When the Internet Goes Dark: A Tactical Guide to Communicating Without Infrastructure
- Patrick Duggan
- Feb 28
- 6 min read
Updated: Apr 25
# When the Internet Goes Dark: A Tactical Guide to Communicating Without Infrastructure
**Your government killed the internet. Here's what still works.**
At 4% connectivity, Iran is effectively offline. The regime shut down the internet not because of the strikes — they shut it down because of the protests. The bombs gave them cover. The blackout was already planned.
This is not new. Iran killed the internet in November 2019 during the Bloody Aban protests. They killed it in September 2022 after Mahsa Amini. They throttled it in January 2026 when the student movement reignited. The playbook is always the same: cut communications, isolate populations, control the narrative, deny everything.
But the playbook has a weakness. The internet is not the only way to communicate.
The Hierarchy
When a government shuts down the internet, not all communication tools are equal. Some require infrastructure the regime controls. Some don't. The distinction is life and death.
**Tier 1: Works with zero internet, zero cell towers**
These tools communicate directly between devices using Bluetooth, Wi-Fi Direct, or radio hardware. No ISP, no cell tower, no government chokepoint.
**Tier 2: Works with degraded internet**
These tools function on minimal bandwidth — the kind of connectivity that leaks through even aggressive throttling.
**Tier 3: Requires internet**
These are useless in a blackout. If you're relying on them, you're relying on the regime to let you communicate.
Tier 1: No Internet Required
Briar
The gold standard for protest communications. Built specifically for activists, journalists, and anyone operating under hostile surveillance.
> How it works: Bluetooth and Wi-Fi Direct, device-to-device. When internet is available, routes through Tor automatically. End-to-end encrypted. No central server. No metadata.
> Why it matters: Briar was designed for exactly this scenario. Messages sync when devices are in proximity — pass someone on the street, your phones exchange messages automatically. Range: approximately 100 meters per hop, but messages relay through intermediate devices.
> Platform: Android only. No iOS version exists. This is a deliberate security decision — Apple's Bluetooth stack does not allow the low-level access Briar requires.
> Limitation: Both parties must have Briar installed before the blackout. You cannot discover new contacts without a pre-existing connection or a shared link.
Meshtastic / LoRa Radio
The real play for sustained blackout communications. Uses cheap radio hardware (Heltec, LILYGO, RAK) that costs $25-40 per node.
> How it works: Long-range radio mesh network. Each node relays messages to extend range. Typical range: 1-10 km per hop in urban environments, up to 30+ km line-of-sight. Messages hop across the mesh — a message can traverse an entire city through relay nodes.
> Why it matters: This is infrastructure the regime cannot shut down. There is no central point of failure. Each node is a radio transmitter the size of a cigarette pack. The mesh self-heals — remove a node and traffic routes around it.
> Limitation: Requires hardware purchased before the blackout. Not encrypted by default — enable encryption in settings. Text only, no voice.
Bridgefy
Used by protesters in Hong Kong (2019), India (2019-2020), and Iran (2022).
> How it works: Bluetooth mesh networking. Range: approximately 100 meters device-to-device, but messages relay through other Bridgefy users to extend range. End-to-end encrypted since version 2.0.
> Platform: Android and iOS.
> Limitation: The company is based in Mexico and has faced criticism for earlier versions lacking encryption. Version 2.0+ addressed this. Verify you have the current version.
AirDrop (Apple) / Nearby Share (Android)
File transfer, not messaging. But in a blackout, a PDF or image can carry critical information.
> How it works: Wi-Fi Direct and Bluetooth. Range: approximately 10 meters. No internet required.
> Why it matters: Every smartphone already has this. No app to install. Used in China to distribute protest flyers during COVID lockdowns (AirDrop to strangers on the subway).
> Limitation: Not encrypted in transit. Apple restricted AirDrop from strangers to 10-minute windows after Chinese protesters used it — a feature change made at Beijing's request. Short range. Not suitable for sustained communication.
Tier 2: Degraded Internet
Signal
The standard for encrypted messaging when you have any internet at all.
> How it works: End-to-end encrypted messaging, voice, and video. Open source. No metadata retention. The protocol is the foundation that WhatsApp, Google Messages, and others adopted.
> At 4% connectivity: Text messages may still send — they are small packets. Voice and video will fail. Group messages may take hours to deliver but will eventually sync.
