Censorship is common in the world, but especially in China.

Because China is unlike other small countries which has poorer techs in internet censoring.

As far as I know, the government uses the latest AI to detect malicious connection and there’s a blacklist containing confirmed ‘bad’ sites.

For example, Vultr, is completely banned soon after its viral marketing. From this point, we can see that if something ‘illegal’ is too popular, it will be soon banned.

So we’d better keep quiet when making p2p networks.
Really ?

Keep quiet or be banned

As you know, China has great power to ban anything as long as it does not affect economy much.
We can try to make p2p protocols irreplaceable, like HTTP.

There’re living examples, I’ve said before, verysync, a commercial product for file sharing, using p2p technologies.
I’ve used it to download ‘illegal’ files, in a rather high speed.

We can infer that there’s also a whitelist.

There’re also other examples, like Microsoft uses p2p to accelerate its downloading speed of updates/visual studio, but removing these feature does not influence commerce.

A better example, but centralized, Cloudflare, which can be a reverse proxy to help me bypass the GFW.

Private bittorrent

They say PT works well. I don’t think PT is advanced at all though.
BitTorrent is dead in China, except for PT.

The main point is that it’s private.
On the other hand, China has successfully split BT into plenty of small networks.
Say internet is no longer inter-connected networks.

Shutdown all p2p connections ?

Unlikely, unless the situation is rather serious.

Are they traversing DHT table and banning each peer ?

I don’t know if they are really doing this, and this is quite disgusting, but obviously we can’t prevent them from doing this.

When our network become popular, it will probably be targeted by the gov.
So it’s a contradiction.

What to do exactly ?

First of all, IPZN is an overlay network, which means it is not related to the underlying protocols.

Our goal is to make the P2P network unbroken.

  1. Keep quiet, especially when we don’t have effective ways to resist GFW.
  2. Obfuscation, simulating other ‘legal’ protocols.
    This is not about encrypted tunnels, e.g. SSR, but enterprise targeted file syncing p2p softwares.
  3. Relays, making use of the differences of policies in different provinces of China.
    It seems in some regions bypassing the GFW is much easier.

Conclusion

Once a perfect P2P network stack is built, the following tasks, against the government, will be easier.

IPZN can be thought as a detached application layer of ZeroNet.