Assumong you are talking about chat control, here’s what I would do:
Level 1: based on what i know, they wanna send data to a service to check for csam before it is encrypted. So use DNS level blocks to circumvent it. Think NextDNS.io
Level 2: they made the companies/app to integrate the checks into the app. In this case use use Open Source and self-hostable apps like matrix or simpleX. Ask your tech savy friend to host it somewhere and use it.
Level 3: they use DPI or smth to detect encryption. Use onion routing networks such as tor or i2p. They are designed for this. Look into snowflake and riseup vpn, they both implemented some tech to make it difficult for governments to surveil us.
Level 4: they banned all internet. Use meshtastic network that uses radio waves and a specialized device to connect and send data. I don’t think it will come to this but it would be nice to have more people using it cuz I also wanna get into it lol.
Some general ways to navigate this would be using plain old vpns, i think they wouldn’t use the csam detection service if you are not in EU but not for long i think. Once EU does it, everyone else will also start doing their own versions.
The problem with mesh networking as a means of evading government censorship is that radio transmissions can be localized rather trivially. Meshtastic might have a use case for evading corporate censorship, or providing some kind of service in remote areas… but if a given government wants to ban unmonitored communications in general, then every node in the network is a beacon that local law enforcement can find and shut down. If your government is going into the sort of full repression that a Level 4 ban implies, then that sort of encrypted RF transmission amounts to a public signal that says “I’m breaking the law right now at this location”, and anyone enforcing said ban can use that signal to physically track you down. (See also the related problem of finding a drone’s operator, which is very doable.)
No, as a matter of both historical fact and current best practices, what’s left after Level 4 is the sneakernet. If you want to share data that your government doesn’t want shared, do it in person, ideally on miniature devices that are easier to smuggle. That’s the only real data access that exists in North Korea, but it exists nonetheless.
I think jamming all radio everywhere would be kinda difficult, but im not an expert in this. I just said it cuz many governments, when they want to censor everything, they disable all internet going out the country. Also i find the idea cool 😅.
As for encryption, i think if you can learn to set up meshtastic, then it should be trivial to also add encryption to it.
Assumong you are talking about chat control, here’s what I would do:
Level 1: based on what i know, they wanna send data to a service to check for csam before it is encrypted. So use DNS level blocks to circumvent it. Think NextDNS.io
Level 2: they made the companies/app to integrate the checks into the app. In this case use use Open Source and self-hostable apps like matrix or simpleX. Ask your tech savy friend to host it somewhere and use it.
Level 3: they use DPI or smth to detect encryption. Use onion routing networks such as tor or i2p. They are designed for this. Look into snowflake and riseup vpn, they both implemented some tech to make it difficult for governments to surveil us.
Level 4: they banned all internet. Use meshtastic network that uses radio waves and a specialized device to connect and send data. I don’t think it will come to this but it would be nice to have more people using it cuz I also wanna get into it lol.
Some general ways to navigate this would be using plain old vpns, i think they wouldn’t use the csam detection service if you are not in EU but not for long i think. Once EU does it, everyone else will also start doing their own versions.
The problem with mesh networking as a means of evading government censorship is that radio transmissions can be localized rather trivially. Meshtastic might have a use case for evading corporate censorship, or providing some kind of service in remote areas… but if a given government wants to ban unmonitored communications in general, then every node in the network is a beacon that local law enforcement can find and shut down. If your government is going into the sort of full repression that a Level 4 ban implies, then that sort of encrypted RF transmission amounts to a public signal that says “I’m breaking the law right now at this location”, and anyone enforcing said ban can use that signal to physically track you down. (See also the related problem of finding a drone’s operator, which is very doable.)
No, as a matter of both historical fact and current best practices, what’s left after Level 4 is the sneakernet. If you want to share data that your government doesn’t want shared, do it in person, ideally on miniature devices that are easier to smuggle. That’s the only real data access that exists in North Korea, but it exists nonetheless.
Level 4 encryption doesn’t exist. But Jamming does.
I think jamming all radio everywhere would be kinda difficult, but im not an expert in this. I just said it cuz many governments, when they want to censor everything, they disable all internet going out the country. Also i find the idea cool 😅.
As for encryption, i think if you can learn to set up meshtastic, then it should be trivial to also add encryption to it.