Anything you can do with a VPN, you can do using SSH as a SOCKS5 proxy.

SSH is the "maintainence hatch" or "staff entrance" of the internet. And only North Korea is desperate enough to block that, so far.

Here's how:

https://raw.githubusercontent.com/opsdisk/the_cyber_plumbers_handbook/master/cph_version_1.4_20210829.pdf

nostr:nevent1qqs9ckman0xe6ncg35l4cg289ghlhsfxt28lsek7yjw5krerx0qpjysprpmhxue69uhhyetvv9ujumn0wd68yct5dyhxxmmdqgsqfjg4mth7uwp307nng3z2em3ep2pxnljczzezg8j7dhf58ha7ejgrqsqqqqqpcuhmgu

Reply to this note

Please Login to reply.

Discussion

Why not simply use Tor?

VPN/SSH leads to website fingerprinting. Even if you're using VPN/SSH, its possible that the govt can figure out you're accessing Twitter.

https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting

What China does with Tor is very clever - they watch for anything that looks like a Tor connection, and try to connect to it themselves. If it responds as a Tor node, they firewall it.

This is not ultimately fixable, though various plugabble transports help, as does using bridges rather than direct connections.

Brazil could easily copy this.

They cant do the same to SSH. Not if they want cross border server administration at all

What do you think about Tors new "WebTunnel"? Seems like a sort of steganographic method for bypassing censorship.

https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/

That is great news. The tor project is the best open source project there I have come across.

yeah, ssh and by extension wireguard are not really viable targets for this kind of blocking - if they automated it, they'd have all kinds of trouble with their own systems administrators