I am not familiar with IPFS internals, but is there no pattern to the IPFS traffic that the ISPs can shape/block?
Too bad about the entire IPFS domain being blocked, because besides the host, HTTPS traffic has safety in numbers. If only there was a way to proxy through google.com or some other popular domain too important to block.
Thanks for mentioning domain fronting! It's also been used by Signal to circumvent communications censorship in Egypt [1]. We want to bring domain fronting to IPFS by making libp2p's websockets transport capable of it. [2]
Fun fact: advanced networking setups like domain fronting are impossible to address in a URL/URI scheme. Check out multiaddr :) [3] A domain-fronted service could be addressed as something like `/dns4/google.com/tcp/443/tls/sni/google.com/http/example.com/ws`
I don't think that's tough if a country has said you need to be able to filter traffic. Assuming it is a simple pattern (e.g. whatever their NAT busting bootstrap is), set of ports, etc they could easily push filter rules to their downstream network devices if the law makes them.
I am not familiar with IPFS internals, but is there no pattern to the IPFS traffic that the ISPs can shape/block?
Too bad about the entire IPFS domain being blocked, because besides the host, HTTPS traffic has safety in numbers. If only there was a way to proxy through google.com or some other popular domain too important to block.