this post was submitted on 29 Jul 2025
990 points (98.9% liked)

Technology

73512 readers
2896 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.

"If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.

(page 4) 50 comments
sorted by: hot top controversial new old
[–] peoplebeproblems@midwest.social 7 points 4 days ago (2 children)

Man I can't follow UK politics. I thought Labour was a progressive party

load more comments (2 replies)
[–] sirico@feddit.uk 7 points 4 days ago

Geeze I hope I don't...slap tailscale on a vps

[–] NigelFrobisher@aussie.zone 6 points 3 days ago

Can't wait for the next election to kick out the Tories so can roll back all their draconian bills.

[–] wrassleman76@lemmy.ca 6 points 3 days ago* (last edited 3 days ago) (3 children)

I don't think it's even possible to get rid of VPNs without outright banning encryption. If I set up a VPN that uses an obscure port and the traffic is encrypted, how are they going to know it's even a VPN?

[–] NateNate60@lemmy.world 5 points 3 days ago (2 children)

Attached below is a Wireshark trace I obtained by sniffing my own network traffic.

collapsed inline media

I want to draw your attention to this part in particular:

collapsed inline media

Underneath "User Datagram Protocol", you can see the words "OpenVPN Protocol". So anyone who sniffs my traffic on the wire can see exactly the same thing that I can. While they can't read the contents of the payload, they can tell that it's OpenVPN traffic because the headers are not encrypted. So if a router wanted to block OpenVPN traffic, all they would have to do is drop this packet. It's a similar story for Wireguard packets. An attacker can read the unencrypted headers and learn

  • The size of the transmission
  • The source and destination IP addresses by reading the IP header
  • The source and destination ports numbers by reading the TCP or UDP headers
  • The underlying layers, up until the point it hits an encrypted protocol (such as OpenVPN, TLS, or SSH)
load more comments (2 replies)
load more comments (2 replies)
[–] MITM0@lemmy.world 5 points 3 days ago

Download Tor, Whonix & Tails

load more comments
view more: ‹ prev next ›