this post was submitted on 18 Sep 2025
359 points (99.4% liked)
Privacy
2577 readers
382 users here now
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
TOR, I2P, tunnel via SSH, or any number of techs that tunnel VPN via HTTPS.
Wireguard recently released an update to enable VPNs via QUIC. QUIC is the transport layer of HTTP/3. So VPNs would be indistinguishable from HTTPS traffic, unless the filters had the root certificates to decode/intercept the traffic.
It's the root certificates that are the weakest spot, IMO.
When governments start attacking the globally trusted root certificates, we will be back to the 20th century of word-of-mouth (IE, sharing) root CAs that can actually be trusted, and will need to keep an eye on canary posts or whatever to know when those root CAs have been compromised.