• jelbana@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    4 years ago

    Forgive me if this is poorly phrased, I’m very much a noob, but if they wanted to block XMPP, is it possible to identify all traffic to any XMPP server/from any XMPP client?

    • fidibus@lemmy.161.social
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      4 years ago

      Yes, with deep packet inspection they can identify when a certain protocol is used and then block that traffic. Works the same way as blocking torrents.

      Edit: That is harder though than just blocking a couple of IPs that signal uses.

      • poVoq@lemmy.ml
        link
        fedilink
        arrow-up
        5
        arrow-down
        1
        ·
        4 years ago

        True, but you can also try set up an xmpp server inside the country and sort of fly under the radar as country internal communication is usually less restricted. Of course hosting inside the country also puts the server in reach of the authorities, so better be careful not to collect any data they could get their hands on that way.

        • AlmaemberTheGreat@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          4 years ago

          Tor or I2P would be my guess

          Edit: for Tor you will need to use meek-azure because it’s also blocked. idk about I2P, probably also blocked