• TimeSquirrel
    link
    fedilink
    284 days ago

    Also, I’m pretty sure they can’t do shit about encapsulated data, such as VPN traffic.

    • @[email protected]
      link
      fedilink
      English
      124 days ago

      You can’t even truly read what’s inside of an SSL packet. They probably want to fuck with the routes around torrent trackers.

      There are always ways around, tor, retro share, i2p. I kind of wish we’d find a harder to track version of torrent.

      • @[email protected]
        link
        fedilink
        English
        24 days ago

        Torrents are already very hard to block. You don’t actually need a tracker, because all modern torrent clients support DHT (distributed hash table). You only need some way to get the initial hash for a torrent, so that’s where trackers are still useful, but once you’re connected to the swarm, you can only be blocked if the entire swarm is blocked.

        Tracking though… It’s too easy to get IP addresses for the entire swarm and I don’t see how you could ever fix that. Tor doesn’t really solve that issue either, it just moves it to places where you won’t get in legal trouble or to people who don’t mind getting in legal trouble, a bit like VPN providers.

        • @[email protected]
          link
          fedilink
          English
          14 days ago

          I wonder what the legality would be of seeding the binary difference between the wikipedia.zim and a copy of the wild robot. But I digress… We could probably bolt on something I2P like to torrent, have everything pass through multiple nodes. I fear the best we could ever work out would be plausible deniability.

      • Pika
        link
        fedilink
        English
        41
        edit-2
        4 days ago

        impossible to detect? No, extremly hard to identify what it is? yes.

        Who cares if they can see it’s 5 GB stream, they have no way of knowing whether or not it’s a pirated movie versus a backup from a home server or a data stream.

        In fact some vpns are actually starting to implement data buffering where it makes every request is the same size regardless of what it is to protect against AI Assisted traffic analysis

        • @[email protected]
          link
          fedilink
          English
          174 days ago

          Plus, people are fighting detection too. Where “normal” VPN protocols are recognized and blocked, like China, people are trying to make them indistinguishable from normal HTTPS traffic.

          • Toes♀
            link
            fedilink
            English
            94 days ago

            Yeah, if they wanted to setup deep packet inspection on that level. I’d imagine it would require billions of dollars in compute resources. And it would still suck.

        • @Lost_My_Mind
          link
          English
          64 days ago

          some vpns

          Well “some vpn’s” deserve all our business.

          • Pika
            link
            fedilink
            English
            1
            edit-2
            3 days ago

            if you were looking for a recommendation, I use mullvad, their version is called DAITA, it randomizes the packets to help defend against it

      • @[email protected]
        link
        fedilink
        English
        124 days ago

        There are a lot of industries where huge amount of data is moved all the time (health data, VMs, anything actually). Even small startups can do that and it’s cheaper than ever.

        • @[email protected]
          link
          fedilink
          English
          13 days ago

          Heck a tiny regional bank I worked at with less than 2 dozen locations was constantly flinging data between its Primary and DR datacenters, and they were too small for any dedicated fiber so that was just over standard ISPs (with some locations technically on residential plans because the ISPs didn’t offer any better options than that in the small towns the bank supported)