A technical look at Iran's internet shutdowns

Perceived gaps and risks in the article

  • Several commenters say the piece is light on concrete technical and operational detail, especially around legality, detectability, and consequences of running encrypted services in Iran.
  • Concern that hosting your own Matrix or similar service inside Iran is both trivially discoverable (Iranian IPs, server seizure) and potentially very dangerous.
  • Some feel the author is speaking about Iranians without understanding local realities (e.g., SMS cost, already-sanctioned payments).
  • Multiple comments stress: bad or oversimplified advice can get people imprisoned or killed; authors should be extremely cautious when prescribing tactics for people under repressive regimes.

National Information Network (NIN) and domestic infrastructure

  • NIN is described as far more than special DNS: a centrally controlled ecosystem including backbone, DPI, certificate management, domestic search, antivirus, and regulated services.
  • Architecturally compared to nationwide “corporate IT”/Zero Trust: all ISPs sit under state ASNs, enabling centralized control and easy disconnection from the global Internet.
  • Domestic payment and many online services continue to function during shutdowns because they’re fully local.
  • NIN appears to apply DPI mainly at the international boundary; internal traffic may be treated differently.

Circumvention tools: capabilities and limits

  • Discussion of WireGuard, AmneziaWG, and tunneling WG over QUIC/HTTP/3 to evade DPI; note that some regimes simply block UDP or HTTP/3 entirely.
  • References to v2ray, Shadowsocks, Trojan, Xray, obfs4, SSH tunneling; several note these are in an ongoing arms race with Chinese-style DPI and active probing.
  • Matrix is criticized as weak on encryption and metadata; Synapse is considered resource-heavy, making covert self-hosting harder.
  • Starlink is seen as a powerful but risky exit: terminals are illegal in Iran, can be RF-located, and sharing them over local ISPs could expose users.

Radio, mesh, and offline approaches

  • Ham radio, APRS, AX.25, and HamNet are discussed but found severely constrained: low bandwidth, no encryption allowed, easy triangulation, and likely rapid crackdown if used for dissent.
  • Shortwave radio is highlighted as a robust one-way channel for information into censored regions, though easily jammed and traceable.
  • Mesh networks and citywide wireless/LoRa setups are seen as promising but require critical mass and are still vulnerable to regulation and enforcement.
  • Store-and-forward methods (e.g., “sneakernet” via SSDs, local wikis via Kiwix) are suggested for knowledge distribution during full isolation.

Future of the global Internet and censorship

  • One camp sees the open, unauthenticated global Internet as a historical anomaly that’s ending, replaced by platformized, permissioned access and national “intranets” like NIN.
  • Another camp calls this defeatist, arguing there will always be a technical minority building and using circumvention tools, even if only a small slice of the population.
  • Some argue legal and bureaucratic pressure (fines, regulation, mandatory central providers) may be more effective than overt terror in suppressing that minority.
  • There’s debate over whether more national “information borders” (to combat foreign information warfare) are a necessary defense or a dangerous blueprint for authoritarian control.

Safety, repression, and responsibility

  • Multiple commenters emphasize operational security: encryption is useless without a transmission path, and any RF or wired channel can be monitored and located with sufficient state resources.
  • Comparisons are drawn between classic WWII resistance radio, modern huff-duff and SDR-based triangulation, and today’s satellite systems.
  • Some push back on alarmism (“don’t publish anything or someone will be executed”), but others insist that even well-meaning technical guides must assume worst-case repression and avoid giving false confidence.