They fully can’t, there’s too many legitimate reasons that their corporate overlords use it for, the most you’ll get is loud filibuster about “we’ll totally do that!” until the topic gets forgotten.
Also, my personal conspiracy is that someone important in the gov owns some secret stocks and shares in a VPN company and this was very much a cash grab from that person.
It’s not some theoretical topic, it’s the reality for China, Russia, Iran. They do block commonly used VPN protocols, so people now use VPN with obfuscations. Some work, some doesn’t, some stop working as time goes. So when people say “Ha-ha, I’ll just use VPN”, it will help you for some time but the trend is they will make it a problem for you, better start preparing before it happened.
What vpn obfuscations do you use? Because you know they’ll block vpn next.
They fully can’t, there’s too many legitimate reasons that their corporate overlords use it for, the most you’ll get is loud filibuster about “we’ll totally do that!” until the topic gets forgotten.
Also, my personal conspiracy is that someone important in the gov owns some secret stocks and shares in a VPN company and this was very much a cash grab from that person.
You can probably block companies offering public VPN services.
But good luck blocking VPN in general.
There several sites I visit I have to fight with cause of VPN blocking.
That isn’t blocking VPNs, it’s blocking requests from data centers. Important distinction
It’s not some theoretical topic, it’s the reality for China, Russia, Iran. They do block commonly used VPN protocols, so people now use VPN with obfuscations. Some work, some doesn’t, some stop working as time goes. So when people say “Ha-ha, I’ll just use VPN”, it will help you for some time but the trend is they will make it a problem for you, better start preparing before it happened.
Anything encrypted is blocked. Boom, done.
Is it stupid? Yes. Never stopped lawmakers.
I knew HTTP would make a return without its brother TLS someday!
How do you know if something is encrypted?
https://en.wikipedia.org/wiki/Subliminal_channel https://en.wikipedia.org/wiki/Steganography
Or for more practical implementations: https://blog.frost.kiwi/ssh-over-https-tunneling/ (granted, this one uses normal looking encryption to hide hide maybe unwanted encypted traffic) https://nurdletech.com/linux-notes/ssh/via-http.html