> Limitation: Requires internet. Requires phone number for registration. If you did not register before the blackout, you cannot create an account.
Tor / Orbot
Not a messaging app — a network layer that can punch through censorship.
> How it works: Routes traffic through volunteer relays worldwide. Orbot (Android) forces all device traffic through Tor. On degraded internet, Tor bridges and pluggable transports (obfs4, Snowflake) can bypass Deep Packet Inspection.
> Why it matters: Even at 4% connectivity, Tor bridges may find a path. The regime blocks known Tor relays — bridges are unlisted relays specifically designed to evade blocking.
> Get bridges: If you still have SMS capability, text "get transport obfs4" to +1-415-200-1777 (Tor Project bridge bot). Or email [email protected] from a Gmail or Riseup address.
VPN (with obfuscation)
> Standard VPNs are blocked by DPI in Iran. Only VPNs with obfuscation protocols survive: Outline (Shadowsocks), Psiphon, Lantern. These disguise VPN traffic as normal HTTPS. Psiphon was specifically built for Iran and China.
Tier 3: Requires Full Internet (Useless in a Blackout)
> Requires internet. Requires Facebook/Meta servers. End-to-end encrypted for content, but metadata (who talks to whom, when, how often) goes to Meta. Meta has complied with government data requests. In a surveillance state, metadata kills.
Telegram
> Requires internet. NOT end-to-end encrypted by default — only "Secret Chats" use E2E. Regular chats and all group chats are stored on Telegram's servers. Telegram has been less cooperative with authoritarian regimes than Meta, but the architecture is fundamentally server-dependent.
Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →
> The Iranian regime has historically monitored Telegram extensively. Assume Telegram is compromised in Iran.
Instagram / Twitter / Facebook
> Require full internet. Require accounts linked to identity. Monitored. Useless for operational communication.
Operational Security: The Rules
**Before the blackout:**
1. Install Briar and exchange contacts with your trusted network while you still have internet
2. Enable Bluetooth on your device
3. If you have Meshtastic hardware, configure and test it now
4. Download offline maps (OsmAnd or Maps.me — not Google Maps, which requires data)
5. Pre-load critical information: emergency contacts, meeting points, medical facilities
6. Charge everything. A dead phone is a brick regardless of what apps you have
**During the blackout:**
1. Bluetooth stays on. Wi-Fi stays on. Mobile data off (it reveals your location to cell towers even when throttled)
2. Use airplane mode with Bluetooth and Wi-Fi enabled manually — this prevents cell tower tracking while allowing device-to-device communication
3. Do not use apps that require accounts you created with your real phone number or identity
4. Assume every unencrypted communication is monitored
5. If you must use SMS (the last thing standing when data dies), assume every word is read by the regime
**The most important rule:**
> The time to prepare is before the blackout, not during it. If you are reading this with internet access, install Briar and Signal now. Exchange contacts now. The next blackout is not a question of if.
For the People of Iran
The student movement that began in late 2025 did not need the strikes to justify itself. The protests preceded the bombs. The grievances — mandatory hijab enforcement, political prisoners, economic collapse, the killing of Mahsa Amini, the 1,500 murdered in Bloody Aban — these are not resolved by foreign military intervention. They are resolved by Iranians, for Iranians.
What the strikes changed is the power structure. The Supreme Leader and senior IRGC commanders are confirmed killed. The constitutional succession framework exists on paper. What exists on the street is a population that has been protesting for months with no internet, no international press access, and no guarantee that what comes next will be better than what came before.
The tools above are not weapons. They are the ability to coordinate, to share information, to document what happens when the cameras are off, and to tell the world the truth when the regime cannot stop you.
Communication is not a luxury. It is the infrastructure of self-determination.
Technical Resources
> Briar: briarproject.org (download APK directly — Google Play may be blocked)
> Meshtastic: meshtastic.org (firmware, hardware guides, configuration)
> Signal: signal.org (also available as APK from signal.org/android/apk)
> Tor bridges: bridges.torproject.org or text +1-415-200-1777
> Psiphon: psiphon.ca (built for Iran and China)
> OsmAnd: osmand.net (offline maps, open source)
*The internet is a tool. It is not the only tool. When they take it away, what remains is what you built before they did.*
*Her name was Renee Nicole Good.*
*His name was Alex Jeffery Pretti.*
The cheapest, fastest, most accurate threat feed on the internet.
275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.




Comments