Skip to content

UK households could face VPN 'ban' after use skyrockets following Online Safety Bill

Technology
355 222 8.4k
  • Honest question but what makes you think that would happen? Do most businesses use VPNs?

    I work for a government agency and VPNs are vital for day to day operations.

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    You cant ban vpns, its easy for tech people to set up a vpn server on any server on the internet and connect to it. Wireguard for example, super simple.

  • Most conventional VPNs, e.g. OpenVPN, WireGuard, AnyConnect, PPTP/L2TP, IKEv2/IPsec, etc., actually don't work in China. Technology-wise GFW is quite sophisticated and conventional VPNs are not designed for censorship circumvention anyway.

    You'll have to use things like Shadowsocks or V2Ray, which is out of the reach of most people.

    Edit: You meant they dont work to access things outside of China of course.

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    labour really doesn't want people to access lgbtq safe spaces and resources huh?

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    I was very concerned like 15+ years ago when all the CCTV cameras went up. In some ways better than the US and in other ways worse. In the US corporations get free reign all over your data while in Europe, corporations more restricted but government gets a deep claw into people's digital lives. I think if the American mega tech companies were based in Europe, Europe would be corporations have free reign over your data. Just a matter of jurisdiction. The power and influence politicians and rich people can do domestically

  • Most conventional VPNs, e.g. OpenVPN, WireGuard, AnyConnect, PPTP/L2TP, IKEv2/IPsec, etc., actually don't work in China. Technology-wise GFW is quite sophisticated and conventional VPNs are not designed for censorship circumvention anyway.

    You'll have to use things like Shadowsocks or V2Ray, which is out of the reach of most people.

    The Great Firewall doesn't block by protocol. If you set up your own OpenVPN server, you can still connect to it. I've done this many times in my trips to China, and it's worked fine. That being said, they still do seem to throttle connections to international servers, though this happens to all servers, even those that are not blocked. There are many clandestine VPN operators in China who spin up their own VPN servers and sell the service. They are mostly OpenVPN-based.

    My university used Cisco AnyConnect, and I was able to successfully connect to the university VPN servers as well.

    The limited experimentation I have conducted seems to indicate that the Great Firewall blocks by IP and not by protocol.

  • How is this even feasible? People need them for work, business, school etc. The UK is going nuts with the attempts to regulate the internet.

    Take China for example. There is a common misconception that all VPNs are illegal in China. That's not fully true. In China, VPNs are legal and must obtain a licence from the Ministry of Public Security, like all other online businesses. This also means that they have to agree to monitoring and censorship from the Government, so you can't use legal VPN services to bypass the firewall in China.

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    What if we all started using I2P for most stuff? The governments couldn't do anything about it.

  • You cant ban vpns, its easy for tech people to set up a vpn server on any server on the internet and connect to it. Wireguard for example, super simple.

    yup just did it this morning on my server because now I'm moving my stuff, yet again, away from European companies because of all this. it was painfully simple and easy. I just followed a guide I found on a linux blog and within 10minutes I had a VPN of my own up and running.

  • You cant ban vpns, its easy for tech people to set up a vpn server on any server on the internet and connect to it. Wireguard for example, super simple.

    Oh, sweet summer child. Of course you can ban them. Lawmakers don't always care about the technicality of things, because in most cases they don't have to.

    You can't prevent VPN from existing, and short of a very tightly curated whitelist of services, you can't prevent people from actually using them, sure. Unless you're on the side of the state, the Law, and the enforcement. In which case, you can. A blanket ban on VPN usage is the perfect gateway to "we've seen traffic from your house toward a known VPN server, so, blam, arrest". And it does not have to stop at known server.

    Given the regular tries to outright ban encryption, this is the perfect venue to mass target encrypted communications. Depending on the wording, the mere presence of unobservable traffic could be enough for an arrest.

    If what I'm saying here sound dystopian to you, just remember that not only most of this was actually tried (and aborted) time after time, but also that until quite recently, the general public actually using strong encryption was illegal in many places, including our western countries, and experiments to make state spyware mandatory are also a recurrent thing (which might take hold with the "ID verification through your phone" apps soon).

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    for those in the UK and/or Other places in Europe just know it's so painfully easy to either set up your own VPN or just use something like Mullvad.

    I set up my own VPN this morning for the first time on my server and it took less than 10minutes. plenty of guides online on how to do it.

  • Lol what is going on over there. The UK is becoming more dystopian by the day.

    They looked at their calendar and thought "Oh shit!" when they saw they were overdue to start V for Vendetta.

  • Oh, sweet summer child. Of course you can ban them. Lawmakers don't always care about the technicality of things, because in most cases they don't have to.

    You can't prevent VPN from existing, and short of a very tightly curated whitelist of services, you can't prevent people from actually using them, sure. Unless you're on the side of the state, the Law, and the enforcement. In which case, you can. A blanket ban on VPN usage is the perfect gateway to "we've seen traffic from your house toward a known VPN server, so, blam, arrest". And it does not have to stop at known server.

    Given the regular tries to outright ban encryption, this is the perfect venue to mass target encrypted communications. Depending on the wording, the mere presence of unobservable traffic could be enough for an arrest.

