You need to look into NNCP (nncpgo.org, clone the source ASAP), Nostr, FIDO, and offline first solutions.
The key is to avoid protocols that are too “chatty”. You need simple request/response, with no timeout, where the response could be huge files you have requested. Then you can pass request/response over USB/MicroSD sneakernet or short lived VPN connection (before it can be detected and blocked).
Nostr is useful because identity is a key, so you can publish anonymously but people who like your content can verify that a piece of content comes from you. Also, if data can be brought across the border, it is very easy to republish it. If the situation degrades to where you are relying on sneakernet, bringing a week’s worth of Nostr events across the border and distributing it to others may be effective at keeping a small, slow lifeline open.
I fear we will see the same thing soon in the West especially if this war expands. Good luck and godspeed.
Edit: steganography would also be useful, if any sites that allow UGC are whitelisted.
Nothing surprising here, nationalism requires isolating the people from external sources of information in order for its debilitating propaganda to succeed.
Since it's a website white list, maybe VLESS with SNI masking to a whitelisted website abroad would work? But you have to buy a VPS and run the xray server yourself.
- roskomnadzor just not being competent enough to implement the block fully
- they'll reserse the block, since it will likely completely cripple everything that relies on the internet (which is basically everything nowadays)
- they won't go through with the ban completely, since if they do, their job is sort of done, and they want to continue to exist to make money off of the digital infrastructure required to implement the block, and they'll just continue playing this game of cat and mouse
- outside internet connectivity will likely remain to some degree, it'll just be very slow and probably expensive, but i really struggle to see a country like Russia being completely cut off from the internet in the year of our lord 2026
i could be wrong, who knows, after all this whole situation is unprecedented, and human ingenuity sort of always finds a way
and in a somewhat positive note, mobile internet has come back today and the blocks are bypassable with a regular vpn now, even ones that aren't being hosted on whitelisted subnets
1. Thanks to the sanctions, it is virtually impossible for RF citizens to purchase anything abroad with Russian credit cards.
2. VPN was design not to obfuscate but to encrypt - that is, the protocol doesn't conceal the fact that VPN channel is being used, you just cannot peek into the content in this channel. Which means that more and more sophisticated tools are being used to block VPN communications.
vpn protocols we use here nowadays are way more advanced than this, they mimic a TLS handshake with a legitimate (non blocked site, like google.com) and looks essentially like regular https traffic to that site
it looks like they are basically impossible to detect, given the failure to block them, outside of timing attacks (seeing if a request crosses Russia's border and comes back quickly after), however that is fully mitigated by just having having the vpn "disconnect" and route traffic directly to Russian unblocked sites, which would otherwise be able to perform such a timing attack detection
pretty interesting stuff, there are several versions of this system, and even the ones that have existed for a while work pretty well
You need to look into NNCP (nncpgo.org, clone the source ASAP), Nostr, FIDO, and offline first solutions.
The key is to avoid protocols that are too “chatty”. You need simple request/response, with no timeout, where the response could be huge files you have requested. Then you can pass request/response over USB/MicroSD sneakernet or short lived VPN connection (before it can be detected and blocked).
Nostr is useful because identity is a key, so you can publish anonymously but people who like your content can verify that a piece of content comes from you. Also, if data can be brought across the border, it is very easy to republish it. If the situation degrades to where you are relying on sneakernet, bringing a week’s worth of Nostr events across the border and distributing it to others may be effective at keeping a small, slow lifeline open.
I fear we will see the same thing soon in the West especially if this war expands. Good luck and godspeed.
Edit: steganography would also be useful, if any sites that allow UGC are whitelisted.
Nothing surprising here, nationalism requires isolating the people from external sources of information in order for its debilitating propaganda to succeed.
Do you want a technical solution for a governmental problem?
It's not going to work.
you need secure channels of communication (and preferably a connection to the outside world) to solve any problem
Since it's a website white list, maybe VLESS with SNI masking to a whitelisted website abroad would work? But you have to buy a VPS and run the xray server yourself.
perhaps, there's still hope i think:
- roskomnadzor just not being competent enough to implement the block fully
- they'll reserse the block, since it will likely completely cripple everything that relies on the internet (which is basically everything nowadays)
- they won't go through with the ban completely, since if they do, their job is sort of done, and they want to continue to exist to make money off of the digital infrastructure required to implement the block, and they'll just continue playing this game of cat and mouse
- outside internet connectivity will likely remain to some degree, it'll just be very slow and probably expensive, but i really struggle to see a country like Russia being completely cut off from the internet in the year of our lord 2026
i could be wrong, who knows, after all this whole situation is unprecedented, and human ingenuity sort of always finds a way
and in a somewhat positive note, mobile internet has come back today and the blocks are bypassable with a regular vpn now, even ones that aren't being hosted on whitelisted subnets
Арендуй VPS сервер в другой стране и подними на нем VPN сервер личный и тебя никто не заблокирует.
This will not work for two reasons:
1. Thanks to the sanctions, it is virtually impossible for RF citizens to purchase anything abroad with Russian credit cards.
2. VPN was design not to obfuscate but to encrypt - that is, the protocol doesn't conceal the fact that VPN channel is being used, you just cannot peek into the content in this channel. Which means that more and more sophisticated tools are being used to block VPN communications.
vpn protocols we use here nowadays are way more advanced than this, they mimic a TLS handshake with a legitimate (non blocked site, like google.com) and looks essentially like regular https traffic to that site
it looks like they are basically impossible to detect, given the failure to block them, outside of timing attacks (seeing if a request crosses Russia's border and comes back quickly after), however that is fully mitigated by just having having the vpn "disconnect" and route traffic directly to Russian unblocked sites, which would otherwise be able to perform such a timing attack detection
pretty interesting stuff, there are several versions of this system, and even the ones that have existed for a while work pretty well
read the post please, the precise problem is that this may soon not work
> Rent a VPS in another country and set up your own personal VPN server on it, and no one will be able to block you.
(machine translation)
How would this ever work with a whitelist? did you even read the post?
[dead]
[dead]