• towerful@programming.dev
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      9 days ago

      TOR, I2P, tunnel via SSH, or any number of techs that tunnel VPN via HTTPS.
      Wireguard recently released an update to enable VPNs via QUIC. QUIC is the transport layer of HTTP/3. So VPNs would be indistinguishable from HTTPS traffic, unless the filters had the root certificates to decode/intercept the traffic.

      It’s the root certificates that are the weakest spot, IMO.
      When governments start attacking the globally trusted root certificates, we will be back to the 20th century of word-of-mouth (IE, sharing) root CAs that can actually be trusted, and will need to keep an eye on canary posts or whatever to know when those root CAs have been compromised.