• sunbeam60@lemmy.one
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    4
    ·
    11 months ago

    Given how easy it is to set up a Docker-based wireguard server on a small remote VM, I suspect this will achieve very little.

    • axzxc1236@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      11 months ago

      Deep packet inspection is a thing, AFAIK people in China uses a software called v2ray to counter that.

      • deeznutz@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        5
        ·
        11 months ago

        You can’t inspect encrypted packets, what China does is network traffic analysis - examining headers and figuring out patterns based on metadata. They don’t care much about what’s being transmitted if using a VPN alone is enough to land you in trouble.

        • Gailthesnail@lemmy.ml
          link
          fedilink
          English
          arrow-up
          2
          ·
          11 months ago

          i think US carriers do the same thing to counter unauthorized hotspotting so even using a VPN didnt help

    • snake@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      11 months ago

      Excuse my ignorance, but in this case what would be the benefit of having the wireguard server run inside a Docker? Wouldn’t running the server directly on the remote VM achieve the same result?