Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Decentralization is key to bypass these type of firewalls. All commercial VPN vendors will be on blacklists sooner or later.

Hang around lowendtalk / lowendbox and rent a tiny dir cheap VPS. Just SSH there and use the SOCKS5 proxy built into SSH. I hope they will not block SSH any time soon.

If they do you can set up a HTTPS website on your VPS with a secret proxy.



Shows the importance of using simple tools.

Similarly, I've recently discovered how to send encrypted email from your command line, really really easy (note that Gmail throws these away if they come from an invalid domain name).

`echo "This is a secret message" | gpg -e -a -r "recipients@gpg.key" | mail -s "Your eyecatching subject line" recipients-email@example.com`


For encryption using S/MIME with mailx (from heirloom-mailx), see https://news.ycombinator.com/item?id=12742809


>I hope they will not block SSH any time soon

GFW already does that. it's not that hard either, if you're using ssh for forwarding purposes, chances are you're using way more bandwidth than if you're using it for teletype only.


> GFW already [blocks ssh]

Where can I read more about that?


SSH can also be used for SCP...


And SFTP


How? I bet most commercial VPN services rotates on billions of different IPv6 addresses (from completely different subnets that is).


IPv6 allocations are generally /64s, or /56s, and are typically blocked as a full range.

Individually blocking IPv6 addresses, as /128s, would indeed be futile.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: