this post was submitted on 10 Aug 2023
1075 points (98.4% liked)

Technology

58303 readers
10 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 22 points 1 year ago (6 children)

Is it possible to bypass this block? Say, embedding VPN packets within a different protocol?

[–] TheQuantumPhysicist 17 points 1 year ago (2 children)

I don't know why some moron downvoted you, but the answer is maybe. For reference, I have always bypassed SSH firewall blocking by sneaking SSH packets within https.

The only way this won't be possible is if the government enforces installing a certificate to use the internet, so that they can do a man-in-the-middle-attack. I heard this is already being done in Afghanistan.

[–] [email protected] 2 points 1 year ago (1 children)

So sad. More and more we are seeing a world were the powers that be can do anything they want but if you do it it's (rightfully) malware and illegal.

The vast majority of popular apps and OSes are spyware by any reasonable definition of the term.

[–] [email protected] 2 points 1 year ago

I remember, back in the late 1990s, if I have the time right, when RealPlayer phoned home to check for updates, and there was enormous uproar over the privacy implications.

Things sure have changed since then.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)

Hmm. I guess most encrypted protocols aside from SSH use X.509 certs, so they wouldn't make for great wrapper protocols, can be man-in-the-middle attacked. So if they're willing to block SSH and MITM the others, I guess that puts them in a decent place, at least insofar as encrypted connections.

Another option, if one controls both ends and can set things up, is steganography.

One could use non-encrypted data, but where it's difficult or expensive to pick out the data being used to transfer the hidden data in all the rest.

Like, say I have an enencrypted audio stream, 16-bit samples. In the low-order bit of each sample, I can tuck data. Maybe statistical analysis could pick it up, but that's probably not going to be trivial, and maybe you could MITM and degrade everyone's audio, but that's gonna be disruptive.

I mean, probably every online video game can act as a channel for that.

Just need a convenient way to roll out new steganography channels.

The challenge is that hiding data in other data means that there's gonna be overhead, because you gotta also send the other data. So it's probably not bandwidth-efficient, and may impact performance.

load more comments (3 replies)