Skip to content

UK households could face VPN 'ban' after use skyrockets following Online Safety Bill

Technology
352 221 8.4k
  • Thanks for this. I think it's really important to point out that merely having unobservable traffic could be a trigger for this.

    We can't avoid taking these threats seriously because we think we are smarter.

    We arent smarter. Actually most people here have no voice or influence outside of their computer screen.

    We can use some tech, sure. But I very much challenge the idea that we are smarter as a group than other university students.

    But since a lot of us have poor social skills, we compensate by thinking we are smarter or better, when we should instead train our social skills and stop thinking like that.

  • They couldn't switch off VPNs for businesses. I work in a hospital and we use VPNs to create secure tunnels to other third party health care companies as well as NHS adjacent health services amongst other things. This is to protect patient sensitive data amongst other things. This would cripple our service and go against NHS england and government requirements for the secure transfer and sharing of data.

    This would have to be public VPNs only. Despite the fact that it would be complete bullshit either way.

    Well, you could just go back to sending stuff by fax machine forever, but then instead of even using the fax machine to sync patient data just make the patients fill out their own entire medical history from scratch every time they go to a different doctor and take their word for it.

  • We arent smarter. Actually most people here have no voice or influence outside of their computer screen.

    We can use some tech, sure. But I very much challenge the idea that we are smarter as a group than other university students.

    But since a lot of us have poor social skills, we compensate by thinking we are smarter or better, when we should instead train our social skills and stop thinking like that.

    I agree, but I think it is a trap we can easily fall into. Especially in this case.

  • I agree, but I think it is a trap we can easily fall into. Especially in this case.

    Yeah I agree. We have to wake up a bit. Real change happens outside of this place.

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    To me it looks like every government in the world is pro-surveillance and anti-privacy; they're just all at different stages of depth into those ideologies done in practice. Privacy and anti-surveillance against foreign governments and corporations, pro for domestic. And I continue decade after decade to say that you should fear your domestic government far more than any foreign unless you're a country that may have US and allies bombing/droning and paratrooping your country. Countries with a modern enough military mostly have to worry about their own government rather than foreign governments

  • You're literally being Jimmy Salvile right now

    ~ Guy who posed for photo ops with Salvile twenty years ago

    Omg my brother amd I went to see Rolf Harris when we were kids and he invited my brother onto the stage. So woerd to think of now 😕

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    Funny how its always so important to ban useful and empowering things for citizens in the name of safety but someone we can't ban business practices that cause mass extinctions, change the climate, impoverish the working class or kill enough of us to only be seen as a statistic instead of people. If they actually cared about safety, they would be banning the things that cause mass suffering and death, not VPNs. We should be opposed to these kinds of bans on the principle that it further disempowered us so we are less able to deal with the threats of all the mass suffering and death that they refuse to keep us safe from.

  • To me it looks like every government in the world is pro-surveillance and anti-privacy; they're just all at different stages of depth into those ideologies done in practice. Privacy and anti-surveillance against foreign governments and corporations, pro for domestic. And I continue decade after decade to say that you should fear your domestic government far more than any foreign unless you're a country that may have US and allies bombing/droning and paratrooping your country. Countries with a modern enough military mostly have to worry about their own government rather than foreign governments

    To me it looks like every government in the world is pro-surveillance and anti-privacy; they're just all at different stages of depth into those ideologies done in practice.

    Because they are all fuckin crooked and all want to keep their power.

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    this is obviously such a dumpster fire that I can't help but wonder, "When will they realize how dumb this is and back out of it?"

    then i remember that Brexit happened

    fuckin stubbornness is a national identity for you blokes innit

  • The problem is that content filters don't work all that well in the age of https everywhere. I mean, you can block the pornhub.com domain, that's fairly straightforward ... but what about reddit.com which has porn content but also legitimately non-porn content. Or closer to home: any lemmy instance.

    I think it would be better if politicians stopped pearl clutching and realized that porn perhaps isn't the worst problem in the world. Tiktok and influencer brainrot, incel and manosphere stuff, rage baiting social media, etc. are all much worse things for the psyche of young people, and they're doing exactly jack shit about that.

    That's a problem is for ISPs and content providers to figure out. I don't see why the government has to care other than laying out the ground rules - you must offer and implement a parental filter for people who want it for free as part of your service. If ISPs have to do deep packet inspection and proxy certs for protected devices / accounts then that's what they'll have to do.

    As far as the government is concerned it's not their problem. They've said what should happen and providing the choice without being assholes to people over 18 who are exercising their rights to use the internet as they see fit.

  • That's a problem is for ISPs and content providers to figure out. I don't see why the government has to care other than laying out the ground rules - you must offer and implement a parental filter for people who want it for free as part of your service. If ISPs have to do deep packet inspection and proxy certs for protected devices / accounts then that's what they'll have to do.

    As far as the government is concerned it's not their problem. They've said what should happen and providing the choice without being assholes to people over 18 who are exercising their rights to use the internet as they see fit.

    @arc99 @SpaceCadet thats basically allowing the Government to force ISP to build a solution which is able to sensor every content. Sorry there is alot of reasons why you should be against it.

  • Parents should monitor what their kids are doing not the government

    While I agree wholeheartedly with this, it's often not that easy.

    Back in the days of 28.8 modems my parents found my little bro's downloaded porn stash. It was in a Zip disk in his underwear drawer. They then locked down both of our AOL accounts so we couldn't see that stuff.

    I thought this was bullshit because I kept my Zip disk full of porn next to all the other ones and labeled it "Homework." Why should I get punished if I didn't get caught?

    So I downloaded a keylogger, stole my dad's password, and unlocked my account and continued to download porn.

    However, I don't think government regulation would have worked in my case.

    That's the other issue, kids will find ways around it they always have when it comes to restrictions.

  • That's the other issue, kids will find ways around it they always have when it comes to restrictions.

    Tell some kid they get all the porn they want if they figure out fusion power and we’d have it in a fortnight.

    Took me about that long to figure out how to boot up silently, resume downloads, and shutdown the pc before my dad woke up for work.

  • Tell some kid they get all the porn they want if they figure out fusion power and we’d have it in a fortnight.

    Took me about that long to figure out how to boot up silently, resume downloads, and shutdown the pc before my dad woke up for work.

    Yeah never underestimate a horney teenager haha.

  • What if we all started using I2P for most stuff? The governments couldn't do anything about it.

    Good idea, for sure.

  • just do what the chinese do to get around thier great wall. use proxies and anti-detect browsers, its the next step after VPN.. you might want to look around how to set these up.

    The Russians also have some pretty good tools.

  • The Great Firewall doesn't block by protocol. If you set up your own OpenVPN server, you can still connect to it. I've done this many times in my trips to China, and it's worked fine. That being said, they still do seem to throttle connections to international servers, though this happens to all servers, even those that are not blocked. There are many clandestine VPN operators in China who spin up their own VPN servers and sell the service. They are mostly OpenVPN-based.

    My university used Cisco AnyConnect, and I was able to successfully connect to the university VPN servers as well.

    The limited experimentation I have conducted seems to indicate that the Great Firewall blocks by IP and not by protocol.

    And how do they update that IP list? Manually?
    If you set up your own overseas server, it's gonna be ok for a few days for sure. But they update the block list automatically so people had to e.g. use CloudFlare websocket as a jump host to avoid switching providers every other month. Of cos CF is mostly blocked these days too so it's probably just easier to offload the work to those VPN operators you mentioned.

    Universities are a different matter. They use Edu network and there used to be no censorship at all in Edu IPv6. Nowadays it's still relatively easy for them to get exemptions for their labs and whatnot.

  • for those in the UK and/or Other places in Europe just know it's so painfully easy to either set up your own VPN or just use something like Mullvad.

