Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@delta" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>delta</span></a></span> also <a href="https://infosec.space/tags/deltaChat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deltaChat</span></a> natively supports <a href="https://infosec.space/tags/Proxies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxies</span></a>, <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>|s and <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> so not only can people use it that way but also use any other bypass method.</p><ul><li>Obviously, the classic <a href="https://infosec.space/tags/Sneakernet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sneakernet</span></a> with people doing <a href="https://en.wikipedia.org/wiki/UUCP" rel="nofollow noopener noreferrer" target="_blank"><code>uucp</code></a> with foreign mobile networks near borders works just as well...</li></ul><p>I'd not be surprised if delta Chat is also used by <a href="https://infosec.space/tags/RimjinGang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RimjinGang</span></a><a href="https://www.asiapress.org/rimjin-gang/" rel="nofollow noopener noreferrer" target="_blank">*</a> and <a href="https://infosec.space/tags/38North" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>38North</span></a><a href="https://www.38north.org/" rel="nofollow noopener noreferrer" target="_blank">**</a> for a <em>"contactless sneakernet"</em> tho I am convinced they won't confirm or deny that for <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> & <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a> reasons alone...</p><ul><li>I mean, both <a href="https://infosec.space/tags/Iran" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Iran</span></a> and <a href="https://infosec.space/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> ain't <a href="https://infosec.space/tags/Iraq" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Iraq</span></a> and <a href="https://infosec.space/tags/Syria" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Syria</span></a> where one could just take a <em>phat</em> satellite dish, strap an LTE stick or even external antennas on and just point it at turkish or lebanese radio towers near the border, as owning any satellite equipment in these places is a guarantee to get publicly executed for <em>"espionage"</em>...</li></ul>