Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Next up will be a VPN ban.

Next up will be a VPN ban.

Scheduled Pinned Locked Moved Uncategorized
ukpolvpnbanpornhubchatcontrolprivacy
45 Posts 31 Posters 143 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Aral BalkanA Aral Balkan

    @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

    Tinkerer  🇪🇺T This user is from outside of this forum
    Tinkerer  🇪🇺T This user is from outside of this forum
    Tinkerer 🇪🇺
    wrote last edited by
    #5

    @aral @jonah This will probably be the next step... Only registered companies will be able to rent a VPS... I hope this gets stuck to the business damage it will cause to VPS/cloud providers

    �U 1 Reply Last reply
    0
    • Aral BalkanA Aral Balkan

      @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

      Мя ��M This user is from outside of this forum
      Мя ��M This user is from outside of this forum
      Мя ��
      wrote last edited by
      #6

      @aral nah, next step would be DPI systems to ban every Wireguard except government-approved corporate systems

      I know, I live in russia

      @jonah

      1 Reply Last reply
      0
      • Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:

        @jonah doesn't say anything about SOCKS proxying over a dynamic SSH tunnel though

        GreyLinuxG This user is from outside of this forum
        GreyLinuxG This user is from outside of this forum
        GreyLinux
        wrote last edited by
        #7

        @paul @jonah I've never heard of this before. I currently have wireguard as my main way to access my local network services. If they ban VPN's, could SOCKS proxying over SSH perform the same purpose ? Could I for example stream my Jellyfin server the same way I currently do over wireguard?

        Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P 1 Reply Last reply
        0
        • Jonah AragonJ Jonah Aragon

          RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

          Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

          A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

          Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

          And the same goes for Chat Control and encrypted messengers, btw

          #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

          K This user is from outside of this forum
          K This user is from outside of this forum
          Kerplunk
          wrote last edited by
          #8

          @jonah

          UK users complaining about vpn blocks.

          That is The dream of Keir Srtalin Starmer and Shabhana Mahmood who dreams about total surveillance and knowing the thoughts of every citizen better than the person themselves.

          Friends of israel Financed, genocide supporting Repressive Labour must go.

          1 Reply Last reply
          0
          • GreyLinuxG GreyLinux

            @paul @jonah I've never heard of this before. I currently have wireguard as my main way to access my local network services. If they ban VPN's, could SOCKS proxying over SSH perform the same purpose ? Could I for example stream my Jellyfin server the same way I currently do over wireguard?

            Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P This user is from outside of this forum
            Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P This user is from outside of this forum
            Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:
            wrote last edited by
            #9

            @Greylinux @jonah technically... Yes. Although it is a bit more technical to set up than a VPN server.
            It should work for a Jellyfin server as is, but sometimes I find doing a more specific remote tunnel is better for this (and a lot better if the client does not have proxy settings)

            GreyLinuxG 1 Reply Last reply
            0
            • Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:

              @Greylinux @jonah technically... Yes. Although it is a bit more technical to set up than a VPN server.
              It should work for a Jellyfin server as is, but sometimes I find doing a more specific remote tunnel is better for this (and a lot better if the client does not have proxy settings)

              GreyLinuxG This user is from outside of this forum
              GreyLinuxG This user is from outside of this forum
              GreyLinux
              wrote last edited by
              #10

              @paul @jonah have you got a recommended guide for this sort of thing ? I'm just searching now to get ahead of the curve should the worst happen.

              Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P 1 Reply Last reply
              0
              • Jonah AragonJ Jonah Aragon

                RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                And the same goes for Chat Control and encrypted messengers, btw

                #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                LukefromDCL This user is from outside of this forum
                LukefromDCL This user is from outside of this forum
                LukefromDC
                wrote last edited by
                #11

                @jonah Part of the problem is not having the Second Amendment to make the government think twice about rounding people up for "porn violations" by VPN.

                Here most of the South has age verification laws and is thus blocked, but VPN bans are going nowhere and no proposal has included individual criminalization to my knowledge.

                Also note that Tor is a real bear for ISPs or governments to block. Even China's Great Firewall can only stop some Tor traffic, some of the time.

                Henrik PauliP 1 Reply Last reply
                0
                • Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P This user is from outside of this forum
                  Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P This user is from outside of this forum
                  Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:
                  wrote last edited by
                  #12

                  @rastilin @Greylinux @jonah ah, sarcasm, if only I thought of using that... 😁

                  But yes, you're absolutely right, any government would have absolutely no idea about the difference between a VPN and routing specifix traffic via an alternative path than it would normally go.
                  And I'll see them in court.

