this post was submitted on 21 Jan 2024
816 points (96.6% liked)
Memes
45633 readers
1157 users here now
Rules:
- Be civil and nice.
- Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This time I must say your evidence and reasoning is much weaker. I disagree strongly with how you interpret this. Demanding foreign companies keep data on your citizens in your country is a good thing. The alternative is foreign spy agencies and governments having control over it. The fact that they have laws requiring companies to dox users is a completely separate issue. It's bad, but it's in-line with many EU nations. The NY Times article is especially bad because the tool they're talking about, whois, is included standard with Mac and Linux. It's not scary spy software. Inspecting and blocking traffic on the fly isn't supported by the article as far as I can tell. And finally, having someone's root certificate does not at all stop you from encrypting data. It lets websites that have been verified by the issuer have a green check mark in Firefox. You likely have tens or hundreds of root certificates installed on your computer. You can still keep data hidden from their issuers. It doesn't affect your ability to encrypt.
In the case of that last link. He did go to jail for 20 days, but on the other hand, running Tor did literally save him from prison. This isn't from that article but looking up his name, it seems he was cleared of all charges a week after he got out of jail and the judge's reasoning was that because of Tor there wasn't undeniable evidence. He wasn't asked to stop hosting Tor either. Not defending the Russian justice system allowing them to jail you with only probable cause and not an actual conviction, that's still bad, but where I live, I would get convicted instead, which is worse. This case sounds like positive confirmation that if I rent a Russia VPS and use it for Tor, I'm not breaking any laws and don't need to worry about regular downtime, which was the original premise.
Sorry, the article is terrible but I couldn't find better English articles. Here are couple of auto-translated articles with some technical details on said spy-boxes. I remember there was a great combined push of state-owned market majority ISP Rostelecom along with state's truth agency Roskomnadzor to implement all of this, for the first it was to push out independent ISP's who couldn't afford any of it, and for latter to erase and block out any info that the government doesn't like, e.g. protest movements. The pretense was that it was for protection against foreign threats and autonomous operation of Russian side of the internet in case of hostile actions from the west, which has a grain of sense - e.g. of the 13 root DNS servers, 10 are operated by US and the rest by it's allies. But the fact that this was not a joint initiative with other countries who are not on good terms with the US, and that those tools were used to combat political opposition, tells that this was not at all the real reason for it.
That's a dangerous precedent though, that a person can be arrested and held for indefinite amount of time without any significant evidence - just based on IP address. And in Russia, the laws are often written backwards, like the religious people feelings law in response to pussy riot case, the veteran feelings law for Navalny, the meme laws... for everyone.... and...
the entire Tor network was outlawed in Russia, so it won't work as a defense any further.
If you are not located in Russia, and you are not a figure in Russian politics, you indeed have nothing to worry about, except for the downtime, and certain protocols and endpoints being unreachable... and having your business ruined, but I figure if you're not planning on doing any if you don't care about downtime.
Though, if you are a political figure, the advice would still be to not touch anything Russian even with a 10-foot pole
This allows them to perform MITM attacks by connecting to the website on your behalf, decrypting it, then re-encrypting it with their own cert and you'd still get the checkmark. Do you ever click on it to see who issued the certificate? They can, and most definitely will use it to attack their political enemies. Currently, they're still forcing users to install it by holding online payments hostage, but even if you don't pay online, nothing stops them from forcing it on all outbound communications in the future.
I found the technical exploration interesting, even if the translation I read might not have been completely accurate. But at least 8 years ago, they didn't seem to have any ability to analyse and modify content, instead relying on a simple domain block-list. There's domain blocking where I live too. I imagine it's handled similarly on a technical level. Seems more of a concern for home users, I don't think one of these boxes sitting outside a data-centre would affect you at all. Your hosted web application would have proper encryption and they'd only see the destination of one leg of the journey. Even for 8 years ago, this doesn't really seem like a level of technical sophistication that trumps even non-rigorous general best practices.
Absolutely.
This just says blocked, not outlawed. I also couldn't find any other articles about Tor being outlawed. As long as it's not illegal it's no practical problem for me/you. According to this article, Tor and someone else is suing, which they wouldn't do if they didn't have a legal basis for operating. It even says it's unconstitutional.
Assuming that's true, then that's a pretty easy win for any data centre hosting my blackbox VPN-routed seedbox or whatever it would be.
Yeah but I don't feel you've demonstrated that at all. There were a few high profile raids, but they were decades ago. If my cheaper than average hosting has average downtime then I'm still getting a good deal. Based on what you've provided, it sounds like the anonymous computer in a cave scenario in the meme would go completely unnoticed by an averagely aggressive and averagely competent police state.
Come on. I'm not planning to spy on the Russian military for the MI6! That's several levels of shady beyond 'anti-establishment website'.
In theory that is true. And not particularly hard. But it's not invisible, and so it would get discovered quickly. And it can also be mitigated with a VPN and not using the state's DNS. Users of Russian e-banking are be susceptible to MITM, but my VPS isn't, because I don't have that certificate. And the Russian banking public isn't being spied on because they'd burn the card when they use it. Is it being deployed to discretely and sparingly MITM-attack specific individuals? I mean maybe. But I think it's being deployed so they can have a green check.
