Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
ukpolvpnbanpornhubchatcontrolprivacy
60 Indlæg 40 Posters 0 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • aral@mastodon.ar.alA aral@mastodon.ar.al

    @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

    tinkerer@ieji.deT This user is from outside of this forum
    tinkerer@ieji.deT This user is from outside of this forum
    tinkerer@ieji.de
    wrote sidst redigeret af
    #5

    @aral @jonah This will probably be the next step... Only registered companies will be able to rent a VPS... I hope this gets stuck to the business damage it will cause to VPS/cloud providers

    utf_7@mastodon.socialU 1 Reply Last reply
    0
    • aral@mastodon.ar.alA aral@mastodon.ar.al

      @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

      mo@mastodon.mlM This user is from outside of this forum
      mo@mastodon.mlM This user is from outside of this forum
      mo@mastodon.ml
      wrote sidst redigeret af
      #6

      @aral nah, next step would be DPI systems to ban every Wireguard except government-approved corporate systems

      I know, I live in russia

      @jonah

      1 Reply Last reply
      0
      • paul@notnull.spaceP paul@notnull.space

        @jonah doesn't say anything about SOCKS proxying over a dynamic SSH tunnel though

        greylinux@floss.socialG This user is from outside of this forum
        greylinux@floss.socialG This user is from outside of this forum
        greylinux@floss.social
        wrote sidst redigeret af
        #7

        @paul @jonah I've never heard of this before. I currently have wireguard as my main way to access my local network services. If they ban VPN's, could SOCKS proxying over SSH perform the same purpose ? Could I for example stream my Jellyfin server the same way I currently do over wireguard?

        paul@notnull.spaceP 1 Reply Last reply
        0
        • jonah@mastodon.neat.computerJ jonah@mastodon.neat.computer

          RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

          Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

          A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

          Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

          And the same goes for Chat Control and encrypted messengers, btw

          #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

          K This user is from outside of this forum
          K This user is from outside of this forum
          kerplunk@mastodon.scot
          wrote sidst redigeret af
          #8

          @jonah

          UK users complaining about vpn blocks.

          That is The dream of Keir Srtalin Starmer and Shabhana Mahmood who dreams about total surveillance and knowing the thoughts of every citizen better than the person themselves.

          Friends of israel Financed, genocide supporting Repressive Labour must go.

          honor2025@mastodon.socialH 1 Reply Last reply
          0
          • greylinux@floss.socialG greylinux@floss.social

            @paul @jonah I've never heard of this before. I currently have wireguard as my main way to access my local network services. If they ban VPN's, could SOCKS proxying over SSH perform the same purpose ? Could I for example stream my Jellyfin server the same way I currently do over wireguard?

            paul@notnull.spaceP This user is from outside of this forum
            paul@notnull.spaceP This user is from outside of this forum
            paul@notnull.space
            wrote sidst redigeret af
            #9

            @Greylinux @jonah technically... Yes. Although it is a bit more technical to set up than a VPN server.
            It should work for a Jellyfin server as is, but sometimes I find doing a more specific remote tunnel is better for this (and a lot better if the client does not have proxy settings)

            greylinux@floss.socialG rastilin@aus.socialR 2 Replies Last reply
            0
            • paul@notnull.spaceP paul@notnull.space

              @Greylinux @jonah technically... Yes. Although it is a bit more technical to set up than a VPN server.
              It should work for a Jellyfin server as is, but sometimes I find doing a more specific remote tunnel is better for this (and a lot better if the client does not have proxy settings)

              greylinux@floss.socialG This user is from outside of this forum
              greylinux@floss.socialG This user is from outside of this forum
              greylinux@floss.social
              wrote sidst redigeret af
              #10

              @paul @jonah have you got a recommended guide for this sort of thing ? I'm just searching now to get ahead of the curve should the worst happen.

              paul@notnull.spaceP 1 Reply Last reply
              0
              • jonah@mastodon.neat.computerJ jonah@mastodon.neat.computer

                RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                And the same goes for Chat Control and encrypted messengers, btw

                #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                lukefromdc@kolektiva.socialL This user is from outside of this forum
                lukefromdc@kolektiva.socialL This user is from outside of this forum
                lukefromdc@kolektiva.social
                wrote sidst redigeret af
                #11

                @jonah Part of the problem is not having the Second Amendment to make the government think twice about rounding people up for "porn violations" by VPN.

                Here most of the South has age verification laws and is thus blocked, but VPN bans are going nowhere and no proposal has included individual criminalization to my knowledge.

                Also note that Tor is a real bear for ISPs or governments to block. Even China's Great Firewall can only stop some Tor traffic, some of the time.

                phl@mastodon.socialP 1 Reply Last reply
                0
                • paul@notnull.spaceP paul@notnull.space

                  @Greylinux @jonah technically... Yes. Although it is a bit more technical to set up than a VPN server.
                  It should work for a Jellyfin server as is, but sometimes I find doing a more specific remote tunnel is better for this (and a lot better if the client does not have proxy settings)

                  rastilin@aus.socialR This user is from outside of this forum
                  rastilin@aus.socialR This user is from outside of this forum
                  rastilin@aus.social
                  wrote sidst redigeret af
                  #12

                  @paul @Greylinux @jonah

                  I think Jonah has being sarcastic there. Like, yes, technically you could use a non-VPN VPN, but its still basically a VPN and if VPNs are banned, would probably still be illegal enough if whatever government is in power ever needs a pretext to just grab you.

                  paul@notnull.spaceP fonant@social.vivaldi.netF 2 Replies Last reply
                  0
                  • jwcph@helvede.netJ jwcph@helvede.net shared this topic
                  • rastilin@aus.socialR rastilin@aus.social

                    @paul @Greylinux @jonah

                    I think Jonah has being sarcastic there. Like, yes, technically you could use a non-VPN VPN, but its still basically a VPN and if VPNs are banned, would probably still be illegal enough if whatever government is in power ever needs a pretext to just grab you.

                    paul@notnull.spaceP This user is from outside of this forum
                    paul@notnull.spaceP This user is from outside of this forum
                    paul@notnull.space
                    wrote sidst redigeret af
                    #13

                    @rastilin @Greylinux @jonah ah, sarcasm, if only I thought of using that... 😁

                    But yes, you're absolutely right, any government would have absolutely no idea about the difference between a VPN and routing specifix traffic via an alternative path than it would normally go.
                    And I'll see them in court.

                    pedroleal_@mastodon.socialP 1 Reply Last reply
                    0
                    • jonah@mastodon.neat.computerJ jonah@mastodon.neat.computer

                      RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                      Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                      A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                      Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                      And the same goes for Chat Control and encrypted messengers, btw

                      #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                      xenophile@masto.hackers.townX This user is from outside of this forum
                      xenophile@masto.hackers.townX This user is from outside of this forum
                      xenophile@masto.hackers.town
                      wrote sidst redigeret af
                      #14

                      @jonah oh are they going to be in for some surprises when they figure out this technology they're trying to govern... .

                      1 Reply Last reply
                      0
                      • greylinux@floss.socialG greylinux@floss.social

                        @paul @jonah have you got a recommended guide for this sort of thing ? I'm just searching now to get ahead of the curve should the worst happen.

                        paul@notnull.spaceP This user is from outside of this forum
                        paul@notnull.spaceP This user is from outside of this forum
                        paul@notnull.space
                        wrote sidst redigeret af
                        #15

                        @Greylinux @jonah there's probably a nunber of guides out there, but I've just learned things over the years... It's actually how I used to test remote client's internet connections.

