New Reply[×]
Name
Email
Subject
Message
Files Max 8 files48.1MB total
Tegaki
Password
Flag
[New Reply]


Read the RULES before posting.
If (You) don't like something then post what (You) want to see.

Remember to support your Anfoo buddies
PARTY HARD
Gems Meta Art


01aec3e0754b0965f6c17cd9d5bfd644514910483aedfc6d37f76b1bcbba8619.jpg U A
[Hide] (128.5KB, 734x800) Reverse
What will happen to all the ruski 'fooanons once VPNs are banned?
I want to HUG this gremlin
>>102399 (OP) 
Racism has no place on the 'foo
f0b9a7e24ae4bf791f4fbb8fe5c0e66273d76e41f7dcf4d97392c320129a8831.jpg U A
[Hide] (32.9KB, 864x457) Reverse
which one of you is this
>>102399 (OP) 
They'll use TOR.
Replies: >>102461
literally 1984.jpg U A
[Hide] (127.5KB, 1800x947) Reverse
>/anthro/ is not for anthros
Fa9E4eUWAAImSKC.png U A
[Hide] (741.9KB, 669x570) Reverse
>>102399 (OP) 
Assuming this is a serious question: contraband starlink terminals placed along the border can serve as gateways. Drones can be used to lay fiber optic cables,  kind of like the Underground Railroad but with fox drawings. 
You can also either place calls abroad and use dialup-like audio modulation, or do a similar thing but with emails as transport, to browse the web at baud rates not seen since the early 00s.

You can't really stop the signal, not when the population quietly resists. Even amid the dark and ugly news of government crackdowns one can often find stories of defiance and creativity. Let us use amateur radio operators and music-on-bones publishers as sources of inspiration in bleak situations, be those country-wide vpn blocks, Chat Control, mandatory age verification and other unpleasantries the powers that be are pushing across the globe. 
Thank you for coming to my TED talk.

>>102425
That should work, for the time being, as long as all the relay IPs aren't found and blocked: there is a finite list and while you can request fresh ones the government body tasked with shutting it down will be doing the same. Besides, in order to request more bridges you first have to make the connection, I think? Not sure how that part works actually. 
Once the connection is established, obfs4 is apparently nearly impossible to fingerprint (for now), but so are the modern obfuscated proxy and vpn protocols, so if TOR is available then at least some VPNs should work as well. Currently the only way to reliably shut down VPNs for good is to implement white lists, which will also kill TOR sadly.
Replies: >>102462 >>102469
>>102461
>Assuming this is a serious question: contraband starlink terminals placed along the border can serve as gateways.
Already all disabled.
>Drones can be used to lay fiber optic cables
Lmao
>emails as transport
Hmmm, should we create a 'foo email list?
Replies: >>102482
>>102461
Have you considered novel applications of steganography?  You could hide fox pictures inside fox pictures.
Replies: >>102482 >>102499
>>102462
>Already all disabled.
Well, not all, they are disabled on Elmo's end, he can turn them on any time he wants (and already does, as evidenced by the drone strikes; come to think of it, if a starlink-equipped drone malfunctions and does not explode, and the terminal is salvaged, would it remain active or do they remove those terminals from the white lists after the mission is over? If they remain on, then these terminals could fetch a pretty penny. Imagine your satellite internet being unwittingly paid-for-life by the DoD)

>>Drones can be used to lay fiber optic cables
It's either that or have Sergey dig a trench, Ivan lay cable and Vladimir bury it, somewhere on the border with Mongolia or something.

>Hmmm, should we create a 'foo email list?
Was thinking along the lines of sending encrypted packets as email contents, think there is already an app that does something of the sort, hence the idea. Internet traffic is encrypted and sent via email, then on the recepient's side the mail client recieves the email, decrypts the payload and sends the traffic on its way.
Or maybe it was a messenger that worked this way. Basically a messenger app like whatsapp but over email. Probably that; the delay induced by sending and receiving mail would make things astronomically slow.

But it's probably to make a email version of anfoo:
>subscribe
>receive emails in the form of "New thread #102399 is created" with text and pic as the attachment
>reply to the thread emails (make sure the subject field has the thread's # in it)
>the reply gets parsed and posted the same way as when it's received from the "new reply" form on the website
The future looks so bright. 

>>102469
Good, no one would expect a fox to be hiding inside a fox. More ideas:
Smuggling fox pictures by ingesting tiny containers with microsd cards inside during a trip to an approved country.
Planting trees in a particular pattern so that 50 years later they would form a huge Averi visible from space (saw it done with a swastika once).
>>102469
One thing that "excites" me in the space of steganography is that we now have an infinite source of socially acceptable junk data (generative AI). You can hide data inside AI memes, AI reviews of dog food, AI anything, and it's totally normal for people to upload buttloads of uncurated AI garbage at irregular paces.
Replies: >>102536
>>102499
Funny you should say that.

https://github.com/net4people/bbs/issues/590  These people are implementing that very concept.
Replies: >>102545
>>102536
heck yeah
Replies: >>102550
>>102545
And the Second Law of Thermodynamics suggests to me that it's probably less computationally intensive to generate nonsense than to sift through nonsense.  This is just a gut feeling.  I have absolutely nothing to back it up.

>"Claude, I want you to generate one gorillion random images, with sizes, shapes, and subject matter typical of what is found in a random survey of the Internet.  Use widely known steganographic techniques to conceal more random images within 50% of the images, and images within those images as well.  Additionall, in the other 50% of images use widely known steganographic techniques to conceal encrypted text strings, the strings to be gathered from random English-language text available on the Internet, and encrypt the text using 40 bit DES."
>"Step two, make a gorillion phony advertising web pages filled with low quality gibberish and put these images on them.  Then post these images to a gorillion phony Twitter and Instagram accounts.
>"Step three, use 4096 bit RSA to encrypt the actual private message I want to send, and use this more recent, less common, less well known steganographic technique to hide it in an image of a cartoon fox.  It's Wednesday, so post that one on fake Twitter account #69420..."
[New Reply]
13 replies | 4 files | 10 UIDs
Connecting...
Show Post Actions

Actions:

Captcha:

- news - rules - faq -
jschan 1.7.3