HK protesters tried mesh networking in 2014-2019 as well as anti-Covid protesters in China in 2022 but both were quickly shut down by blocking the service providers (Bluetooth mesh sharing apps were removed in HK app stores and Apple Airdrop for the latter).
> HK protesters tried mesh networking in 2014-2019 as well as anti-Covid protesters in China in 2022 but both were quickly shut down by blocking the service providers (Bluetooth mesh sharing apps were removed in HK app stores and Apple Airdrop for the latter).
It doesn't help that even if app sideloading was made possible on iOS, the significant drop in installations will still happen once the apps are pulled from official stores. Most people are not familiar with installing apps from outside of their phone's sponsored ecosystem.
1. How do you access said apps? There has to be some repository storing the apps.
2. Certain regions can straight up ban sideloading by only allowing pre-approved app stores (eg. Mainland China). Ofc there will be technical ways to bypass this, but you are limited by technical knowhow and internal intelligence agencies abilities to find those people.
3. You could make using certain apps with such capabilities illegal. People may try to use it, but if found among a small set of protesters, they can just be "isolated". How do you prevent that?
Mind reading Necromancers (probably) don't exist, but every example I listed above has already been deployed in a piecemeal manner in various countries the last 10 years.
Mass File Sharing Blacklisting has been enforced by Indian ISPs since 2019
VPN+ISP traffic log sharing has been enforced in Kazakhstan (along with SSL stripping)
Blocking Tor downloads has been implemented already (with varying levels of success) plus attacks to deanonomize Tor have started occurring since 2021.
App Store restrictions and region locks have existed in Mainland China since the early 2010s.
It's very easy to tamp down and censor internet based communications. Individual corporations have the capabilities to apply such censorship if they wanted to, let alone ISPs.
That’s pretty risky, though: the authorities can track radio signals easily enough and they can hammer the exit nodes. One mole uploads a video to a known destination and they take down each IP seen delivering those packets.