Skip to content

censorship circumvention tools for egyptian residents

Notifications You must be signed in to change notification settings

anti-pigs/anti-pigs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

6 Commits
ย 
ย 

Repository files navigation

Censorship: because pigs love to sniff ๐Ÿฝ๐Ÿฝ

ู‡ูŠู†ุฒู„ ููŠุฏูŠูˆู‡ุงุช ู‚ุฑูŠุจ ุจุชูˆุถุญ ุงุฒุงู‰ ุชุนู…ู„ ูƒู„ ุฏู‡ ุจู†ูุณูƒ

methods employed by "ู…ุงุณุฑ" for censoring the internet

  • DPI

implementation

implementation Software-based solutions Hardware-based solutions
Advantages
  • easier
  • enable whole network( smartphone, IoT devices, gaming consoles, smart TVs ) to be tunneled
Disadvantages
  • most clients can only take over application layer traffic and lack higher system permissions
  • some applications(banking, games, windows apps) don't follow proxy rules so won't get bypassed
  • Heavy CPU utilization
  • network congestion
  • underutilization of bandwidth
  • requires a dedicated Router
  • Costly
usecase
  • lite users
  • single devices
  • on occassion
  • multiple users
  • labs
  • offices
  • special devices like Smart TVs

working states as of march 2024

  • wireguard: blocked by DPI (can be obfuscated)
  • openVPN: blocked by DPI (can be obfuscated)
  • haven't tested out any other commercial VPN
proxies
  • shadowsocks: working
  • trojan: working
  • xray: working

what you'll need?

a VPS with minimal capabilities


Clients/Software

servers


VPN

why we don't use VPNs to circumvent censorship

  • VPNs have a distinct signature therefore it's easier to get identified and blocked
  • VPN wasn't developed specifically to bypass censorship and restrictions
  • the main advantage to a VPN is end-to-end encryption which pervents interception of communication traffic during transmission and safeguards against the leakage of trade secrets, therefore it is not specifically designed to circumvent censorship

usecase

  • when you have a home network and want to access that private network using an open network like a public WiFi while encrypting the traffic, then a VPN is a good option

  • want to make a private network for all your employees because that's good practise and/or you live in a fascist state

list of VPNs (list is not exhaustive)

traditional VPNs

  • wireguard
  • openVPN

Mesh VPNs (overlay networks)

  • tailscale
  • nebula
  • netmaker
  • netbird
  • zerotier

opensource VPN service providers


proxies

why is it preferable to use proxies to circumvent censorship

  • better suited for this task
  • tend to be harder to identify and hence blocked
list of proxies (list is not exhaustive)

obfuscation tools

bypassing DPI

Caution: this DOES NOT hide the fact that you're accessing a blocked site


SSH proxy


jargon

  • Airport: platforms or websites that provide special encrypted internet access nodes

FAQ

  • ู„ูŠู‡ ุงู„ ู‚ุงุฆู…ู‡ ุฏูŠู‡ ู…ูˆุฌูˆุฏู‡ุŸ ูƒุฐุง ุณุจุจ ุงู„ุงูˆู„: ูƒู†ุช ุนุงูŠุฒ ู‚ุงุฆู…ู‡ ุชู‚ูˆู„ู‰ ุงู„ู‰ ุงู„ VPN ุงู„ู‰ ุดุบุงู„ ู ู…ุตุฑ ูˆ ู…ูƒู†ุชุด ู„ุงู‚ู‰ ูˆุงุญุฏู‡ ู‚ุฏูŠู…ู‡ ุงูˆ ุฌุฏูŠุฏู‡ ูƒู„ ุงู„ู‰ ูƒู†ุช ุจู„ุงู‚ูŠู‡ ู‡ูˆ ุดูˆูŠู‡ ุจูˆุณุชุงุช ุนู„ู‰ ุณุงุจ ุฑูŠุฏูŠุช ุจุชุงุนุช ู…ุตุฑ

ุงู„ุซุงู†ู‰: ููŠู‡ ุดูˆูŠุช ู…ุตุฑูŠูŠู† ุงุณุชุบู„ุงู„ูŠู† ูˆู„ุงุฏ ู…ุชู†ุงูƒู‡ ุจูŠู‚ุฏู…ูˆุง ุฎุฏู…ุงุช "VPN" ู…ู‚ุงุจู„ ูู„ูˆุณ ุทุจุนุง ู„ู†ุงุณ ู…ุชู‚ุฏุฑุด ุชุฏูุน ูˆ ุงู„ู†ุงุณ ู…ุชุนุฑูุด ุงู† ููŠู‡ ุจุฏูŠู„ ูˆ ุงู† ุงู„ุงุฏูˆุงุช ูƒู„ู‡ุง ู…ุฌุงู†ูŠู‡ ุนุดุงู† ูˆู„ุงุฏ ุงู„ุงุญุจู‡ ู…ุด ุจูŠุญุทูˆุง ู„ูŠู†ูƒ ุงู„ู…ุดุงุฑูŠุน/ุจุฑุงู…ุฌ ุนู„ู‰ github ุงู†ุง ุนุงุฑู ุงู† ููŠู‡ ู†ุงุณ ู…ุด ุนุงูŠุฒู‡ ุชุตุฏุน ู†ูุณู‡ุง ุจูƒู„ ุงู„ูƒู„ุงู… ุฏู‡ ู‡ู…ุง ุนุงูŠุฒูŠู† ุญุงุฌู‡ ุดูุงู„ู‡ ูˆ ุฎู„ุงุต ูˆ ู…ุณุชุนุฏูŠู† ูŠุฏูุนูˆุง ู…ู‚ุงุจู„ ุญุฏ ูŠุฏูŠุฑ ุงู„ infrastructure ุจุงู„ู†ุณุจู‡ ู„ู‡ู…, ุจุณ ุนู„ู‰ ุงู„ุงู‚ู„ ุงู„ู†ุตุงุจูŠูŠู† ู…ุด ุจูŠุญุทูˆุง ุงู„ toolchain ุงู„ู‰ ุจูŠุณุชุฎุฏู…ูˆู‡ุง ุงู„ู‰ ุจุงู„ู…ู†ุงุณุจู‡ ู‡ู…ุง ู…ูƒุชุจูˆู‡ุงุด ูˆู„ุง ู‡ู‰ ุจุชุงุนุชู‡ู…

ุงู„ุซุงู„ุซ ูˆ ุงู„ุงู‡ู… : ุงู„ุนุงู„ู… ุนู…ุงู„ ูŠุญุฏู ุนู„ู‰ ุงู„ูŠู…ูŠู† ุงู„ู…ุชุทุฑู, ูƒู„ ูŠูˆู… ุงู„ูˆุงุญุฏ ุจูŠุดูˆู ุฏูˆู„ ุฏูŠู…ูˆู‚ุฑุงุทูŠู‡ ุงู„ูŠู…ูŠู† ููŠู‡ุง ุจู‚ู‰ ู…ู‡ูŠู…ู†, ุงู„ูˆู„ุงูŠุงุช ุงู„ู…ุชุญุฏู‡ ุงูƒุชุฑ ุฏูˆู„ู‡ ุจุชู†ุงุฏู‰ ุจุงู„ freedom of speech ุญุงุจุณูŠูŠู† julian assange ูˆ ุณู†ูˆุฏูŠู† ู‡ุฑุจุงู† ู ุฑูˆุณูŠุง ูˆู„ุฃ ุงู„ูˆุงุญุฏ ุนู…ุงู„ ูŠุณู…ุน ุงู† ุชู„ููˆู†ุช ุงู„ุตุญููŠูŠู†/ุงู„ู†ุงุดุทูŠูŠู† ุงู„ุณูŠุงุณูŠู† ุนู…ุงู„ู‡ ุชุฎุชุฑู‚ ุงุฌู‡ุฒุชู‡ู… ูˆ ุงู„ุฌูŠุด ูˆ ุงู…ู† ุงู„ุฏูˆู„ู‡ ู…ุนู†ุฏู‡ู…ุด ุดุบู„ุงู†ู‡ ุบูŠุฑ ุงู†ู‡ู… ูŠู‚ุนุฏูˆุง ูŠุดุชุฑูˆุง ู…ู† ุงุณุฑุงุฆูŠู„ malware , ู ู…ู† ุงู„ู…ู‡ู… ุงู† ุฃู†ุชูŽ/ุฃู†ุชู ุชุนุฑููˆุง ุชุนู…ู„ูˆุง proxy ุณูŠุฑูุฑ ุจู†ูุณูƒ ุญุชู‰ ู„ูˆ ุจุชูุถู„ ุงู„ุฎุฏู…ุงุช ุงู„ู…ุฏููˆุนู‡

  • ุงู†ุง ุฌุฑุจุช ุงุดูˆู tutorial ูˆ ู„ู‚ูŠุชู‡ ูŠุง ุงู…ุง ุจุงู„ุตูŠู†ู‰, ุงู„ุฑูˆุณู‰ ุงูˆ ูุงุฑุณู‰ ู„ูŠู‡ุŸู„ูŠู‡ ูƒู„ ุญุงุฌู‡ ุนู„ู‰ ุงู„ github ู…ุนุธู…ู‡ุง ุจุงู„ุตูŠู†ู‰ุŸ ู„ุงู† ุงู„ู…ูˆุถูˆุน ูƒู„ู‡ ุจู…ุทูˆุฑ ุตูŠู†ู‰ ูƒุชุจ shadowsocks ุนุดุงู† ูŠู‚ุฏุฑ ูŠุชุฌุงูˆุฒ ุฌุฏุงุฑ ุงู„ุญู…ุงูŠู‡ ุงู„ุตูŠู†ู‰ ูˆู„ุงู† ุงู‰ ุญุฏ ุนุงูŠุฒ ู ุจู„ุฏ ููŠู‡ุง ุงู†ุธู…ู‡ ูุงุดูŠู‡/ุดู…ูˆู„ูŠู‡ ุจูŠุจู‚ู‰ ููŠู‡ุง ุญุฌุจ ุนู„ู‰ ุงู„ุงู†ุชุฑู†ุช ู ู…ุทูˆุฑูŠู† ู…ู† ุงู„ุจู„ุงุฏ ุฏู‰ ุณุงู‡ู…ุช ู ุชุทูˆูŠุฑ ุงู„ ecosystem ูƒู„ู‡

  • ูŠุนู†ู‰ ุงูŠู‡ ุงู„ุจุฑูˆุชูˆูƒูˆู„ ุณูŠู†ุŸ project V

  • ู„ูŠู‡ ุจุชุฐูƒุฑ ุงู„ุจุฑุงู…ุฌ/ุจุฑูˆุชูˆูƒูˆู„ ุงู„ู…ูุชูˆุญ ุงู„ู…ุตุฏุฑ ูู‚ุทุŸ ุนุดุงู† ุงู„ุดูุงููŠู‡ ูˆู„ุง ุงู„ุงู…ุงู† ูˆู„ุงู† ููŠู‡ ุญุงู„ุงุช ุจุงู„ู‡ุจู„ ุนู† ู…ู‚ุฏู…ูŠู† ุฎุฏู…ุงุช vpn ุฒู‰ nord, express ุจูŠุณู„ู…ูˆุง ุงู„ logs ู„ู„ุญูƒูˆู…ู‡ ุงู„ู‰ ุจุชุทู„ุจ ุจูŠุงู†ุงุช ุงู„ู…ุณุชุฎุฏู…ูŠู†, ุตุญูŠุญ ุงู†ุช ุจุฑุถูˆุง ููŠู‡ ุฎุทุฑ ู…ู† ุงู† cloud provider ูŠุนู…ู„ ู†ูุณ ุงู„ุญุฑูƒู‡ ุจุณ ุนู„ู‰ ุงู„ุงู‚ู„ ุงู†ุช ุงู„ู‰ ุนุงุฑู ุงู„ุจู†ูŠู‡ ุงู„ุชุญุชูŠู‡ ุจุชุงุนุชูƒ ูˆ ุชู‚ุฏุฑ ุชุชูƒูŠู ู…ุน ุงู„ุจูŠุฆู‡ ู…ุด ู…ุฌุฑุฏ ู…ุณุชุฎุฏู… passive

  • ู„ูˆ ุงู„ guide ุฏู‰ ู„ู„ู…ุตุฑูŠูŠู† ู„ูŠู‡ ููŠู‡ ูƒู„ุงู… ุจุงู„ุงู†ุฌู„ูŠุฒู‰ุŸ ููŠู‡ ุจุนุถ ุงู„ูƒู„ู…ุงุช ุงู„ุฎุงุตู‡ ุจุงู„ุชูƒู†ูˆู„ูˆุฌูŠุง ู…ู„ู‡ุงุด ู…ู‚ุงุจู„ ู ุงู„ุนุฑุจู‰ ูˆู„ุฃ ุงู„ุงู†ุฌู„ูŠุฒู‰ ู„ุบู‡ ุงู„ู†ุช ุจุณ..

About

censorship circumvention tools for egyptian residents

Topics

Resources

Stars

Watchers

Forks