i thought that you can turn off all those botnet ssl things in about:config
South Korea Expands Site Blocking Efforts with SNI Eavesdropping
No, as far as I am aware, the Korean government and Koreans ISPs do not carry out IP address blocks. If this was true Firefox's ESNI and GoodbyeDPI would not work.
If your website contains content related to porn, pro-North Korean content, sells drugs including abortion pills, or gambling, then it might be blocked by the government filter.
As for your server, don't bother enabling ESNI on nginx for now, it is troublesome and most mainstream browsers like Chrome do not support it. Firefox supports it but it needs to be manually enabled in about:config
Yes, packets split by MTU should technically be filterable but the government's transparent HTTP proxy and HTTPS SNI header inspection equipment does not reassemble the host header, as of now. I am aware that MTU modification is at best a temporary solution.
Tor is running fine. My own tor relay I operate on one of the major Korean ISPs have not observed any traffic dips or consensus weight changes. As for the Tor Browser and other clients, they seem to be working just fine on default settings. torproject.org remains accessible.
You wish. In NK they can just download anything they want from ftp's, no ip laws.
You might be able to perform some diagnostics youself by configuring Tor Browser to only use Tor Exit nodes in Korea OR go to vpngate.net and download the OpenVPN configuration file for one of the countless public Korean VPN servers listed there.
So North Korea was Best Korea after all?
why wasnt this data encrypted from the beginning?
This is a pretty good opportunity to spread the word of Tor and I2P over South Korea. Embrace the darknet before they come for your illegally acquired porn.
I have a dream that every Korean person installed Tor and I2P on his or her computer!
...