
We live in a very interesting time, most recently the Internet was free from the copyright holders of law enforcement agencies.
And even on torrents.ru unwanted distributions were not removedBut now everything has changed, Skype is
now listening to the FSB, according to the first application for any service, the authorities will receive all the information available to them.
That the owner of the forum which was not acceptable to the
official of the construction company
decided to sue for 1.7 million dollars.
')
Recently there was a
good attempt to check the public excitement erroneous blocking vk.comThere are such cases of the sea, both in Russia and, for example, in Latvia, when a teacher was arrested for
publishing a book to his pupils
to the public .
I will not argue why this is happening, whether it is good or bad power, it is meaningless, everyone has long understood that
the boiled frog effect is underway, I will only try to tell 2 possible ways to develop the free direction of the Internet.
Due to the fact that not everyone knows the meaning of this or that software or technology, I will try to attach linksWhat paths are possible?
When the Internet became not anonymous, many people began to look for a way out that would allow to keep the secret of the person, correspondence and their views, which could not be censored.
But in order to find a way out, you need to know the root cause and methods of blocking and promptly finding unwanted ones.
The punitive system throughout the world operates using 2 principles
1 - Closing a resource entirely (options are possible, from blocking IP and domain, to physical removal of the server)
2 - Indicative flogging of users, which causes the
effect of a dead cockroachCombines these methods one thing -
not the anonymity of the TCP / IP protocol
Thus, we get 2 conditions that must be met to solve the problems of anonymity:
1 - Decentralization of the network, the elimination of the server part - shifting responsibility to users
2 - Erasing the line between identity and IP address
Achievable?
You can achieve the desired using 3 methods
1) Your Internet -
Project Netsukuku2) Decentralization (
DHT ,
BitTorrent ,
Bitcoin , Bitmessage)
3) Overlay systems (I2P, Tor, Freenet, Perfect Dark)
Each of these methods has its advantages and disadvantages; if we consider this problem within the framework of Russia, it becomes clear that the first method does not suit us, we need permissions to organize a wi-mesh mesh outdoor network, and we are trying to avoid unnecessary attention,
Thus, it all comes down to a choice between overlay networks and decentralization.
Overlay nets
Overlay networks are such networks that work on top of the TCP / IP protocol creating “their own Internet”, instead of IP addresses, a bunch of private and public keys are usually used there, in the case of I2P the base of all routers is also decentralized using (DHT).
But overlay networks have drawbacks - low speed and not rational consumption of traffic.
One minus follows from the other, due to the fact that overlay networks operate on the principle of multi-level proxies with encryption at any point, the excess traffic in the network can be up to 90%, due to the fact that data is not transmitted directly - work slows down network.
On the other hand, the ease of use of current software — all that is now familiar to us — site engines, CMS — all this can work with little or no change in overlay networks.
Decentralization
In the case of decentralization, we do not have such disadvantages that overlay networks have, due to the fact that your data is transferred to all network participants at a time (Bitcoin) or on request (Torrent).
Using decentralized solutions allows you to completely eliminate the server part, this happened in the networks of Torrent, DHT, Bitcoin, Bitmessage. Thus, in order to “kill” the network, it is not enough to come to the server and pick up the server, you have to either block the network at the network level using DPI or detain ALL of the participants in this network.
If the latter is not realistic, then with DPI everything is more complicated, the most popular method for circumventing DPI
(if you can call it that) is to disguise traffic under ssl / torrent traffic, or under any other.
If the DPI cannot determine the traffic marker, then it cannot block only it, which is accordingly remarkable.
PS Yes, DPI can detect I2p traffic \ torrent \ encrypted torrent \ bitcoin \ DHT
But not everything is so bad, at the moment, many projects are working on the variability of the protocol and masking it under another, which in the longer term will allow us to move away from the DPI gaze.
So what is the solution? what is better?The best method is to combine 3 technologies at once - overlay, masking and encryption.
The only project that implemented this approach is
Osiris Server less portal (Decentralized forum works through modified DHT)Unfortunately, the Osiris project is dead, the idea was good, but the developer didn’t have enough time for implementation.