thing to do is remain calm, make it a key voter issue, and watch the bastards fold right before the next election.
What’s your plan to make it a key voter issue? Lamenting about it on censored internet?
We need bulletproof alternatives and solutions.
(IRC goes brr)
XMPP has been brring for a while now.
Enough folks drank the coolaid,
You say that like the UK all sat down in a room and most of the country said “please censor me”.
Back to printing presses
geocaching + memory sticks
with the only way to fully dismantle them would be to shutoff all access to the Internet
I don’t think this is true. It’s a bit complicated because there are ways to obfuscate the traffic, but generally speaking, I’d assume governments could track and block nodes just as easily as you can find them.
Tor is slow
It might trip you up for real-time things like gaming and you might take a while to download HUGE files, but it’s much faster than its historical reputation
and has a reputation of being used by pedophiles and drug traffickers
This is true for any privacy software. Encrypted chats, cryptographic currency, darknets. Even the internet itself has that reputation. Anyone trying to hide what they’re doing is likely to seek privacy tools. Reputation means nothing.
Only tangentially related, but in the vein of privacy and circumventing surveillance, one communication idea I really like in that vein is from the show The Leftovers–the way the “Remnant” group communicates only by simple handwritten notes.
I just like the idea that something so rudimentary could theoretically overcome a lot of very high-tech snooping equipment. Good luck using your Stingray cell tower simulator to intercept my notepad scribbles.
Camera’s or any other matter of visual detection. So perhaps we should get back into cyphers. Vigere anyone?
Visual regonition on image coming from many stream most of them having nothing to actually recognised as text is much harder to do than analys text in computer text format than come right to you.
I also presume some level of common-sense. Don’t do it near cameras, destroy the notes immediately, etc… It’s not air-tight, but it’s a surprisingly useful approach in many contexts where very expensive technology can fail.
Obviously, yeah, it wouldn’t work in the middle of a Target. And given the AI tools that can use keyboard typing sounds to determine what was typed, it’s even theoretically possible there’s some bleeding-edge capability to circumvent it. But in general, if you’re in some context where you’re not sure if you’re being listened to/monitored, handwritten notes would definitely work, because your biggest concerns are e-mail, text messages, phone calls, GPS, etc…
Due to the size of Matrix’s biggest homeserver matrix.org, the admins of said homeserver are beginning to follow the OSA and have already raised their minimum age to 18+.
You can always host your instance.
Lemmy.zip has already blocked UK users
Host your own.
Tor is slow and has a reputation of being used by pedophiles and drug traffickers.
It sucks that literally using something that should be the default, truly protecting privacy, has such a bad reputation because… well it protects privacy.
Seriously. The reason CSAM merchants and drug dealers use Tor is because it actually protects their privacy successfully. Whereas, if you’re using a VPN or whatever cobbled-together solution, the feds just have a hearty laugh about it, send a subpoena by email or use some automated system that’s even more streamlined, and then come and find you.
Tor is not bulletproof; they regularly run operations where they take down some big illegal thing on the dark web. But they have to do an operation for it, and if there were any solution that was any better, that thing would be even more infested with illegal material than “the dark web” is. That’s just how it works. And listening to the newspapers when they tell you that it’s a sign you need to stay away from those actually-effective solutions because “terrorism!” or whatever is a pretty foolish idea.
Not all VPNs store enough user info for feds to be able to find anything useful on their servers.
I’ve literally never in my life heard of “this person was doing (whatever), but they were behind a VPN, so we had to do (whatever elaborate sting operation) instead of compromising the VPN.” I’ve heard that many times about Tor.
It’s possible that no one’s ever done something significant enough to make the feds interested from behind a VPN, just always used Tor, but I feel like it is unlikely. I feel like it’s more likely that they either have the ability to force the VPN companies to comply with some legal structures that give them the info they need, or else just wiretap the pipes going in and out of the VPN servers and can sort things out pretty straightforwardly if they really start to care about it.
VPNs are certainly useful; they make it a lot more difficult for non-law-enforcement people to know what you’re up to, which is a significant gain, and they are faster and generally more convenient than using Tor. But if you’re actually concerned about the government, I would use Tor 100% of the time over a VPN.
I dont think most people need a security model that is fed proof. Thats a pretty extreme level of privacy and most people would break it by yappign about their life to much.
Well, but we’re talking about how to prepare for the future where it does need to be fed proof. At some point, I think pretty soon from now in some places, it’s going to become necessary to either break the rules of the internet in ways that can actually get you in trouble, or accept that you have to do things like upload your ID to all these places, agree not to access certain types of content the government doesn’t want you looking at, not say certain political things on social media or else you’re going on a list, things like that.
I think option A is probably better and it probably makes sense to start to think about, how are we going to do that and not have the expanded-and-mission-creeped version of ICE showing up at your door for it to give you a citation or worse, a year from now.
Right now, yes, a VPN is fine. But that’s only true for as long as the government doesn’t strongly dislike anything that you are doing.
Tor is not bulletproof; they regularly run operations where they take down some big illegal thing on the dark web.
That tends to be more due to bad opsec than Tor itself, though.
Yeah. As far as I know, there are some theoretical state-actor attacks, but nothing that anyone’s ever been able to make work in practice. Compromising something else is just always easier.
It was literally designed by professional spies to be resistant against state intelligence agencies. It was originally made by US intelligence for secret communication with their assets, and only released to the public when they realized they needed a bunch of additional traffic on the network that the US intelligence traffic can blend in with. At least as of the Snowden leaks (which showed NSA compromise of huge amounts of the internet including most HTTPS traffic), they hadn’t figured out a way to undo it for their own spying purposes, either.
That reputation has entirely been created by the media frenzy over busting the worst kinds of criminals.
Oh they’re all using the same technology? Yeah of course they are, because that’s the technology that works the best. It has so many fucking use cases.
Funny that the media frenzy is hitting a fever pitch just as we most desperately need powerful tools for opposing fascism. Almost like that’s not really a coincidence.
Paper money is slow and has a reputation of being used by pedophiles and drug traffickers.
A lot of inert things are used in bad ways.
This is honestly the best reputation a technology like this could have imo, because it very clearly shows that it does work
From the picture I’m going to say it should be the great wall of politicians. It may take a while but If pile enough of the up and cement them together one way or the other things will improve.
If doing an overlay network (network on top of the Internet), you probably won’t be able to do much better than Tor or i2p.
We confirm the trilemma that an AC [anonymous communication] protocol can only achieve two out of the following three properties: strong anonymity (i.e., anonymity up to a negligible chance), low bandwidth overhead, and low latency overhead.
https://freedom.cs.purdue.edu/projects/trilemma.html
This applies to all types of anonymous networks as well (BT, Wifi, etc).
Lemmy.zip has already blocked UK users and Lemmy.world will almost certainly do the same.
For clarity, lemmy.zip had blocked them months ago because the owner of lemmy.zip is based in the UK and theoretically could actually be fined. This is not the same situation as lemmy.world.
Guess they need to work on their authoritarian hellhole of a country.
~American
Americans arent exactly in a great position to judge right now.