    I set up my own VPN this morning for the first time on my server and it took less than 10minutes. plenty of guides online on how to do it.

    Bonus points if you can route your personal VPN server through your VPN provider, the flow looks a little like this:

    Client <—> Personal VPN server <—> VPN Provider

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    Yeah, businesses will not accept this. Remote work and remote connections rely on VPN for ALL KINDS OF SHIT. If you must adhere to some kinds of government compliance, it is even MANDATED BY THE FUCKING GOVERNMENT. Explain to me how the hell that is going to just poof and not cause all kinds of problems.

  • this is obviously such a dumpster fire that I can't help but wonder, "When will they realize how dumb this is and back out of it?"

    then i remember that Brexit happened

    fuckin stubbornness is a national identity for you blokes innit

    We didn't have a referendum on this though, and if we had done I don't think it would have passed

  • 0 Stimmen
    1 Beiträge
    5 Aufrufe
    Niemand hat geantwortet
  • 590 Stimmen
    120 Beiträge
    1k Aufrufe
    chickenandrice@sh.itjust.worksC
    Building a linux phone: do you mean from scratch, or just installing one of the Linux phone OS's that already exist? I've been following Ubuntu Touch for several years now and, while they have made a lot of progress, its main hurdles have the same thing in common: mobile hardware is incredibly locked down. For example, Ubuntu Touch uses proprietary Android drivers for many low level functions. Even then, there's some features that aren't stable across all devices, like VOLTE. It sucks, I really want to use Ubuntu Touch (or any of the Linux alternatives) but I can't make phone calls or text in the US without VOLTE support. There are a few phones that support VOLTE, but the feature is either in beta, the phone is expensive, or the phone is not sold in the US. Anyways bringing that back to Graphene: In my case, I'm using this as a stopgap until Linux phones take off (assuming they ever do). For now I guess the best thing is to just be skeptic, keep things minimal, and bloat-free.
  • Millions of websites to get 'game-changing' AI bot blocker

    Technology technology
    28
    1
    149 Stimmen
    28 Beiträge
    340 Aufrufe
    D
    How would you legally enforce robots.txt? It's not a legally sound system.
  • No JS, No CSS, No HTML: online "clubs" celebrate plainer websites

