Exactly my thought haha. And Urbit comes from the LISP/Lambda Calculus world of concerning themselves with high level abstractions and mathematical elegance above all, while Uxn and similar systems follow in the footsteps of Forth and the idea of "get something small and low level working as soon as possible."
Yeah and he didn't want to deal with receiving death threats for working on a passion project. Which I guess is considered being "emotionally unstable".
I usually use snowflake as a last resort, and even that's not consistently working right now. However I've seen people recommend running Conduit[1] to friends overseas, which is an easy-to-use Psiphon proxy node. Psiphon is a popular circumvention tool here so that could be helpful.
I guess it's time to check "be accused of spreading psyops" off my internet bucket list.
Because I guess you're not interested in my own personal experience of witnessing said people get killed either. Or not exiting my home because I feared for my life. But you seem to have a loose definition of "unconfirmed" [1] so I won't dwell on that. Here's all I have to say:
> When the Israeli government claims that Iran needs to be toppled to protect the Iranian people, while they simultaneously commit genocide in Palestine, I have to stop and think about their real motives.
The Iranian government is evil.
The Israeli government is evil.
Both are, believe it or not, true. Conservative ruling systems often dislike other conservative ruling systems.
> Trump wants to bring democracy to Iran
_Iranians_ want to bring democracy to Iran. And as one of them, I sincerely don't give a shit about what Trump or Israel or anyone else outside of this fucking country wants.
We do. It's not very good. As in, there isn't even a properly functioning domestic search engine that can match the quality of anything past AltaVista. The only local platforms worth a damn are the ones you'd be using anyway. (the local equivalents to Uber, Maps etc.)
All other platforms (instant messengers, social media, news) are massively unpopular for being horrid to use at best, and government spyware at worst.
To slow down the immediate damage the government has rolled back a few of the recent restrictions, hence why I can access HN. Among Google and a handful of other basic websites. But they are obviously experimenting and trying to figure out how much censorship they can get away with. There is talk of a planned "whitelisting" of the country's internet. Where almost all but a few big important services are blocked completely. This would have the bonus effect of making circumvention using VPNs and other methods even more difficult than it already is.
Lol. That was _before_ these new restrictions. And don't assume that you could setup a simple wireguard server and be done with it. No, it had to be a proper low fingerprint method (e.g., you had to hide the tls-in-tls timing pattern and do traffic shaping). Now, something like dnstt sometimes works, sometimes doesn't. You may be able to open gmail in 10 minutes if it does, and you explicitly have to block the fonts.
Dam I feel so sorry for you :(
At first I thought like gp, bypass it, then I realized you don't have the privilege to bypass it and leave trails behind. It's not like using a vpn to watch netflix of another country, as netflix won't knock on your door.
FOCI papers[1] are great IMO, but some of submissions are just an academic curiosity, not a practical solution that works for the average Joe at a low cost and scale. For practical methods that are heavily used, you can take a look at popular opensource implementations and their documentation. Sing-box, Xray core, hiddify (their patches on top of xray and singbox), shadowsocks and shadowtls, and many more. ShadowTLS provides a good starting point with a fairly detailed documentation and clearly describes the development process.
The way that I see it, its not just a technical problem anymore. It's about making the methods as diverse as possible and to some extent messing up the network for everyone. In other words, we should increase the cost and the collateral damage of widespread censorship. As an anecdotal data point, the network was quite tightly controlled / monitored around 2023 in Iran and nothing worked reliably. Eventually people (ab)used the network (for example the tls fragments method) to the extent that most of the useful and unrelated websites (e.g., anything behind cloudflare, most of the Hetzner IPv4 addresses, and more) stopped working or were blocked. This was an unacceptably high collateral damage for the censors (?), so they "eased" some of the restrictions. Vless and Trojan were the same at that time and didn't work or were blocked very quickly, but they started working ~reliably again until very recently.
> We enumerate the requirements that a censorship-resistant
system must satisfy to successfully mimic another protocol and
conclude that “unobservability by imitation” is a fundamentally
flawed approach.
I will never get over the company CEO sending here PNGs of new weapon models and saying, essentially, "Yeah so you can just copy & paste these into the game, right?"