📜 ⬆️ ⬇️

Tor? I2p? Maybe something else?

Hello friends!

I am writing this material in order to discuss the current situation with the public, as well as to hear the opinions and comments of users on various theses. My opinion: we were simply not prepared for the fact that we will seriously filter something. And what will happen tomorrow?

1. Attempts to “filter” content will increase


As you realize that prohibitive measures do not work very well (even if you don’t look at how many telecom operators are beginning to create chaos and ban sites), it’s obvious that you need to fight differently - you need to analyze traffic and calculate not only those who makes illegal content available, but also those who consume it.
')
But traffic analysis, in my opinion, is a serious problem on the way to freedom of information distribution. Especially in Russia.

On the other hand, are we ready to ensure that site visitors become anonymous?

2. Today there are no normal ways to resist filtering.


Unfortunately, I know only 2 projects that provide a more or less stable and usable bypass system of filtering attempts: this is Tor and I2P. But more about each.

Tor
A wonderful solution that even has the ability to work as a single assembly (all the necessary software in one bottle), and also allows the owner of almost any site to quickly make his site anonymous (Hidden Services) quickly enough.

However, Tor is not decentralized. And this is a problem, because if you deny or restrict access to servers that store the list of available nodes, the system crashes. Of course, you can use a network bridge, but again - there is no decentralization that we would like.

I2p
To put it mildly, a solution that is very far from normal use. The installation can still be understood by the mere mortal, but its use is extremely far from simple.

And most importantly - also not a completely decentralized solution - when you first start the list of nodes, it is also pulled out from the regular Internet, the addresses of these servers are written and known. What is it worth blocking them?

And really everything? Is there nothing more?

3. No imputed addressing system


Tor - here the site address will look like this: 6sxoyfb3h2nvok2d.onion, the name will be automatically generated from the public key of the server. Everything is good, but remember this address is quite difficult. The advantages include the fact that cybersquatting is impossible. Do I need? :)

I2P - there really is no addressing system at all. It seems like there is a top-level domain, .i2p, but each user can decide for himself what will open at what address, and the lack of unity in this case is bad.

An interesting idea DIANNA - but I do not understand this and can not understand how the address will look like :( I would like comments from experts.

4. The browser manufacturer can help the user.


It is logical that expecting a user to download an application that will allow him to “see the forbidden” is somewhat naive. First, the user generally needs to know that his access to the Internet is being filtered, and then also to figure out what to do with it. And if it goes on like this, then the sites that help to get access to blocked sites will also be on a par with the lawbreakers.

But if you embed this function in the browser, it becomes much easier. But it is hard for me to believe that, for example, Yandex will integrate this functionality into its browser. Perhaps the use of Chromium to release a browser with support for anonymous networks by the public seems to suggest?

5. You need some solution that will help existing sites and systems to quickly migrate to an anonymous network.


Conveniently now what Tor provides - setting up a Hidden Service is done on the same Ubuntu into several teams, but it is clear that this is not yet a mass decision.

It begs the need to support anonymous networks in Apache, nginx and other web servers?

I will be extremely grateful if someone from the users tells and points to possible projects / technologies in this area that I missed.

Source: https://habr.com/ru/post/158785/


All Articles