this post was submitted on 29 Aug 2025
682 points (99.9% liked)
Fediverse
36460 readers
1383 users here now
A community to talk about the Fediverse and all it's related services using ActivityPub (Mastodon, Lemmy, KBin, etc).
If you wanted to get help with moderating your own community then head over to !moderators@lemmy.world!
Rules
- Posts must be on topic.
- Be respectful of others.
- Cite the sources used for graphs and other statistics.
- Follow the general Lemmy.world rules.
Learn more at these websites: Join The Fediverse Wiki, Fediverse.info, Wikipedia Page, The Federation Info (Stats), FediDB (Stats), Sub Rehab (Reddit Migration)
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
There's going to come a point at which the Feds/States will lean on the ISPs to handle the censorship for them. We've had people all over the Nat Sec system staring at the "Great Firewall of China" and asking themselves "Can we get something like this over here?"
This is why it's perfect time to get some tech literacy regarding tor, i2p, yggdrasil, and shadowsocks. It's not perfect solution to use tech to circumvent restrictions that shouldn't be there in the first place, but sometimes it really comes to that point and it's really nice to have all systems ready!
The situation does seem quite desperate. I'd like to heed your call. Please advise on most critical systems I should have ready right now today please. I know have a lot of work to do and must stay efficient
If the internet were fully controlled, you’d need mesh networks - DIY, decentralized networks using radios, local connections, or other alternative infrastructures. I don’t know all the details, but Yggdrasil is a promising modern project that functions as an alternative “internet” for mesh networks, while also working over the regular internet.
Within the normal internet, the most resilient solution against heavy censorship is probably Shadowsocks. It’s widely used in mainland China because it can bypass full-scale DPI (deep packet inspection) by making traffic look like normal HTTPS. There are ways for authorities to detect it, and there are counter-methods, but it remains one of the most reliable tools for evading state-level traffic filtering.
Next in line are Tor and I2P. Both are very resilient, and blocking them completely is difficult. It’s a continuous cat-and-mouse game: governments block some bridges or entry nodes, but new ones appear, allowing users to reconnect.
Finally, regular VPNs are useful but generally less resilient. They’re the first target for legal restrictions and DPI filtering because their traffic patterns are easier to detect.
Overall, for deep censorship resistance, it’s a hierarchy: mesh networks > Shadowsocks > Tor/I2P > standard VPNs. You can ask chatbots about any of these and usually get accurate, practical advice because the technical principles are public knowledge.
Couldn't the US hypothetically put a clause in some 'online safety' law conveniently deanonymizing Tor given they own most of the exit nodes?
Owning a lot of Tor exit nodes doesn’t automatically deanonymize users. Exit nodes only see the traffic as it leaves Tor toward the clearnet, not the original sender. To actually identify someone, you’d need to match their traffic entering the network with the traffic exiting - a correlation attack - which requires visibility on both ends. The US doesn’t “own most exits” either; the network is run by many independent operators, and the Tor community actively monitors for malicious relays. Even if a law forced US exit operators to log everything, that alone wouldn’t deanonymize anyone unless combined with large-scale surveillance of entry traffic, which is extremely resource-intensive and not guaranteed to work. In practice, governments can make running exits legally risky, but they can’t just legislate Tor anonymity away.
Governments also need regular users on Tor for it to function properly, otherwise it becomes easier to track down who is targeting you, most likely another government if they are the only ones with "legal" access.