    If what I'm saying here sound dystopian to you, just remember that not only most of this was actually tried (and aborted) time after time, but also that until quite recently, the general public actually using strong encryption was illegal in many places, including our western countries, and experiments to make state spyware mandatory are also a recurrent thing (which might take hold with the "ID verification through your phone" apps soon).

    Thanks for this. I think it's really important to point out that merely having unobservable traffic could be a trigger for this.

    We can't avoid taking these threats seriously because we think we are smarter.

  • I don't think it's even possible to get rid of VPNs without outright banning encryption. If I set up a VPN that uses an obscure port and the traffic is encrypted, how are they going to know it's even a VPN?

    Attached below is a Wireshark trace I obtained by sniffing my own network traffic.

    I want to draw your attention to this part in particular:

    Underneath "User Datagram Protocol", you can see the words "OpenVPN Protocol". So anyone who sniffs my traffic on the wire can see exactly the same thing that I can. While they can't read the contents of the payload, they can tell that it's OpenVPN traffic because the headers are not encrypted. So if a router wanted to block OpenVPN traffic, all they would have to do is drop this packet. It's a similar story for Wireguard packets. An attacker can read the unencrypted headers and learn

    • The size of the transmission
    • The source and destination IP addresses by reading the IP header
    • The source and destination ports numbers by reading the TCP or UDP headers
    • The underlying layers, up until the point it hits an encrypted protocol (such as OpenVPN, TLS, or SSH)
  • I doubt their corpo overlords would allow a VPN ban considering the amount of companies that use them.

    It would be trivial for them to write it so it bans it for citizen use but is allowed for corporate and government use. The people have no rights anymore

  • Thanks for this. I think it's really important to point out that merely having unobservable traffic could be a trigger for this.

    We can't avoid taking these threats seriously because we think we are smarter.

    We arent smarter. Actually most people here have no voice or influence outside of their computer screen.

    We can use some tech, sure. But I very much challenge the idea that we are smarter as a group than other university students.

    But since a lot of us have poor social skills, we compensate by thinking we are smarter or better, when we should instead train our social skills and stop thinking like that.

  • They couldn't switch off VPNs for businesses. I work in a hospital and we use VPNs to create secure tunnels to other third party health care companies as well as NHS adjacent health services amongst other things. This is to protect patient sensitive data amongst other things. This would cripple our service and go against NHS england and government requirements for the secure transfer and sharing of data.

    This would have to be public VPNs only. Despite the fact that it would be complete bullshit either way.

    Well, you could just go back to sending stuff by fax machine forever, but then instead of even using the fax machine to sync patient data just make the patients fill out their own entire medical history from scratch every time they go to a different doctor and take their word for it.

  • We arent smarter. Actually most people here have no voice or influence outside of their computer screen.

    We can use some tech, sure. But I very much challenge the idea that we are smarter as a group than other university students.

    But since a lot of us have poor social skills, we compensate by thinking we are smarter or better, when we should instead train our social skills and stop thinking like that.

    I agree, but I think it is a trap we can easily fall into. Especially in this case.

  • I agree, but I think it is a trap we can easily fall into. Especially in this case.

    Yeah I agree. We have to wake up a bit. Real change happens outside of this place.

  • Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

    "If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

    To me it looks like every government in the world is pro-surveillance and anti-privacy; they're just all at different stages of depth into those ideologies done in practice. Privacy and anti-surveillance against foreign governments and corporations, pro for domestic. And I continue decade after decade to say that you should fear your domestic government far more than any foreign unless you're a country that may have US and allies bombing/droning and paratrooping your country. Countries with a modern enough military mostly have to worry about their own government rather than foreign governments

  • Thinking Is Becoming a Luxury Good

    Technology technology
    30
    65 Stimmen
    30 Beiträge
    222 Aufrufe
    S
    In political science, the term polyarchy (poly "many", arkhe "rule") was used by Robert A. Dahl to describe a form of government in which power is invested in multiple people. It takes the form of neither a dictatorship nor a democracy. This form of government was first implemented in the United States and France and gradually adopted by other countries. Polyarchy is different from democracy, according to Dahl, because the fundamental democratic principle is "the continuing responsiveness of the government to the preferences of its citizens, considered as political equals" with unimpaired opportunities. A polyarchy is a form of government that has certain procedures that are necessary conditions for following the democratic principle. So yeah, you are right. A representative "democracy" is not a democracy. It's a monarchy with more than one ruler. A gummy bear is as much a bear as representative democracy is a democracy. I didn't know that, because i was taught in school that a representative "democracy" is a form of democracy. And the name makes it sound like one. But it isn't. It's not even supposed to be in theory. I am sure 99% of people living in a representative "democracy" don't know this. I hereby encourage everyone to abandon the word representative "democracy" in favor of polyarchy or maybe oligarchy. This makes it much clearer what we are talking about. Also i doubt the authors of this article know this, because they imply that representative "democracy" is desirable, but it is obviously undesirable.
  • Google AI Overview is just affiliate marketing spam now

