this post was submitted on 03 Dec 2025
5 points (100.0% liked)

Public resource but access restricted 🚫 and ⛔ exclusive

75 readers
1 users here now

This community tracks restricted access resources (generally websites) that are supposed to serve taxpayers and the general public, but they fail in that duty by imposing arbitrary restrictions on access. This is where we document these cases.

Most often, it is the Tor community who is marginalised by incompetantly implemented infosystems. This community will be mostly littered with references to tor-hostile public resources to a fatiquing extent, but this is expected. It is not necessarily limited to Tor. Any demographic of people who are refused service would have a relevant story here. E.g. someone traveling outside their country and being denied access to a homeland website on the basis of presumed IP geolocation.

This is very closely related to the !digi_fiefdom_required@lemmy.sdf.org community. But there are some nuanced differences. Not all fiefdoms are necessarily always restricted access. E.g. some rare Facebook pages are reachable to non-FB users.

And not all manifestations of restricted access entail a fiefdom. E.g. it’s increasingly common for a gov website to block Tor visitors at the firewall without involving a digital fiefdom.

Cases of Cloudflare, Facebook, LinkedIn and the like can be crossposted in many situations. They are a fiefdom walled garden and also commonly configured to restrict access. IDK.. use your best judgement. Might suffice to just post in !digi_fiefdom_required@lemmy.sdf.org in those cases.

Also related: !netneutrality@sopuli.xyz

Scope and rules:

What is not relevant here:

This community is focused on tax-funded government programs and services like public education, social services, voter reg, courts, legal statutes, etc. NGOs and non-profits may exist for the pubic benefit, but if they are not funded by force (taxation) then they are not really relevant here.

Recommended style:

founded 11 months ago
MODERATORS
 

cross-posted from: https://slrpnk.net/post/30992984

We are drowning in enshitified websites. Cloudflare automatically enshitifies ⅓ of the worlds websites. On top of that, there are countless shitty anti-human features that plague the web. Some of them just annoy, and some actually make the website unreachable or unusable to various demographics of people (such as Tor users).

Most infuriating is when a GOVERNMENT website intended to serve the public uses access restrictions (like Cloudflare) or does something else to exclude demographics of people who are entitled access. The Tor community can no longer access most websites of the EU.

What we need

We need an app that will:

  • attempt to visit a webpage from multiple different networks (VPN, Tor, residential clearnet, and a variety of different geographic regions).
  • try a variety of different user agent strings (cURL, wget, firefox, lynx).
  • compare the content between non-erroneous payloads. A significant difference should raise flags. If there is much less content, it could perhaps be regarded as an access denial without error. (e.g. a page simply says: “we don’t serve .. (your kind of people)”). Some common phrases could be searched for.
  • detect exclusive walled gardens like Cloudflare and Sucuri
  • accessibility¹/enshitification check: whether the contact page imposes a GUI or Google CAPTCHA (¹in terms of people with impairments)
  • open data check: whether the contact page discloses a street address or phone number.
  • check whether the page functions with uMatrix (maybe this is not possible).
  • check whether a privacy policy exists.
  • check whether there is a popup blocker blocker (that blocks those who block popups/ads).

In the end, the app produces a checklist and concludes with a final result:

  • ✔👍🎉 ❝The website under test is publicly accessible❞
  • 🤷🫤 ❝The website under test is publicly accessible but dark patterns or similarly unsuitable/inappropriate anti-user mechanisms were detected. The website should be avoided.❞
  • ❌ ❝The website under test is access-restricted or not entirely publicly accessible❞

The report could perhaps be timestamped, digitally signed by the entity running the app, and centrally recorded. Then concerned people among the public could use the report as an independent/authoritative source for claiming that a “public” resource is not actually public.

you are viewing a single comment's thread
view the rest of the comments
[–] activistPnk@slrpnk.net 1 points 2 weeks ago* (last edited 2 weeks ago)

I did not say /how/ this tool would be used and relied on people to use their imagination. A website audit tool that declares “this page is not publicly accessible” is indeed useless if you don’t use it in clever ways for further action.

Imagine a scenario like this: the gov requires some kind of action from you (like declaring your tax) and they force you to use their shitty website. Then you miss a tax deadline, or whatever web action they demand of you. Maybe the website was unusable for you; maybe not. Regardless of your real reason for failing to comply, this audit tool can produce a certificate saying the website is down, dysfunctional, exclusive/access restricted, etc. It gives you evidence for a defense from which to push back with. You could then also incorporate human rights with your case:

Universal Declaration of Human Rights article 21 ¶2:
“Everyone has the right of equal access to public service in his country.”

You can use a cert from the audit service/tool to say “not everyone gets public service.. some demographics are excluded according to this independant audit report”

What happens now: You complain to an ombudsman that the website is broken. Some asshole in that office responds with “works for me; problem is you; erase your cookies or something”. Because they believe if it works for one person, it must work for everyone. This audit gives independant 3rd-party push back. They have to work harder to brush you off.

If it was a project that tried to route around things and auto sent emails with an overview might work, but I expect they would be thwarted by stupid network policies.

Circumvention techniques are overrated. People tend not to realise that if you surreptitiously circumvent their garbage and they don’t know it, it actually sends them a false thumbs up signal that their garbage is accepted and working.

This is the effect. That’s an example of a gov agency patting themselves on the back.