this post was submitted on 29 Jul 2025
995 points (99.0% liked)

Technology

73534 readers
2568 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

"If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

you are viewing a single comment's thread
view the rest of the comments
[–] glog78@digitalcourage.social 1 points 3 days ago* (last edited 3 days ago) (10 children)

@arc99 @SpaceCadet thats basically allowing the Government to force the ISP's to build a solution which is able to sensor every content. Sorry there is alot of reasons why you should be against it.

PS: even your deep packet inspection falls short to end 2 end encryption / decryption ...

[–] arc99@lemmy.world 1 points 3 days ago (9 children)

Deep packet inspection already happens on encrypted traffic (Fortigate Firewall) so it's eminently possible for filtering software to do the same.

[–] glog78@digitalcourage.social 1 points 3 days ago* (last edited 3 days ago) (8 children)

@arc99 please inform yourself about end to end encryption and decryption.
All i say is you haven't understand what is happening on this firewall and what this firewall can do and what the firewall can't do.

[–] arc99@lemmy.world 1 points 2 days ago (1 children)

I'm intimately aware about what it can and cannot do. And it can intercept and man in the middles any https traffic

[–] glog78@digitalcourage.social 1 points 2 days ago (1 children)

@arc99 but end 2 end encryption is not by default https traffic ;) ssh / vpn are protocolls ( end 2 end encryption, decryptio) and this firewall can't deep inspect while this protocoll can easy tunnel other tunnels.

[–] arc99@lemmy.world 1 points 2 days ago (1 children)

I really do not know what you are saying. I have just told you that Fortigate Firewall can and does do deep packet inspection on https connections. It does so by man in the middle proxying. If one filter / proxy can do it then any other could too. There would be ways for kids to circumvent this, e.g via VPN but that is no different than with age verification.

[–] glog78@digitalcourage.social 1 points 1 day ago (1 children)

@arc99

I said (picture) your deep inspection falls short to real end 2 end. You said your firewall can break end 2 end ... nope they can't and never will and you exactly said this in your last post too. (Sidenote -> i can gpg a text and post it public even with https .. for 99% it will be giberish and only the person who got the right key material will be able to read it ) ... so using deep package inspection to identify something you want to protect kids from is just a lie ...

your deep inspection falls short to real end 2 end (copy of a former post in this conversation )

[–] arc99@lemmy.world 1 points 1 day ago (1 children)

I honestly do not know what you are saying. Deep packet inspection through a firewall that does mitm interception demonstrably happens. It is not up for debate.

[–] glog78@digitalcourage.social 1 points 1 day ago* (last edited 1 day ago) (1 children)

@arc99 you still don't understand end 2 end encryption. Yes man in the middle decryption can be done. First for this to happen you need to accept the certificates of the firewall ( which in terms of a home PC you can't force anyone to do ). Second even if you can decrypt the https packets , you can still put an additional layer on top which only you and the reciever has the keys too.

To give you an example you can easy write down a base64 encoded binary blob in any text field on a website. If this binary blob has been encrypted before noone will be able to tell what is inside.

So breaking https is useless if someone really wants to hide informations. So no your deep packet inspection is totally useless. The only thing you know is that someone did put strange stuff in a text on a website.

[–] arc99@lemmy.world 1 points 8 hours ago* (last edited 8 hours ago) (1 children)

No, YOU don't understand end to end encryption, and you don't understand browsers. You say you could "write down a base64 encoded binary blob on a website". Yes you could and how do you decrypt it? The asnwer is with a key (asymmetric or symmetric) that the recipient must have in memory of the receiving software - the browser that the filter has already intercepted and compromised. So "moar layers" is not protection since the filter could inject any JS it likes to reveal the inner key and/or conversation. It could do this ad nauseum and the only protection is how determined the filter is.

But this is also a nonsense argument just on a practical level. The problem is kids connecting to adult websites, or websites with some adult content. The filter doesn't need to do much - either block a domain outright, or do some DPI to determine from the path what part of the website the browser is calling. The government thinks it reasonable that every single website that potentially hosts adult content should capture proof of identity of adults. I contend that really the issue is kids having access to those websites at all, and that proxies can and would be a far more effective way to control the issue without imposing on adults. No solution is perfect, but a filter is a far more effective way than entrusting some random website with personal information. Only this week somebody found an app that was storing ids in a public S3 bucket compromising all those users. Multiply that by hundreds, thousands of websites all needing verification and this will not be the last compromise by any means.

[–] glog78@digitalcourage.social 1 points 3 hours ago* (last edited 2 hours ago)

@arc99 the same way as you did encrypt it ??? with ggp ?

https://stackoverflow.com/questions/35584461/gpg-encryption-and-decryption-of-a-folder-using-command-line

???? the needed certificate are exchanged by for example a matrix / telegram or personal ????

And don't underestimate kids ... Or better asked yourself how did they get porn in the 80s and 90s ??? ( and yes they did )

PS: and honestly imho this hole "protection talk" is totally nonesense or are parent's not anymore capable of protecting their kids? Tell my one reason why a kid < 16 should have access to internet without supervision ? An Emergency Call can still be done without internet.

This hole discussion is like if you would had let a Porn VHS in the 80's unlocked in the living room and your kid unsupervised for hours in the living room. Would have someone called in the 80's to audit if your porn has been stored kids savely you would have gone crazy.

PPS: Just because you don't have statistic's how many kids watched adult content in the 80's or 90's doesn't mean it didn't happen !!!

load more comments (6 replies)
load more comments (6 replies)
load more comments (6 replies)