    Technology technology
    48
    1
    369 Stimmen
    48 Beiträge
    439 Aufrufe
    E
    [image: 33ab121e-a148-4320-95b2-133efb83aa02.webp]
  • 41 Stimmen
    28 Beiträge
    356 Aufrufe
    T
    The poll, published by the research firm and the Walton Family Foundation... Walton Family Foundation provides financial support to The 74. What kind of fool would believe anything from these grifters? Phony AF at its face.
  • 42 Stimmen
    11 Beiträge
    133 Aufrufe
    P
    That takes zero ingenuity.
  • Uber, Lyft oppose some bills that aim to prevent assaults during rides

    Technology technology
    12
    94 Stimmen
    12 Beiträge
    124 Aufrufe
    F
    California is not Colorado nor is it federal No shit, did you even read my comment? Regulations already exist in every state that ride share companies operate in, including any state where taxis operate. People are already not supposed to sexually assault their passengers. Will adding another regulation saying they shouldn’t do that, even when one already exists, suddenly stop it from happening? No. Have you even looked at the regulations in Colorado for ride share drivers and companies? I’m guessing not. Here are the ones that were made in 2014: https://law.justia.com/codes/colorado/2021/title-40/article-10-1/part-6/section-40-10-1-605/#%3A~%3Atext=§+40-10.1-605.+Operational+Requirements+A+driver+shall+not%2Ca+ride%2C+otherwise+known+as+a+“street+hail”. Here’s just one little but relevant section: Before a person is permitted to act as a driver through use of a transportation network company's digital network, the person shall: Obtain a criminal history record check pursuant to the procedures set forth in section 40-10.1-110 as supplemented by the commission's rules promulgated under section 40-10.1-110 or through a privately administered national criminal history record check, including the national sex offender database; and If a privately administered national criminal history record check is used, provide a copy of the criminal history record check to the transportation network company. A driver shall obtain a criminal history record check in accordance with subparagraph (I) of paragraph (a) of this subsection (3) every five years while serving as a driver. A person who has been convicted of or pled guilty or nolo contendere to driving under the influence of drugs or alcohol in the previous seven years before applying to become a driver shall not serve as a driver. If the criminal history record check reveals that the person has ever been convicted of or pled guilty or nolo contendere to any of the following felony offenses, the person shall not serve as a driver: (c) (I) A person who has been convicted of or pled guilty or nolo contendere to driving under the influence of drugs or alcohol in the previous seven years before applying to become a driver shall not serve as a driver. If the criminal history record check reveals that the person has ever been convicted of or pled guilty or nolo contendere to any of the following felony offenses, the person shall not serve as a driver: An offense involving fraud, as described in article 5 of title 18, C.R.S.; An offense involving unlawful sexual behavior, as defined in section 16-22-102 (9), C.R.S.; An offense against property, as described in article 4 of title 18, C.R.S.; or A crime of violence, as described in section 18-1.3-406, C.R.S. A person who has been convicted of a comparable offense to the offenses listed in subparagraph (I) of this paragraph (c) in another state or in the United States shall not serve as a driver. A transportation network company or a third party shall retain true and accurate results of the criminal history record check for each driver that provides services for the transportation network company for at least five years after the criminal history record check was conducted. A person who has, within the immediately preceding five years, been convicted of or pled guilty or nolo contendere to a felony shall not serve as a driver. Before permitting an individual to act as a driver on its digital network, a transportation network company shall obtain and review a driving history research report for the individual. An individual with the following moving violations shall not serve as a driver: More than three moving violations in the three-year period preceding the individual's application to serve as a driver; or A major moving violation in the three-year period preceding the individual's application to serve as a driver, whether committed in this state, another state, or the United States, including vehicular eluding, as described in section 18-9-116.5, C.R.S., reckless driving, as described in section 42-4-1401, C.R.S., and driving under restraint, as described in section 42-2-138, C.R.S. A transportation network company or a third party shall retain true and accurate results of the driving history research report for each driver that provides services for the transportation network company for at least three years. So all sorts of criminal history, driving record, etc checks have been required since 2014. Colorado were actually the first state in the USA to implement rules like this for ride share companies lol.
  • Is Internet Content Too Engaging?

    Technology technology
    3
    4 Stimmen
    3 Beiträge
    37 Aufrufe
    T
    The number of tabs I have open from sites I’ve clicked on, started reading, said “eh, I’ll get back to this later” and never have, says no.
  • 2k Stimmen
    317 Beiträge
    2k Aufrufe
    M
    I have a perfectly fine moral framework According to what? Not everyone has the same beliefs and negative attitude toward it Not everyone thinks female circumcision is bad either. for some it can even have a positive impact. Lol I don’t believe in absolutist terms. Do you absolutely believe that? While your continued failure to comprehend my initial comment is astonishing Your initial comment is indicative of somebody who hasn't thought seriously about their worldview but feels confident about critiquing others.
  • Sunsetting the Ghostery Private Browser

    Technology technology
    8
    1
    33 Stimmen
    8 Beiträge
    70 Aufrufe
    P
    Sunsetting Dawn? Of course