All of your examples are not “very” valid (or require some extensive technical skills), censorship-resistant necessarilly means that you can hide/anonymize things, this is not the case with ipfs, you can detect an ipfs/dht node and block it
I agree that there are some kind of decentralized p2p censorship-resistant patterns with ipfs making it not completely trivial to block, now nobody is blocking ipfs, that’s why your examples (still) work (for now)