                        Anyway, what you'd do is have a basic, cheap, VPS from any provider and country you desire and set it up for SSH access, and I think it's "AllowTcpForwarding yes" that needs to be set in sshd_config.
                        Then you'd connect to it with your client machine with the -D $port parameter, i.e. ssh -D 3080 $server
                        Then in your web browser, you'd set up the proxy settings under SOCKS to your loopback address and the port specified i.e. SOCKS: 127.0.0.1 3080.
                        And that's it, any traffic from that browser will go through your loopback, to the SSH server, then off to the internet. I believe there's an option of sending DNS requests that way too in the web browser. You do need to leave the SSH session open, for obvious reasons.
                        Of course, only the traffic from the web browser will use this route, so you'd need to set it up in different applications' proxy config if you want them to use it too.

                        Obviously, care should be taken to secure the ssh endpoint as much as possible, either through blocklistd, fail2ban, etc. or just allowing connections via a specific IP address

                        greylinux@floss.socialG utf_7@mastodon.socialU 2 Replies Last reply
                        0
                        • jonah@mastodon.neat.computerJ jonah@mastodon.neat.computer

                          RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                          Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                          A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                          Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                          And the same goes for Chat Control and encrypted messengers, btw

                          #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                          dtwx@mastodon.socialD This user is from outside of this forum
                          dtwx@mastodon.socialD This user is from outside of this forum
                          dtwx@mastodon.social
                          wrote sidst redigeret af
                          #16

                          @jonah we definitely don't have space to lock anyone up on the pretext they might have committed a crime. But I agree with the sentiment.

                          jonah@mastodon.neat.computerJ 1 Reply Last reply
                          0
                          • aral@mastodon.ar.alA aral@mastodon.ar.al

                            @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

                            ck0@tech.lgbtC This user is from outside of this forum
                            ck0@tech.lgbtC This user is from outside of this forum
                            ck0@tech.lgbt
                            wrote sidst redigeret af
                            #17

                            @aral @jonah Datacenters and domain registrars are already under the "know your customers" legislations, like banks.

                            1 Reply Last reply
                            0
                            • paul@notnull.spaceP paul@notnull.space

                              @Greylinux @jonah there's probably a nunber of guides out there, but I've just learned things over the years... It's actually how I used to test remote client's internet connections.

                              Anyway, what you'd do is have a basic, cheap, VPS from any provider and country you desire and set it up for SSH access, and I think it's "AllowTcpForwarding yes" that needs to be set in sshd_config.
                              Then you'd connect to it with your client machine with the -D $port parameter, i.e. ssh -D 3080 $server
                              Then in your web browser, you'd set up the proxy settings under SOCKS to your loopback address and the port specified i.e. SOCKS: 127.0.0.1 3080.
                              And that's it, any traffic from that browser will go through your loopback, to the SSH server, then off to the internet. I believe there's an option of sending DNS requests that way too in the web browser. You do need to leave the SSH session open, for obvious reasons.
                              Of course, only the traffic from the web browser will use this route, so you'd need to set it up in different applications' proxy config if you want them to use it too.

                              Obviously, care should be taken to secure the ssh endpoint as much as possible, either through blocklistd, fail2ban, etc. or just allowing connections via a specific IP address

                              greylinux@floss.socialG This user is from outside of this forum
                              greylinux@floss.socialG This user is from outside of this forum
                              greylinux@floss.social
                              wrote sidst redigeret af
                              #18

                              @paul @jonah

                              thanks for this insight, its much appreciated. You have definitely given me something to research and think about.

                              1 Reply Last reply
                              0
                              • rastilin@aus.socialR rastilin@aus.social

                                @paul @Greylinux @jonah

                                I think Jonah has being sarcastic there. Like, yes, technically you could use a non-VPN VPN, but its still basically a VPN and if VPNs are banned, would probably still be illegal enough if whatever government is in power ever needs a pretext to just grab you.

                                fonant@social.vivaldi.netF This user is from outside of this forum
                                fonant@social.vivaldi.netF This user is from outside of this forum
                                fonant@social.vivaldi.net
                                wrote sidst redigeret af
                                #19

                                @rastilin @paul @Greylinux @jonah If this law ever does come in, the law makers will have a lot of fun trying to define what a "VPN" is.

                                At the basic level, it's just an encrypted network tunnel between two computers. Something that is logically and mathematically impossible to ban.

                                C 1 Reply Last reply
                                0
                                • aral@mastodon.ar.alA aral@mastodon.ar.al

                                  @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

                                  utf_7@mastodon.socialU This user is from outside of this forum
                                  utf_7@mastodon.socialU This user is from outside of this forum
                                  utf_7@mastodon.social
                                  wrote sidst redigeret af
                                  #20

                                  @aral @jonah good bye working from home

                                  1 Reply Last reply
                                  0
                                  • tinkerer@ieji.deT tinkerer@ieji.de

                                    @aral @jonah This will probably be the next step... Only registered companies will be able to rent a VPS... I hope this gets stuck to the business damage it will cause to VPS/cloud providers

                                    utf_7@mastodon.socialU This user is from outside of this forum
                                    utf_7@mastodon.socialU This user is from outside of this forum
                                    utf_7@mastodon.social
                                    wrote sidst redigeret af
                                    #21

                                    @tinkerer @aral @jonah good bye self managed next cloud instance and homepage containing cv and work/skill preview

                                    tinkerer@ieji.deT 1 Reply Last reply
                                    0
                                    • paul@notnull.spaceP paul@notnull.space

                                      @Greylinux @jonah there's probably a nunber of guides out there, but I've just learned things over the years... It's actually how I used to test remote client's internet connections.

                                      Anyway, what you'd do is have a basic, cheap, VPS from any provider and country you desire and set it up for SSH access, and I think it's "AllowTcpForwarding yes" that needs to be set in sshd_config.
                                      Then you'd connect to it with your client machine with the -D $port parameter, i.e. ssh -D 3080 $server
                                      Then in your web browser, you'd set up the proxy settings under SOCKS to your loopback address and the port specified i.e. SOCKS: 127.0.0.1 3080.
                                      And that's it, any traffic from that browser will go through your loopback, to the SSH server, then off to the internet. I believe there's an option of sending DNS requests that way too in the web browser. You do need to leave the SSH session open, for obvious reasons.
                                      Of course, only the traffic from the web browser will use this route, so you'd need to set it up in different applications' proxy config if you want them to use it too.

                                      Obviously, care should be taken to secure the ssh endpoint as much as possible, either through blocklistd, fail2ban, etc. or just allowing connections via a specific IP address

                                      utf_7@mastodon.socialU This user is from outside of this forum
                                      utf_7@mastodon.socialU This user is from outside of this forum
                                      utf_7@mastodon.social
                                      wrote sidst redigeret af
                                      #22

                                      @paul @Greylinux @jonah beat me to it

                                      1 Reply Last reply
                                      0
                                      • utf_7@mastodon.socialU utf_7@mastodon.social

                                        @tinkerer @aral @jonah good bye self managed next cloud instance and homepage containing cv and work/skill preview

                                        tinkerer@ieji.deT This user is from outside of this forum
                                        tinkerer@ieji.deT This user is from outside of this forum
                                        tinkerer@ieji.de
                                        wrote sidst redigeret af
                                        #23

                                        @utf_7 @aral @jonah Mankind is headed (due to the will of the powers that be) to some dramatic shift of things. I hope this whole thing won't be the least of our worries. As always, bad times for the ordinary people. On the US front (and as a lesson to the whole wolrd that still has some form of elections) be careful what you vote and for those who don't... tell us what you think about your mantra "things can't get worse" or "nothing changes".

                                        1 Reply Last reply
                                        0
                                        • jonah@mastodon.neat.computerJ jonah@mastodon.neat.computer

                                          RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                                          Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                                          A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                                          Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                                          And the same goes for Chat Control and encrypted messengers, btw

                                          #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                                          timwardcam@c.imT This user is from outside of this forum
                                          timwardcam@c.imT This user is from outside of this forum
                                          timwardcam@c.im
                                          wrote sidst redigeret af
                                          #24

                                          @jonah Lots of people use VPNs all day every day. There's this thing called "working from home".

                                          davey_cakes@mastodon.ieD 1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper