Tried to get to Q posts on my wife's laptop and get this...common?
(media.greatawakening.win)
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (49)
sorted by:
Welcome in tech censorship 2.5 early beta! I don't know how much they can obfuscate stuffs without a judge warrant, don't know the law there but here they could be sued hard, anyway try to use an outgoing VPN to scramble the requests and switch your modem DNS too (anything but remove the default ones from your ISP) in case you experience issues
Fuck i was writing you an in depth and long explanation of both the DNS / your network and the VPN / ISP side and the pc rebooted for update while i was double checking it
To make it simpler the DNS is what translates a domain like greatawakening.win to an ip address (where the website is located, to explain it, i suggest to compare it to a postal address, you know overall where the place is, but the mail people takes care of taking in charge, routing and moving your stuffs until the destination), if they blacklist there, you may be redirected to an empty page or to one of those 'this website is forbidden bla bla bla' stuffs, to avoid this you can change the address of those 'translating servers', either from your device (but you have to do it one by one and for every network), or from the modem/ router, and it should propagate to the whole network and clients you have there, in the modem usually you find the ones hosted by your ISP, if you swap them with generic and neutral ones, it should help, but that's just one of the levels they may be blocking If they do instead or also an IP block on the network segment of GA or the win community, a VPN is going to be better as it encrypts and obfuscates the traffic, so the ISP will not see the connection to the flagged address, but to the VPN server, as it will act as gateway
Both together should be more than enough, there are other ways in which they can do it, or just to be really honest, they can even breakdown the VPN tunnelling, not easy to do and not faceable by anyone but at ISP level they have some specific hardware that can do even traffic decryption and breakdown, they use this normally on large scale to collect and analyse users, patterns, trends, honeypots, and so on, but rarely against people if not for surveillance mostly
An important advice, if you lookup a VPN, ensure yourself the provider has different entry and exit points, if not, look the next one, that's the key for a working VPN, as if you use a single entry and exit point, the same address is seen from source and target side, and will be the same one at which you connect, and from which it connects to the sites or stuffs you do, this way a simple log makes the VPN useless, as you can cross entry and exit logs for the traffic and match the time
When you have instead different hops, you connect to an address, it routes internally within the VPN provider servers and network multiple times, and it goes out from another address, this way makes tracking much harder as you are bouncing different backbones and they should cross all the address you have been passing by, also, try to look for a provider that ensures 0 logs, they either don't log or keep them for 24h or less for diagnostic purposes
Sorry if i went long, the one i wrote earlier was even longer, but i hope this may give you the idea!
@pedeITA You get today's prize for the longest sentence. Maybe get your "period" key fixed?