• eleitl@lemmy.zip
    link
    fedilink
    arrow-up
    74
    ·
    3 days ago

    I ignore the ban and continue using my applications which are all open source.

    • TerHu@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      10
      ·
      3 days ago

      i’ve read that many apps can be not just banned but blocked. now i don’t have a source at hand but i heard that russia blocks not just signal but also matrix, meaning that it doesn’t necessarily matter whether the app is open source. similarly i’ve read that deep packet inspection can block things like sslvpn and wireguard.

      still, blocking delta chat is really quite difficult, as russia has noticed and got angry about, so there should probably still be a way unless the country also blocks all email communication

      • artyom@piefed.social
        link
        fedilink
        English
        arrow-up
        14
        ·
        3 days ago

        They can block Signal because it is centralized. Signal knows this and built proxies into the app for this purpose.

        Similarly they can block the main matrix.org server but since it’s decentralized you can still use any of the thousands of servers they may not even know exists.

      • eleitl@lemmy.zip
        link
        fedilink
        arrow-up
        6
        ·
        3 days ago

        You can tunnel through the Great Chinese Firewall fine, if you know what you’re doing.

    • hector@lemmy.today
      link
      fedilink
      arrow-up
      2
      ·
      3 days ago

      Can we switch over android to open source operating system easily?

      What about windows on laptops?

      • eleitl@lemmy.zip
        link
        fedilink
        arrow-up
        3
        ·
        3 days ago

        I don’t know what you mean, e.g. GrapheneOS and AOSP based ROMs are all open source. Linux (or *BSD) on mobile devices is also an option.

    • Endovior@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      2 days ago

      The problem with mesh networking as a means of evading government censorship is that radio transmissions can be localized rather trivially. Meshtastic might have a use case for evading corporate censorship, or providing some kind of service in remote areas… but if a given government wants to ban unmonitored communications in general, then every node in the network is a beacon that local law enforcement can find and shut down. If your government is going into the sort of full repression that a Level 4 ban implies, then that sort of encrypted RF transmission amounts to a public signal that says “I’m breaking the law right now at this location”, and anyone enforcing said ban can use that signal to physically track you down. (See also the related problem of finding a drone’s operator, which is very doable.)

      No, as a matter of both historical fact and current best practices, what’s left after Level 4 is the sneakernet. If you want to share data that your government doesn’t want shared, do it in person, ideally on miniature devices that are easier to smuggle. That’s the only real data access that exists in North Korea, but it exists nonetheless.

      • just_an_average_joe@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 days ago

        I think jamming all radio everywhere would be kinda difficult, but im not an expert in this. I just said it cuz many governments, when they want to censor everything, they disable all internet going out the country. Also i find the idea cool 😅.

        As for encryption, i think if you can learn to set up meshtastic, then it should be trivial to also add encryption to it.

  • pulsewidth@lemmy.world
    link
    fedilink
    arrow-up
    21
    ·
    3 days ago

    It would ultimately have similar effects as when most governments banned The Pirate Bay: it stifled grandma from accessing it, but anyone who has any will to do so, or small amount of technical skill will bypass the ban.

  • hansolo@lemmy.today
    link
    fedilink
    arrow-up
    38
    ·
    3 days ago

    Probably find ways to buy all the advertising profile data I can, sort through it until I find some related to the fools that voted for that, and give it to spammers.

    The people that make these laws often have zero idea how anything works beyond “the lobbyist said do this, so I do this.” So they should be educated about their poor decisions.

  • xxce2AAb@feddit.dk
    link
    fedilink
    arrow-up
    21
    ·
    3 days ago

    To do whatever it takes - I certainly will not comply. No, I don’t care that makes me a criminal. If somebody made it legally mandatory to eat babies, I wouldn’t do that either.

  • lambalicious@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    20
    ·
    3 days ago

    Get all my money out of the bank in physical and keep living. Since encryption is dead, internet commerce is dead and keeping any sort of money in digital is now unsecured.

    • webp@mander.xyz
      link
      fedilink
      arrow-up
      4
      ·
      3 days ago

      That would be really funny if a bunch of other people realized it at the same time

      • lambalicious@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 days ago

        Oh yeah I was looking from the sidelines back when something like that happened in Argentina with the banks trying to freeze draw-outs. Fun times.

  • Gustephan@lemmy.world
    link
    fedilink
    arrow-up
    14
    ·
    3 days ago

    There are plenty of free and open source pgp tools out there. Nothing is stopping you from encrypting your own text and pasting it into messaging apps. Even if you dont trust some tool from the internet, sha2 isnt that hard to understand or implement with a bit of motivation

  • chimp@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    17
    ·
    3 days ago

    Would switch to self-hosted matrix and persuade as many family members and friends to do the same, using my server if they want.

  • Inucune@lemmy.world
    cake
    link
    fedilink
    arrow-up
    4
    ·
    3 days ago

    Buy 2 copies of the same book. Provide the second party a copy of the book and the cypher order(ex. First number page, second number paragraph, third number word or letter).

    Alice and Bob and Eve and Trent and Mallory.