You can combine the phone tree with literal runners -- so basically, someone takes their burner and calls suburbs A,B,C and D and then the runners go out and pass the word about the protest or action.
I hope you're not a list now.
If you're going the radio route these come to mind:
Meshtastic: 1W, one band, local. Useful if Iran doesn't know about it. But easy to jam and probably triangulate.
Wifi Halow: 1W, can possibly hop between bands, but probably also really easy to jam and triangulate.
WSPR: Possibly good, transmitters can hide in the noise floor, and can go long distances with 100mW of power, but slow. Probably triangulable, very easy to jam once located in the spectrum. Data can be transmitted and received with off the shelf components.
Military Radios: Very good. Transmitters can frequency hop, making triangulation and jamming difficult. Also encryption. You can easily transmit in the same frequency space that Iran would be using to avoid jamming. But also, mostly unobtanium. I have heard stories about US military radios showing up at Ham Fests.
Be aware though that transmitting on any radio is like turning on a giant, extremely bright light bulb directly above your antenna. Anyone with basic radio know-how will be able to hear you and locate you.
And here I was thinking that GregTech's "Ludicrous Voltage" sounded out of place...
For OP's situation I think runners and a store and forward system like Scuttlebutt/Briar/etc might work better. But I'd love to see a couple of thorough case studies on that kind of system, they've been around for many years targeting related scenarios.
I think the issue is more that getting a message many kilometres out using a couple of nodes sitting in non prime locations is just unreliable. The noise is too high. There’s also a limit on how many messages can be sent while using flood routing.
I don't think it's the noise that's too high, my original understanding of the meshtastic 2.0 protocol (from this video: https://www.youtube.com/watch?v=7v6UbC5blJU) was that an edge device would receive priority. So the message might go the wrong direction, say. Or, worse, a meshtastic radio in a basement might get priority.
Because they didn't understand (or care about) network topologies from the start and reliable message transmission, not to mention the versions of devices that are still on their network, I'm guessing it's gonna be a couple more years before they finally get their act together.
In Melbourne, Australia I was able to pick up 450 nodes on Meshtastic while I got zero on MeshCore after weeks of searching.
You'd have to have a huge network spanning the entire country to get a message out however
Starlink (satellite, bypasses local infrastructure; currently jammed but partially works in some areas, free access offered): Obtain smuggled terminal (dish + router). Place with clear sky view. Power on. Download Starlink app (iOS/Android) or use web interface. Connect phone/PC to Starlink Wi-Fi. Follow app prompts to activate (no subscription needed in Iran now).
Meshtastic (LoRa mesh, long-range offline text): Buy compatible device (e.g., Heltec/RAK ESP32 LoRa board). Flash latest firmware via web flasher (meshtastic.org). Install Meshtastic app (Android/iOS). Connect via Bluetooth. Set region (e.g., EU433/US915 based on hardware). Create/join channel with shared key. Messages hop device-to-device.
Noghteha (Bluetooth mesh, Iran-specific, offline): Download Noghteha APK (Google Play or sideloading). Install on Android. Open app—no account needed. Enable Bluetooth. Messages auto-hop via nearby phones in mesh.
Briar (Bluetooth/Wi-Fi P2P, offline secure messaging): Download Briar APK (briarproject.org or F-Droid). Install on Android. Create account (nickname + password). Add contacts: meet in person and scan QR, or share link via other channel. Enable Bluetooth/Wi-Fi for sync when in range. Messages store & forward when devices meet.
Delta Chat (email-based, works if any outbound email possible): Download Delta Chat app (delta.chat). Use chatmail server for auto-account (no personal email needed). Or add existing email. Add contacts via QR/link. Send messages (E2EE). Relies on email transit; resilient to blocks if email partially works.
Carrier pigeons: (communications w/ nearby states).
Code Talkers: Use minority Iranian languages (e.g., Kurdish, Balochi, Azerbaijani) as codes for voice/radio comms, training speakers to encode military/civil strategies, similar to WWII code talkers—resilient if monitors lack fluency.
Sci-fi alien languages (e.g., Klingon, Na'vi) could work if users learn them for encrypted messaging apps or calls, but impractical due to learning curve and detection risks in which case create your own code talker language with an AI.
e.g., StratCode System Alphabet: Use 10 simple symbols for phonetics (easy to draw/speak):
⊙ (oh) - Open circle for vowels like O/A. | (ih) - Line for I/E. △ (ah) - Triangle for A/U. × (kh) - X for hard consonants K/G. ~ (sh) - Wave for S/Sh. □ (th) - Square for T/D. ○ (eh) - Empty circle for E. / (fh) - Slash for F/V. \ (rh) - Backslash for R/L.
(mh) - Plus for M/N/H.
Combine for words (e.g., ⊙| = "oi" sound).
Vocabulary for Strategies (map to animals/plants for disguise; speak/draw symbols):
Attack/Advance: Eagle (△×~) - △ for sky, × for strike, ~ for swift. Defend/Hold: Turtle (□\⊙) - □ for shell, \ for slow, ⊙ for safe. Retreat/Evacuate: Rabbit (/~) - / for jump, \ for run, ~ for quick. Scout/Observe: Owl (⊙○+) - ⊙ for eyes, ○ for night, + for wise. Supply/Logistics: Bee (~\□) - ~ for buzz/work, \ for hive, □ for store. Communicate/Signal: Wolf (×/+ ) - × for howl, / for pack, + for alert. Protest/Rally (civil): Flower (△⊙|) - △ for grow, ⊙ for bloom, | for unite. Hide/Conceal: Fox (~/) - ~ for sly, / for trick, \ for burrow. Alliance/Join: Tree (|+) - | for trunk, \ for roots, + for branches. Disrupt/Block: Storm (×~○) - × for thunder, ~ for wind, ○ for rain.
Encoding Example: "Attack then defend" = "Eagle Turtle" (△×~ □\⊙). Learn by associating symbols to sounds/objects; practice short phrases.
Ideally cjdns or similar can be used inside the country to create an alternative encrypted mesh network inside the borders, with some "exit nodes" out.
Contents can be re-shared locally over ad-hoc or mesh WiFi networks even without Internet access.
Encryption and steganography can obscure the contents of drives from casual inspection. You can stuff a lot of extraneous data in Office XML documents that are just zip files and look innocuous when opened.
1. For current events content add descriptions, locations, and timestamps to everything. The recipients need that context.
2. Even unencrypted files can be verified with cryptographic signatures. These can be distributed on separate channels including Bluetooth file transfers.
3. Include offline installers for browsers like Dillo or Firefox. Favor plain text formats where possible. FAT32 has the broadest support in terms of file system for the flash drives. Batch, PowerShell, and bash scripts can also be effective in doing more complex things while not needing local installation or invasive installations on people's computers.
I suppose this isn't complete without mentioning RFC 1149 (IP Datagrams on Avian Carriers).
If you have a phone or cellular dongle with a serial interface you might be able to initiate a “data” call which gives you a modem-like link at speeds much higher than running an actual modem on the audio path. Note that this kind of non-standard usage will stand out like a sore thumb so might not be advisable.
https://hackaday.com/2016/03/08/how-low-can-you-go-the-world...
also
https://en.wikipedia.org/wiki/WSPR_(amateur_radio_software) https://wsjt.sourceforge.io/wsjtx.html
plus the super simple "Fireball QRP transmitter"
https://www.worldradiohistory.com/Archive-DX/73-magazine/73-...
That way, we might end up with enough nodes such that mesh networking comes within reach.
I'd be more worried about them being able to triangulate the radio signals though. If they can jam GPS, surely they can detect a 100W signal around 14MHz.
And you know, I'm fairly sure being able to talk to the outside world makes it so that you can at least get information out to others.
Pray tell, what methods do YOU have to bypass a shutdown with privacy and no reliance on ISP and resistant to jamming?
So they can do what with it? The people who can action it already have intensive satellite imagery of the area and domestic intelligence assets. The level of risk to reward for a citizen to do this is fairly low.
Amateur radio transmissions are public, unencrypted, and attributable. Callsigns are required, modes and frequencies are well known, and transmissions are trivially direction-findable. In a country like Iran, where RF spectrum is actively monitored and unauthorized communications are treated as a security issue, transmitting on amateur bands is effectively broadcasting your location and intent. Direction finding is routine, fast, and does not require exotic equipment. One transmission can be enough.
In the US and most other countries, amateur radio is tightly regulated. Encryption to obscure content is explicitly prohibited. Ignoring this can result in fines, seizure of equipment, and loss of license. Foreign operators encouraging or participating in such use are not insulated from consequences simply because the target country is authoritarian.
I did not claim to have a better solution. That's the point. When the threat model includes surveillance, attribution, and enforcement, there may be no safe civilian workaround. Suggesting amateur radio in this context is not “imperfect but helpful”, it reflects a fundamental misunderstanding of what amateur radio actually is and how it is regulated.
Amateur radio can't provide privacy, safety, or reliable information flow under an active crackdown. Pretending otherwise is irresponsible.