Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> I'm surprised people who grew up with technology didn't learn from their own experience as a kid that censorware doesn't work and kids will always find a way to circumvent it if they want to.

You could bypass it 30 years ago, sure - but things have gotten a lot more locked down since then, with the rise of smartphones and tablets. Maybe the censorship tech managed to take advantage of that?

Obviously I haven't followed the advances in such things myself - but there could be some better stuff out there these days.



And there's a lot more "ways around" than there used to be, too.

Go find me a simple way to block DNS over HTTPS at a router, so requests are forced to the DNS server I have control over (Pi-Hole or such). I've yet to find one that doesn't involve "Maintaining a list of DNS-over-HTTPS providers and blocking them by IP."


This certainly could be done by only allowing outgoing traffic to addresses that have been in the results of a recent DNS lookup (so your DNS server tells your firewall about client lookups). I don't know whether any off-the-shelf solution can do that though.

You could also require all traffic to go through a MITM proxy so you can inspect it, though that wouldn't work so well for guests.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: