Новый любопытный проект: бабайка для роутеров, с GUI и автоматическим подбором стратегии.

https://github.com/DanielLavrushin/b4
https://habr.com/ru/articles/982498/
https://t.me/byebyebigbro

> Работает на Linux - от VPS до роутера на MIPS (OpenWRT, Keenetic, Entware).

> есть поддержка своего b4geoip-файла (обновляется раз в сутки)

> Написан с нуля на Go - хех, это не очередной форк/обертка zapret или других существующих решений.

#ru_vps #byebyeDPI

@limping you could also black said domain, feed it false data and/or use #SSHtunneling instead...
@kkarhan well I have very bad news concerning #SSH :-(
In Russia it can be almost blocked now due to new 16-20 upload block.
Only at several segments till how, but it looks very bad.

@limping maybe adapting the MTU helps?

  • Another option is using meek & webtunnel bridges...
    • @torproject is constantly tweaking stuff in that regard...
The Tor Project | Privacy & Freedom Online

Defend yourself against tracking and surveillance. Circumvent censorship.

@limping maybe adapting the MTU helps?

  • Another option is using meek & webtunnel bridges...
    • @torproject is constantly tweaking stuff in that regard and they do have data [i.e. @ooni] to constantly fight "Great Firewalls"...
The Tor Project | Privacy & Freedom Online

Defend yourself against tracking and surveillance. Circumvent censorship.

@kkarhan the point is that DPI is really bringing a lot of news during last year, so primary by-pass are
- xRay proxy, with recent updates, like VLESS XHTTP REALITY and VLESS RAW REALITY XTLS, and best of all to have a bridge with 2 VPS; or
- a specific anti-DPI tool suitable specially for Russian TSPU. That is #byeDPI, used in software like #zapret and #nfqws

@limping sounds like something the folks at @torproject would be interested in.

  • They certainly can do much more re: countermeasures and bypasses as well as utilize @ooni probes to test effectivity.
@torproject @ooni @kkarhan @limping if you change the MTU it won't work at all, because ISP has strict MTU settings and they are set up on the hardware and one cannot just change it voluntarily,

@iron_bug @torproject @ooni @limping Oh, I forgot that some Russian ISPs do that, and L2TP...

  • I didn't mean fuckibg aroubd with the Router / #CPE but rather one's own system behind an own router (basically double-NATting)

  • I guess #Roskomnadnozr filters for any connection that goes outside #Russia?

@torproject @ooni @kkarhan @limping they filter outgoing and incoming connections from/to abroad. for example, recently I discovered that they cut all the outgoing DNS packets and from the most servers abroad domains with internal domain controller servers were not resolvable, even to public DNS servers like google, etc.

@iron_bug @torproject @ooni @limping So like #Indonesia blocking & fucking around with Port 53 and duplicating packets

If you can test this anonymously from a public WiFi without registration & a fake MAC address:

Don't do it if you can't do so,without leaving behind traces that could link you circumstantially!

  • Assume cameras are everywhere!!
Internet censorship in Indonesia - Wikipedia

@torproject @ooni @kkarhan @limping >public WiFi without registration
there's no public WiFi without registration in Russia. they're forbidden. any public WiFi should perform user verification. the surveillance is everywhere.

cameras are everywhere in Moscow. in other cities there's no money for any cameras, in general. people over here consider Moscow "another country". it's very different from the rest of the country level.
@iron_bug @torproject @ooni @limping yeah, I heard Russia outside Moscow & St. Petersburg is basically stuck in early 1980s at best

@iron_bug @torproject @ooni @limping Do network with frieds and espechally work hard on setting up a decentralized #Sneakernet because it is truly unstoppable.

https://en.wikipedia.org/wiki/Sneakernet

  • But don't take my word for it, ask Cubans, Iranians and North Koreans about it…
Sneakernet - Wikipedia

@iron_bug @torproject @ooni @limping Okay, I've looked into this...

I guess the only working option is to basically look like Russian Cybercrime [hacking foreign corpos for ransom] and setup your own custom #SSH tunnels and #TorBridges

  • I guess there needs to be something like #Toosheh but as a global service with resources for Russians.

https://en.wikipedia.org/wiki/Toosheh
https://www.netfreedompioneers.org/toosheh-datacasting-technology/
https://www.netfreedompioneers.org/knapsack-content-station/

Internet censorship in Russia - Wikipedia

@torproject @ooni @kkarhan @limping well, fortunatly there're other, less radical methods. I'm a professional system programmer and I have got some friends abroad. so I can get relatively working network, for a while. but I have lost a job (I worked for foreign companies) and have severe financial problems since all that fascist bullshit began. so things are getting worse with every day here.
@iron_bug yeah, and I guess you ain't in a position like Roman aka. NFKRZ to try to GTFO to Georgia, Serbia and then onward...
@kkarhan I don't think I'm apt to leave my home for pulter. I hope somebody shoots that fascist scum down one fine day and things go well again. and the sooner the better. it's too dangerous for the whole world because it's crazy homicidal maniac with a nuke button (I don't consider that creature a human, this is something else, like an insect).
@iron_bug yeah, I know what you mean.
@torproject @ooni @kkarhan @limping I had to manually write down DNS addresses for Fediverse servers in Russia in local DNS settings because they suddenly became not resolvable. I started to check to find out what happened and discovered it was the dirly plays of RKN. the tricky thing was if trying long enough with short UDP requests some packets were passing the filters, but it took like 2 minutes of requests "ddos" and was not acceptable, of course.

@iron_bug @torproject @ooni @limping So I guess you should
git clone https://github.com/greyhat-academy/lists.d.git
then…

Do get yourself equipped with like #Tails and a shitload of #TorBridges.

Forks · greyhat-academy/lists.d

List of useful things. Contribute to greyhat-academy/lists.d development by creating an account on GitHub.

GitHub
@torproject @ooni @kkarhan @limping I'm very picky about software. I build my own Linux distro from sources with my own patches and use only C/C++ software. but I can rewrite many things in C if I really need them. the problem is all that measures are temporary, until they block the next protocol and/or server.

@iron_bug @torproject @ooni @limping yeah.

  • I just have that repo as a useful option when it comes to certain configs.
@kkarhan @limping what is "16-20 upload block"?
@iron_bug стабильные РКН-дропы пакетов при доступе после 16-20кб переданного трафика
@iron_bug @kkarhan I have such description in Russian: that’s something new in Feb, 2026 in several segments: