this post was submitted on 04 Sep 2025
80 points (98.8% liked)

Privacy

41504 readers
427 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

The Ministry of Communication and Information Technology of Nepal has issued an order requiring all social media platforms to be registered in Nepal.

Based on this, the Nepal Telecommunications Authority (NTA) has instructed all network service providers to deactivate 26 platforms, including Signal, Facebook, Instagram, WhatsApp, YouTube, and others.

To lift the ban and operate legally in Nepal, each platform must:

  1. Register with the Ministry of Communication and Information Technology.

  2. Appoint in Nepal:

    • A Point of Contact
    • A Resident Grievance Handling Officer
    • An Officer responsible for monitoring compliance with self-regulation [1]
  3. Submit an application in the prescribed format along with required documents, as per the Directives on Managing the Use of Social Media Networks (2080 B.S.). [2]

Reference:

[1] Notice by the Ministry of Communication and Information Technology on Managing the Social Networking Platform Usage in Nepal

[2] Directives for Managing the Use of Social Networks, 2023

you are viewing a single comment's thread
view the rest of the comments
[–] anon5621@lemmy.ml 1 points 2 days ago (1 children)

The I2P netDB isn’t a single dumpable list like you’re suggesting. It’s a Kademlia DHT stored across rotating floodfill routers. Floodfills aren’t static — routers get promoted/demoted based on bandwidth, uptime, and capacity — so the view of the network is constantly shifting. A normal router only ever queries small slices of that DHT, meaning you never get the “whole picture” from one vantage point. That’s a deliberate design choice to make enumeration hard. On the traffic side, I2P isn’t just onion-style routing. It uses garlic routing, where multiple encrypted “cloves” (messages) are bundled together into one garlic message. This kills the simple “one in → one out” traffic correlation trick. Add to that the transports: NTCP2 is indistinguishable from normal TLS over TCP, and SSU2 is UDP with full encryption, padding, and replay protection. From a DPI standpoint, it looks like generic encrypted noise — there’s no clean handshake to match on like with old Tor circuits. As for blocking, I2P is decentralized. There are no directory authorities to censor, no fixed bridges to burn. Floodfills are chosen dynamically and constantly refreshed, and peers discover new ones automatically. The bigger the network gets, the harder it is to enumerate and blacklist enough routers to make a dent. Censors can try whack-a-mole, but the distribution effect scales against them: more peers in more ASNs across more countries means higher cost to block. So yes, you can suspect I2P traffic if you really try, but fingerprinting and wholesale blocking don’t scale — the protocol was designed specifically to make both correlation and censorship exponentially harder as adoption grows Details: https://www.youtube.com/watch?v=95hSAMEwrlM

[–] rumba@lemmy.zip 2 points 2 days ago

The I2P netDB isn’t a single dumpable list like you’re suggesting

I am well aware of the design and structure, you mentioned I said some things there that I clearly didn't say.

So yes, you can suspect I2P traffic if you really try, but fingerprinting and wholesale blocking don’t scale

If I2P is outlawed, and there's a strong possibility we'll see that in our lives, and ISP's are told if they let unchecked traffic through they're responsible for legal ramifications. They'll run enough nodes in enough places and terminate enough end user accounts (at the very least in the US) to make people not want to run it.

I don't care if you can't DPI it. If it's on their network, and they start running peers, they will be able to root people out, not everyone, but they don't need everyone. If the ISP's share their data with each other, making that map isn't all that hard.

The floodfills can be secure and ephemeral AF, but P2P traffic, even packaged through garlic still passes through points that can be seen.

The whole design is supersmart, and from a legal stand point it's solid. But when we lose protections of beyond a reasonable doubt become stripped, they'll tear that network apart user by user until no one wants to chance running it.