    Technology technology
    205
    2
    772 Stimmen
    205 Beiträge
    6k Aufrufe
    R
    Gemini is just a web replacement protocol. With basic things we remember from olden days Web, but with everything non-essential removed, for a client to be doable in a couple of days. I have my own Gemini viewer, LOL. This for me seems a completely different application from torrents. I was dreaming for a thing similar to torrent trackers for aggregating storage and computation and indexing and search, with search and aggregation and other services' responses being structured and standardized, and cryptographic identities, and some kind of market services to sell and buy storage and computation in unified and pooled, but transparent way (scripted by buyer\seller), similar to MMORPG markets, with the representation (what is a siloed service in modern web) being on the client native application, and those services allowing to build any kind of client-server huge system on them, that being global. But that's more of a global Facebook\Usenet\whatever, a killer of platforms. Their infrastructure is internal, while their representation is public on the Internet. I want to make infrastructure public on the Internet, and representation client-side, sharing it for many kinds of applications. Adding another layer to the OSI model, so to say, between transport and application layer. For this application: I think you could have some kind of Kademlia-based p2p with groups voluntarily joined (involving very huge groups) where nodes store replicas of partitions of group common data based on their pseudo-random identifiers and/or some kind of ring built from those identifiers, to balance storage and resilience. If a group has a creator, then you can have replication factor propagated signed by them, and membership too signed by them. But if having a creator (even with cryptographically delegated decisions) and propagating changes by them is not ok, then maybe just using whole data hash, or it's bittorrent-like info tree hash, as namespace with peers freely joining it can do. Then it may be better to partition not by parts of the whole piece, but by info tree? I guess making it exactly bittorrent-like is not a good idea, rather some kind of block tree, like for a filesystem, and a separate piece of information to lookup which file is in which blocks. If we are doing directory structure. Then, with freely joining it, there's no need in any owners or replication factors, I guess just pseudorandom distribution of hashes will do, and each node storing first partitions closest to its hash. Now thinking about it, such a system would be not that different from bittorrent and can even be interoperable with it. There's the issue of updates, yes, hence I've started with groups having hierarchy of creators, who can make or accept those updates. Having that and the ability to gradually store one group's data to another group, it should be possible to do forks of a certain state. But that line of thought makes reusing bittorrent only possible for part of the system. The whole database is guaranteed to be more than a normal HDD (1 TB? I dunno). Absolutely guaranteed, no doubt at all. 1 TB (for example) would be someone's collection of favorite stuff, and not too rich one.
  • 347 Stimmen
    91 Beiträge
    1k Aufrufe
    E
    It kinda seems like you don’t understand the actual technology.
  • 1 Stimmen
    2 Beiträge
    27 Aufrufe
    A
    If you're a developer, a startup founder, or part of a small team, you've poured countless hours into building your web application. You've perfected the UI, optimized the database, and shipped features your users love. But in the rush to build and deploy, a critical question often gets deferred: is your application secure? For many, the answer is a nervous "I hope so." The reality is that without a proper defense, your application is exposed to a barrage of automated attacks hitting the web every second. Threats like SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution are not just reserved for large enterprises; they are constant dangers for any application with a public IP address. The Security Barrier: When Cost and Complexity Get in the Way The standard recommendation is to place a Web Application Firewall (WAF) in front of your application. A WAF acts as a protective shield, inspecting incoming traffic and filtering out malicious requests before they can do any damage. It’s a foundational piece of modern web security. So, why doesn't everyone have one? Historically, robust WAFs have been complex and expensive. They required significant budgets, specialized knowledge to configure, and ongoing maintenance, putting them out of reach for students, solo developers, non-profits, and early-stage startups. This has created a dangerous security divide, leaving the most innovative and resource-constrained projects the most vulnerable. But that is changing. Democratizing Security: The Power of a Community WAF Security should be a right, not a privilege. Recognizing this, the landscape is shifting towards more accessible, community-driven tools. The goal is to provide powerful, enterprise-grade protection to everyone, for free. This is the principle behind the HaltDos Community WAF. It's a no-cost, perpetually free Web Application Firewall designed specifically for the community that has been underserved for too long. It’s not a stripped-down trial version; it’s a powerful security tool designed to give you immediate and effective protection against the OWASP Top 10 and other critical web threats. What Can You Actually Do with It? With a community WAF, you can deploy a security layer in minutes that: Blocks Malicious Payloads: Get instant, out-of-the-box protection against common attack patterns like SQLi, XSS, RCE, and more. Stops Bad Bots: Prevent malicious bots from scraping your content, attempting credential stuffing, or spamming your forms. Gives You Visibility: A real-time dashboard shows you exactly who is trying to attack your application and what methods they are using, providing invaluable security intelligence. Allows Customization: You can add your own custom security rules to tailor the protection specifically to your application's logic and technology stack. The best part? It can be deployed virtually anywhere—on-premises, in a private cloud, or with any major cloud provider like AWS, Azure, or Google Cloud. Get Started in Minutes You don't need to be a security guru to use it. The setup is straightforward, and the value is immediate. Protecting the project, you've worked so hard on is no longer a question of budget. Download: Get the free Community WAF from the HaltDos site. Deploy: Follow the simple instructions to set it up with your web server (it’s compatible with Nginx, Apache, and others). Secure: Watch the dashboard as it begins to inspect your traffic and block threats in real-time. Security is a journey, but it must start somewhere. For developers, startups, and anyone running a web application on a tight budget, a community WAF is the perfect first step. It's powerful, it's easy, and it's completely free.
  • 93 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • Short summary of feature phone market in 2025

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    18 Aufrufe
    Niemand hat geantwortet