                  PedroLealP 1 Reply Last reply
                  0
                  • Jonah AragonJ Jonah Aragon

                    RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                    Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                    A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                    Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                    And the same goes for Chat Control and encrypted messengers, btw

                    #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                    Christopher NeitzertX This user is from outside of this forum
                    Christopher NeitzertX This user is from outside of this forum
                    Christopher Neitzert
                    wrote last edited by
                    #13

                    @jonah oh are they going to be in for some surprises when they figure out this technology they're trying to govern... .

                    1 Reply Last reply
                    0
                    • GreyLinuxG GreyLinux

                      @paul @jonah have you got a recommended guide for this sort of thing ? I'm just searching now to get ahead of the curve should the worst happen.

                      Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P This user is from outside of this forum
                      Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P This user is from outside of this forum
                      Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:
                      wrote last edited by
                      #14

                      @Greylinux @jonah there's probably a nunber of guides out there, but I've just learned things over the years... It's actually how I used to test remote client's internet connections.

                      Anyway, what you'd do is have a basic, cheap, VPS from any provider and country you desire and set it up for SSH access, and I think it's "AllowTcpForwarding yes" that needs to be set in sshd_config.
                      Then you'd connect to it with your client machine with the -D $port parameter, i.e. ssh -D 3080 $server
                      Then in your web browser, you'd set up the proxy settings under SOCKS to your loopback address and the port specified i.e. SOCKS: 127.0.0.1 3080.
                      And that's it, any traffic from that browser will go through your loopback, to the SSH server, then off to the internet. I believe there's an option of sending DNS requests that way too in the web browser. You do need to leave the SSH session open, for obvious reasons.
                      Of course, only the traffic from the web browser will use this route, so you'd need to set it up in different applications' proxy config if you want them to use it too.

                      Obviously, care should be taken to secure the ssh endpoint as much as possible, either through blocklistd, fail2ban, etc. or just allowing connections via a specific IP address

                      GreyLinuxG �U 2 Replies Last reply
                      0
                      • Jonah AragonJ Jonah Aragon

                        RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                        Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                        A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                        Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                        And the same goes for Chat Control and encrypted messengers, btw

                        #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                        DibsD This user is from outside of this forum
                        DibsD This user is from outside of this forum
                        Dibs
                        wrote last edited by
                        #15

                        @jonah we definitely don't have space to lock anyone up on the pretext they might have committed a crime. But I agree with the sentiment.

                        Jonah AragonJ 1 Reply Last reply
                        0
                        • Aral BalkanA Aral Balkan

                          @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

                          ck0C This user is from outside of this forum
                          ck0C This user is from outside of this forum
                          ck0
                          wrote last edited by
                          #16

                          @aral @jonah Datacenters and domain registrars are already under the "know your customers" legislations, like banks.

                          1 Reply Last reply
                          0
                          • Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:

                            @Greylinux @jonah there's probably a nunber of guides out there, but I've just learned things over the years... It's actually how I used to test remote client's internet connections.

                            Anyway, what you'd do is have a basic, cheap, VPS from any provider and country you desire and set it up for SSH access, and I think it's "AllowTcpForwarding yes" that needs to be set in sshd_config.
                            Then you'd connect to it with your client machine with the -D $port parameter, i.e. ssh -D 3080 $server
                            Then in your web browser, you'd set up the proxy settings under SOCKS to your loopback address and the port specified i.e. SOCKS: 127.0.0.1 3080.
                            And that's it, any traffic from that browser will go through your loopback, to the SSH server, then off to the internet. I believe there's an option of sending DNS requests that way too in the web browser. You do need to leave the SSH session open, for obvious reasons.
                            Of course, only the traffic from the web browser will use this route, so you'd need to set it up in different applications' proxy config if you want them to use it too.

                            Obviously, care should be taken to secure the ssh endpoint as much as possible, either through blocklistd, fail2ban, etc. or just allowing connections via a specific IP address

                            GreyLinuxG This user is from outside of this forum
                            GreyLinuxG This user is from outside of this forum
                            GreyLinux
                            wrote last edited by
                            #17

                            @paul @jonah

                            thanks for this insight, its much appreciated. You have definitely given me something to research and think about.

                            1 Reply Last reply
                            0
                            • FonantF This user is from outside of this forum
                              FonantF This user is from outside of this forum
                              Fonant
                              wrote last edited by
                              #18

                              @rastilin @paul @Greylinux @jonah If this law ever does come in, the law makers will have a lot of fun trying to define what a "VPN" is.

                              At the basic level, it's just an encrypted network tunnel between two computers. Something that is logically and mathematically impossible to ban.

                              C 1 Reply Last reply
                              0
                              • Aral BalkanA Aral Balkan

                                @jonah VPN ban -> Ah, people can install WireGuard on a Hetzner droplet -> mandatory age verification for web hosting, etc., etc., ad infinitum.