To block a domain, it requires looking at the HTTP headers, though. So the only ways to do this with HTTPS is by either somehow breaking SSL or blocking based on domain's IP, which causes high collateral damage due to cohosting, especially if the infringing domain is behing clourflare or is on amazon/azure/google infra. Oh and you can't just block whatever IP's the DNS is responding with, they got burned by it already when someone intentionally got their domain into blocklist and made DNS server resolve to 127.0.0.1. If your place also does this and it has a working democratic and judicial systems, I would suggest starting to raise questions about it.
You're right. I've looked into it and it seems that the reasoning behind the ban isn't that it allows anonymity but the fact that exit nodes don't restrict access to blocked sites, which is not at all possible for Tor. So I imagine they will soon, if not already, start going after it using DPI methods like they do with VPN's already.
Well, based on what this computer is actually doing, it's going to get cut off from all communications the moment anyone in that police state notices it. If it's just pirate stuff then it'll happen fairly quickly based on the amount and the obscurity of the sites in the blocklist. If it's political - the owner of the server will be called for questioning. They'll throw some of the bullshit laws at them to stack up (Got camera on your phone? Spy equipment! $2000 fine + confiscation! Liked any racist meme at any point in time? bam, extremism, 6 years in prison!) possible fines and jail time, but it's all just to coerce them into cooperation.
Who knows what you might want to do with that server in the cave. This was just to show that they can and do reach outside the country in some cases. It's not just for spies, though, they tried to do the same with Navalny and Kara-Murza, and a bunch of other less prominent figures. Also note, that all of those are botched attempts. In case of success, there will be no signs of poisoning as those chemicals are designed to break down quickly and leave no traces.
True, if your VPN protocol of choice isn't banned already. But then, renting a box in Russia just to break out of it using a VPN kind of defeats the whole purpose.
Overall, you put it fairly accurate at "averagely aggressive and averagely competent police state", we're just going back and forth over specific details, but the point is that if you're dealing with anything in Russia, you're basically dealing with said police state, and the more you get involved with it, the harder you'll eventually get rolled over by it. That's why I suggest not getting involved with it at all in the first place. Having said that, I myself have certain obligations to visit Russia at some point in the future and I honestly dread of that moment. Wish me luck, I guess, but do you happen to know any good "dead hand" kind of software?
I've never needed dead hand software. I wipe my phone before going through airports but that's it. If I needed it, my first instinct would be to write my own, because my use case would probably be pretty simple. I'm not sure. I think you're vastly overstating the danger of travelling through Russia. Still, I'd wipe my phone (or leave it at home) like anywhere else of course. Always best to be cautions.
This is just kinda how I use everything. I mean I'm paying for the VPN anyway... But it doesn't degrade performance for a seedbox. You connect to it and stream your files when you need them, it's less hassle than if you download things to your own home. Doesn't degrade performance for most private tasks to be honest.
It absolutely does not. But even if it did, I think most countries in the EU have some form of internet censorship. Almost always left to the discretion of the ISPs when it comes to implementation. Your instance is in Estonia, so I checked, and Estonia blocks copyright infringement and gambling, and according to one source, as if this year, 'Russian propaganda'.
Eh, a red passports in my pocket, along with a military id of same color say otherwise
Actually, this sounds like a one good use-case for VPS in Russia because I didn't even know what a seedbox is. I have used transmission on a router solely for silent operation and only once encountered an ISP who limited bittorrent traffic, but then I just told them to fuck off and switched to a different one. It never crossed my mind that people might want a torrent box outside their country. Just use an encrypted connection to it, though, because who knows what the fuck is Russian(or your) government might be up to. Though I'd advice to consider one in Armenia, if possible. It's close, but much more liberal and the internet speeds are just as good. Though computer part imports seem to be problematic in there so I'm not sure if there are any good providers.
It'd be interesting to see how they actually implement this, as I couldn't find much info. But the fact that this is passed down to ISP's to implement and there are seemingly no strict rules gives a hope that there might be some leeway between different providers, and ones that don't use it as a pretense to infringe on your privacy. But it's sad to see that they are, too, going political with this.
Then you know better than me.
I don't have a particular love for Russia for this type of thing, it just happens that a lot of low cost barely-professional providers are in Russia, and that Russia isn't among the worst countries in terms of surveillance law and competence to enforce those laws. I'd happily rent from an Armenian provider, they're just a little worse at SEO. Thanks for the tip.
My current ISP works with any router but there is a mandatory purchase of their partner's router when you sign up. That router doesn't host a configuration page, if you want to configure the SSID or password, you need to use their Windows/Android app. The Windows app installs a root certificate. I haven't done that, and I think it's just to facilitate regular updates rather than MITM decryption, but it could be either. ISPs have smart people (or people with skills in the right technical area), but they don't have any financial incentive to use a clean solution sadly.
I'm not categorically against blocking illegal content, but it's the surveillance I find really icky. Countries with laws about having to keep logs on users. Mandatory invisible/silent data-sharing with police. Gross.