Prominent backbench MP Sarah Champion launched a campaign against VPNs previously, saying: “My new clause 54 would require the Secretary of State to publish, within six months of the Bill’s passage, a report on the effect of VPN use on Ofcom’s ability to enforce the requirements under clause 112.
"If VPNs cause significant issues, the Government must identify those issues and find solutions, rather than avoiding difficult problems.” And the Labour Party said there were “gaps” in the bill that needed to be amended.



There are ways around this even if they do ban vpn. Its a hopeless battle being fought by the ignorant.
I mean anyone can rent a server in Europe and install OpenVPN themselves. Hell, it doesn’t even need to open OpenVPN, Wireguard works just as well and is basically undetectable.
Eat shit, UK government, for real. Idiots think that by speaking the same language as US fascists they can have similarly dumb ideas.
wireguard is not undetectable, even wireshark has a simple way to identify it, but there are more accurate ways
Wouldn’t it be detected via initial connection only? WG does not send packets while connected, does it?
update: I think not only the handshake packets contain a recognizable pattern. look at “Subsequent Messages: Exchange of Data Packets”
https://www.wireguard.com/protocol/
especially if the receiver/sender_index and the counter are what I think they are.
also have a look at this page: https://www.wireguard.com/known-limitations/
now that you say, I think I remember reading something like this earlier
It would have been my go to. But they can detect openvpn and other protocols. I would just use a ssh tunnel with squid proxy. The squid wont cache ssh traffic unless you run your own cert and set up the squid that way. It will however seamlessly allow you to connect through a ssh tunnel with one port forward.
To be honest, I’ve found WireGuard’s performance is harmed more by replay attacks than OpenVPN. Least that is what I put it down to when I tried them both from a VPN provider that offered both.
Edit: missed the a in replay.
How is WG vulnerable to replay attacks? They already address that in their documentation.
It’s doesn’t fall over, it just slows down. Or appears to much more than OpenVPN. There could be something else going on, but for what ever the problem was, OpenVPN was coping better and just spitting out errors about a possible replay attack and continuing like nothing was wrong. I’ve not looked again as OpenVPN is working fine. For everything else, I’m using WireGuard.
They will use it as an excuse to give themselves more power and to take more civil liberties from you.