                                �U This user is from outside of this forum
                                �U This user is from outside of this forum
                                �
                                wrote last edited by
                                #19

                                @aral @jonah good bye working from home

                                1 Reply Last reply
                                0
                                • Tinkerer  🇪🇺T Tinkerer 🇪🇺

                                  @aral @jonah This will probably be the next step... Only registered companies will be able to rent a VPS... I hope this gets stuck to the business damage it will cause to VPS/cloud providers

                                  �U This user is from outside of this forum
                                  �U This user is from outside of this forum
                                  �
                                  wrote last edited by
                                  #20

                                  @tinkerer @aral @jonah good bye self managed next cloud instance and homepage containing cv and work/skill preview

                                  Tinkerer  🇪🇺T 1 Reply Last reply
                                  0
                                  • Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:P Paul Wilde :dontpanic2: :smeghead: :archlinux: :freebsd:

                                    @Greylinux @jonah there's probably a nunber of guides out there, but I've just learned things over the years... It's actually how I used to test remote client's internet connections.

                                    Anyway, what you'd do is have a basic, cheap, VPS from any provider and country you desire and set it up for SSH access, and I think it's "AllowTcpForwarding yes" that needs to be set in sshd_config.
                                    Then you'd connect to it with your client machine with the -D $port parameter, i.e. ssh -D 3080 $server
                                    Then in your web browser, you'd set up the proxy settings under SOCKS to your loopback address and the port specified i.e. SOCKS: 127.0.0.1 3080.
                                    And that's it, any traffic from that browser will go through your loopback, to the SSH server, then off to the internet. I believe there's an option of sending DNS requests that way too in the web browser. You do need to leave the SSH session open, for obvious reasons.
                                    Of course, only the traffic from the web browser will use this route, so you'd need to set it up in different applications' proxy config if you want them to use it too.

                                    Obviously, care should be taken to secure the ssh endpoint as much as possible, either through blocklistd, fail2ban, etc. or just allowing connections via a specific IP address

                                    �U This user is from outside of this forum
                                    �U This user is from outside of this forum
                                    �
                                    wrote last edited by
                                    #21

                                    @paul @Greylinux @jonah beat me to it

                                    1 Reply Last reply
                                    0
                                    • �U �

                                      @tinkerer @aral @jonah good bye self managed next cloud instance and homepage containing cv and work/skill preview

                                      Tinkerer  🇪🇺T This user is from outside of this forum
                                      Tinkerer  🇪🇺T This user is from outside of this forum
                                      Tinkerer 🇪🇺
                                      wrote last edited by
                                      #22

                                      @utf_7 @aral @jonah Mankind is headed (due to the will of the powers that be) to some dramatic shift of things. I hope this whole thing won't be the least of our worries. As always, bad times for the ordinary people. On the US front (and as a lesson to the whole wolrd that still has some form of elections) be careful what you vote and for those who don't... tell us what you think about your mantra "things can't get worse" or "nothing changes".

                                      1 Reply Last reply
                                      0
                                      • Jonah AragonJ Jonah Aragon

                                        RE: https://mastodon.thenewoil.org/@thenewoil/115971195227745876

                                        Next up will be a VPN ban. Many tech-y people will see that and think “lol yeah well that’s not going to stop *me* from using a VPN”

                                        A VPN ban isn’t really meant stop you from using one. It means when they catch you doing so, they’ll use the fact you’re using this harmless technology itself as a *pretense* to lock you up without needing to do any “hard work” (i.e. an investigator’s job) like actually confirming whether you committed a real crime.

                                        Don’t think you won’t be impacted just because you know how to outsmart an ISP filter! This is not a plan to protect children or stop you from consuming adult media. It is a ploy to eventually eliminate ALL freedom of expression and free access to information in the UK.

                                        And the same goes for Chat Control and encrypted messengers, btw

                                        #UKpol #VPNban #PornHub #ChatControl #Privacy #FreeSpeech #SocialMedia

                                        Tim Ward ⭐🇪🇺🔶  #FBPET This user is from outside of this forum
                                        Tim Ward ⭐🇪🇺🔶  #FBPET This user is from outside of this forum
                                        Tim Ward ⭐🇪🇺🔶 #FBPE
                                        wrote last edited by
                                        #23

                                        @jonah Lots of people use VPNs all day every day. There's this thing called "working from home".

                                        DaveyD 1 Reply Last reply
                                        0
                                        • Tim Ward ⭐🇪🇺🔶  #FBPET Tim Ward ⭐🇪🇺🔶 #FBPE

                                          @jonah Lots of people use VPNs all day every day. There's this thing called "working from home".

                                          DaveyD This user is from outside of this forum
                                          DaveyD This user is from outside of this forum
                                          Davey
                                          wrote last edited by
                                          #24

                                          @TimWardCam @jonah I've twice worked in offices where everything was routed through the mothership via VPN.

                                          Looking forward to seeing the gov call international banks a bunch of child endangering bastards any day now.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups