Crack Url Filter Defintion

  1. Crack Url Filter Definition
This article is part of a series on the
politics and government of
China
Leadership generations
Succession of power
  • Hu–Wen Administration(2002–2012)
  • Xi–Li Administration(2012–2017)
  • Xi Core Administration(since 2017)
    • 4th Leadership Core: Xi Jinping
    • 19th Party Politburo: Xi Jinping
    • 13th State Council: Li Keqiang
National leaders
Orders of precedence
  • Paramount leader: Xi Jinping
  • Communist Party leader: Xi Jinping
  • Head of state: Xi Jinping
  • Head of government: Li Keqiang
  • Congress Chairman: Li Zhanshu
  • Conference Chairman: Wang Yang
  • Commander-in-chief: Xi Jinping
Related systems
History
Constitution
Organization
  • National Party Congress (19th)
    • Central Committee (19th)
      General Secretary (list)
      Xi Jinping
      • Central Politburo (19th)
      • Central Secretariat
        Top-ranked secretary: Wang Huning
      • Central Military Commission
        Vice-Chairmen:
        Xu Qiliang, Zhang Youxia
      • National Security Commission
        Vice-Chairmen:
        Li Keqiang, Li Zhanshu
      • Comprehensively Deepening Reforms Commission
        Director: Xi Jinping
        Li Keqiang, Wang Huning, Han Zheng
        Secretary-General: Wang Huning
      • Financial & Economic Affairs Commission
        Deputy Director: Li Keqiang
      • General Office
        Director: Ding Xuexiang
        • General Secretary's Office [zh]
          Chief: Ding Xuexiang
        • Central Security Bureau
      • Organization Department
        Head: Chen Xi
    • Central Commission for Discipline Inspection (19th)
      Secretary: Zhao Leji
  • Provincial committee
    • Standing committee
      Secretary
      Deputy secretaries
  • Political Consultative Conference
    • National Committee [zh]
      Vice-Chairpersons
      Top-ranked: Zhang Qingli
      Secretary-General: Xia Baolong
  • Political parties:
    CPC (ruling)
    United Front Work Department
    Head: You Quan
    • Deng Xiaoping Theory
      Primary stage of socialism
      Four Cardinal Principles
    • Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era
      Chinese Dream
      Four Comprehensives
  • Constitution
    Previous constitutions
  • Chinese legal system
  • Laws
  • Labour law
  • Property law
  • Intellectual property law
  • Administrative law
  • Criminal law
    • Capital punishment
  • National People's Congress(13th)
    Members
    • Plenary sessions
      Voting results
    • Standing Committee
      Vice-Chairpersons
      Top-ranked: Wang Chen
      Secretary-General: Yang Zhenwu [zh]
      Members
    • Special committees
  • Presidential spouse: Peng Liyuan
    • Presidential Office [zh]
      Chief: Ding Xuexiang
  • State Council (Central People's Government)
    • Li Keqiang Cabinet II
      Vice-Premiers (list)
      State Councilors
      Secretary-General: Xiao Jie
      • Cabinet-level departments
    • General Office
      Secretary-General
      Deputy Secretary-Generals
    • State-owned Assets Supervision & Administration Commission
  • Central Military Commission (CMC)
    Chairman (supreme commander):
    Xi Jinping
    Vice-Chairmen:
    Members:
    Departments:
    1. Joint Staff Dept.
      Chief: Li Zuocheng
    2. Political Work Dept.
      Director: Miao Hua
    3. Discipline Inspection Commission
      Secretary: Zhang Shengmin
    National armed forces:
    People's Liberation Army
    Theater commands
    People's Armed Police
    China Coast Guard
    Militia
  • State Council
    Chairman: Li Keqiang
    Ministry of National Defense
    Ministry of Veterans Affairs
    State Administration for Sci., Tech. & Industry for National Defense
Military history
  • Military reform since 2015
    • CMC Leading Group for Military Reform
      Leader: Xi Jinping
  • Corruption in China
  • CPC Central Commission for Discipline Inspection (19th)
    Secretary: Zhao Leji
    Deputy Secretaries
    Secretary-General: Yang Xiaochao
  • National Supervisory Commission
    Director: Yang Xiaodu
  • Central Leading Group for Inspection Work
    Leader: Zhao Leji
  • Commission for Discipline Inspection of the Central Military Commission
    Secretary: Zhang Shengmin
  • Secretary: Guo Shengkun
  • Supreme People's Court
    People's Courts Judicial Police [zh]
  • Supreme People's Procuratorate
    Procurator-General: Zhang Jun
    People's Procuratorates Judicial Police [zh]
  • State Council
    • Ministry of Public Security
      Public Security Organs People's Police [zh]
    • Ministry of State Security
      Minister: Chen Wenqing
      State Security Organs People's Police [zh]
    • Ministry of Justice
      Judicial Administrative Organs People's Police [zh]
      • Bureau of Prison Administration [zh]
  • Judiciary of Hong Kong
  • Department of Justice
  • Security Bureau
    • Regular Disciplined Services
  • Judiciary of Macau
  • Secretariat for Security
    • Macau Security Force
      • Unitary Police Services [zh]
        • Judiciary Police [zh]
  • Central Leading Group for Propaganda and Ideology
  • Central Guidance Commission on Building Spiritual Civilization
    Director: Wang Huning
  • Central Publicity (Propaganda) Department
    Head: Huang Kunming
    • National Film Bureau [zh]
    • State Council Information Office
  • China Media Group
    • China Central Television
  • Xinhua News Agency
  • People's Daily
  • Censorship in China
  • Media of China
  • Internet in China
    • Internet censorship
  • Central Cyberspace Affairs Commission
    Deputy director: Li Keqiang
    • Cyberspace Administration of China
  • Central Coordination Group for Hong Kong and Macau Affairs
    Leader: Han Zheng
    • HK & Macau Affairs Office
      Director: Zhang Xiaoming
  • One country, two systems
  • Chief Executive: Lam Cheng Yuet-ngor
  • Politics of Hong Kong
  • Chief Executive: Chui Sai On
  • Cross-Strait relations
    • Political status of Taiwan
      • Republic of China on Taiwan
  • Central Leading Group for Taiwan Affairs
    Leader: Xi Jinping
    Deputy Leader: Wang Yang
    • Taiwan Affairs Office
      Director: Zhang Zhijun
  • Central Foreign Affairs Commission
    Director: Xi Jinping
    Deputy Director: Li Keqiang
    Secretary-General: Yang Jiechi
  • Ministry of Foreign Affairs
    Minister: Wang Yi (State Councilor)
    Spokespersons
    Diplomatic missions
  • Diplomatic missions of China / in China
  • Foreign aid from China / to China
  • Belt and Road Initiative
  • BRICS
  • Ministry of National Defense
  • Chinese passports (Hong Kong; Macau)
  • Visa requirements for Chinese citizens (Hong Kong, Macau)
  • Visa policy of China (Hong Kong; Macau)

The Great Firewall of China (GFW) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in the Internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic.[1]The effect includes: limiting access to foreign information sources, blocking foreign internet tools (e.g. Google search, Facebook, Twitter, Wikipedia,[2][3] and others) and mobile apps, andrequiring foreign companies to adapt to domestic regulations.[4][5]Besides censorship, the GFW has also influenced the development of China's internal internet economy by nurturing domestic companies[6]and reducing the effectiveness of products from foreign internet companies.[7]

The government statement suggests that the URL blocking and filtering system is required to filter out 'objectionable' content. The term hasn't been defined but past statements suggest they wish to block out pornographic, blasphemous content and content that could harm 'national security'. There's been no. Bogon Filtering Definition - Bogon filtering is the dismissal of bogus IP address components. A bogon is a type of URL reference that has been found to be typical in certain kinds of denial of service attacks, and atypical in legitimate network traffic. Common Methods Hackers Are Using To Crack Your Cellular Phone.

The Great Firewall is operated under the 'Golden Shield Project' by the Bureau of Public Information and Network Security Supervision.[nb 1][8]

As mentioned in the 'One country, two systems' principle, China's special administrative regions such as Hong Kong and Macau are not affected by the project, as SARs have their own governmental and legal systems and therefore enjoy a high degree of autonomy. Nevertheless, the U.S. State Department has reported that the central government authorities have closely monitored Internet use in these regions.[9]

The term Great Firewall of China is a portmanteau of firewall and the Great Wall of China, and was first used in print by Geremie Barmé in 1997.[10][11] The term started its use in Beijing in 1996 by Stephen Guerin of Redfish Group, a Beijing-based web consultancy. 1996 interviews of Guerin by CNN's Andrea Koppel and NPR's Marky Kay Magistad included Guerin discussing China's 'reversing the firewall'.[12][13]

  • 4Blocking methods

History[edit]

The political and ideological background of the GFW Project is considered to be one of Deng Xiaoping’s favorite sayings in the early 1980s: 'If you open the window, both fresh air and flies will be blown in.'[nb 2] The saying is related to a period of the economic reform of China that became known as the 'socialist market economy'. Superseding the political ideologies of the Cultural Revolution, the reform led China towards a market economy and opened up the market for foreign investors. Nonetheless, despite the economic freedom, values and political ideas of the Communist Party of China have had to be protected by 'swatting flies' of other unwanted ideologies.[14]

The Internet in China arrived in 1994,[15] as the inevitable consequence of and supporting tool for the 'socialist market economy'. Gradually, while Internet availability has been increasing, the Internet has become a common communication platform and tool for trading information.

The Ministry of Public Security took initial steps to control Internet use in 1997, when it issued comprehensive regulations governing its use. The key sections, Articles 4–6, are:

Individuals are prohibited from using the Internet to: harm national security; disclose state secrets; or injure the interests of the state or society. Users are prohibited from using the Internet to create, replicate, retrieve, or transmit information that incites resistance to the PRC Constitution, laws, or administrative regulations; promoting the overthrow of the government or socialist system; undermining national unification; distorting the truth, spreading rumors, or destroying social order; or providing sexually suggestive material or encouraging gambling, violence, or murder. Users are prohibited from engaging in activities that harm the security of computer information networks and from using networks or changing network resources without prior approval.[16]

In 1998, the Communist Party of China feared that the China Democracy Party (CDP) would breed a powerful new network that the party elites might not be able to control.[17] The CDP was immediately banned, followed by arrests and imprisonment.[18] That same year, the GFW project was started. The first part of the project lasted eight years and was completed in 2006. The second part began in 2006 and ended in 2008.On 6 December 2002, 300 people in charge of the GFW project from 31 provinces and cities throughout China participated in a four-day inaugural 'Comprehensive Exhibition on Chinese Information System'.[19] At the exhibition, many western high-tech products, including Internet security, video monitoring and human face recognition were purchased. It is estimated that around 30,000–50,000 police were employed in this gigantic project.[citation needed]

Fang Binxing

Fang Binxing is known for his substantial contribution to China's Internet censorship infrastructure, and has been dubbed 'Father of China's Great Fire Wall'.[20][21][22]

Origins of Chinese Internet law[edit]

Crack Url Filter Defintion

China's view of the internet is as 'Internet sovereignty': the notion that the Internet inside the country is part of the country's sovereignty and should be governed by the country.[7][23]

While the United States and several other western countries passed laws creating computer crimes beginning in the 1970s, China had no such legislation until 1997. That year, China's sole legislative body, the National People's Congress (NPC) passed CL97, a law that criminalizes 'cyber crimes' , which it divided into two broad categories: crimes that target computer networks and crimes carried out over computer networks. Behavior illegal under the latter category includes among many things the dissemination of pornographic material and the usurping of 'state secrets.'[citation needed]

Some Chinese judges were critical of CL97, calling it ineffective and unenforceable. However, the NPC claimed it intentionally left the law 'flexible' so that it could be open to future interpretation and development. Given the gaps in the law, the central government of China relies heavily on its administrative body, the State Council, to determine what falls under the definitions, and their determinations are not required to go through the NPC legislative process. As a result, the CPC has ended up relying heavily on state regulation to carry out CL97.[24]

The latter definition of online activities punishable under CL97, or 'crimes carried out over computer networks' is used as justification for the Great Firewall and can be cited when the government blocks any ISP, gateway connections, or any access to anything on the internet. The definition also includes using the internet to distribute information considered 'harmful to national security,' and using the internet to distribute information considered 'harmful to public order, social stability, and Chinese morality.' The central government relies heavily on its State Council regulators to determine what specific online behavior and speech fall under these definitions.[citation needed]

The reasons behind the Internet censorship in China include:

  • Social Control: The Internet is a means for freedom of speech, and dissemination of campaigns could lead to protests against the government.
  • Sensitive Content: To control information about the government in China.
  • Economic Protectionism: China prefers the use of local companies that are regulated by Chinese regulations, since they have more power over them. E.g. Baidu over Google.[citation needed]

Campaigns and crackdowns[edit]

As part of the Great Firewall, beginning in 2003 China started the Golden Shield Project , a massive surveillance and censoring system, the hardware for which was provided by mostly U.S. companies, including Cisco Systems. The project was completed in 2006 and is now carried out in buildings with machines manned by civilians and supervised by China's national police force, the Public Security Bureau (PSB). The main operating activities of the gatekeepers at the Golden Shield Project include monitoring domestic websites and email and searching for politically sensitive language and calls to protest. When damaging content is found, local PSB officials can be dispatched to investigate or make arrests. However, by late 2007 the Golden Shield Project proved to operate sporadically at best, as users had long adapted to internet blocking by using proxy servers, among other strategies, to make communications and circumnavigate to blocked content.[25]

In February 2008, the Chinese government announced 'Operation Tomorrow,' an effort to crack down on youth usage of internet cafés to play online games and view content declared illegal.[26][failed verification] Internet cafés, an extremely popular way of getting online in developing countries where fewer people can afford a personal computer, are regulated by the Chinese government and by local Chinese government officials. Minors (in China, those under the age of 18) are not allowed into Internet cafés, although this law is widely ignored and when enforced, has spurred the creation of underground 'Black Web Bars' visited by those underage. As of 2008 internet cafés were required to register every customer in a log when they used the internet there; these records may be confiscated by local government officials and the PSB. To illustrate local regulation of internet cafés, in one instance, a government official in the town of Gedong lawfully banned internet cafés from operating in the town because he believed them to be harmful to minors, who frequented them to play online games (including those considered violent) and surf the internet. However, internet cafés in this town simply went underground and most minors were not deterred from visiting them.[27]

In May 2015, China indefinitely blocked access to the Chinese-language Wikipedia.[28] In contrast (as of 2018), the English-language Wikipedia was blocked only rarely and intermittently.[29] China in 2017 discussed plans for its own version of Wikipedia.[30][31] As of May 2019, all language versions of Wikipedia have been blocked by the Chinese government.[32]

Blocking methods[edit]

Crack Url Filter Definition

Current methods[edit]

The system blocks content by preventing IP addresses from being routed through. It consists of custom DNS, proxy servers and other filtering mechanism. Researchers at the University of California, Davis, and at the University of New Mexico said that the censorship system is not a true firewall since banned material is sometimes able to pass through several routers or through the entire system without being blocked.[33]

The filtering mechanism may differ from one Chinese ISP to another, but tend to be as common as possible :

MethodDescription
IP range ban using Black holesThe Chinese firewall maintains a list of IP ranges that are automatically dropped (network black-holing).

The network location of routers effectively performing the drop seems to vary between Chinese internet providers,[34] but the general consensus is that packets are dropped when crossing an MPLS node, which are intensively used in the Chinese backbone internet. This would suggest that the list of dropped networks is likely maintained using LDP.

Network ranges in this list include Facebook ,Twitter and DropboxASN.

Because of the complexity to maintain a big, up-to-date banned network list, and because this method has proven not to be compatible with services using Content delivery networks, it is usually used as last resort and other blocking methods are preferred (such as filtering based on QoS).

DNS spoofing, filtering and redirectionOne part of the Chinese firewall is made of liar DNS servers and DNS hijackers returning incorrect IP addresses.[35] Studies seems to point out that this censorship is keyword-based.[36] Censors are likely maintaining two lists : a list of banned domain names, and a list of whitelisted domain names. Both lists very likely employ wildcard characters. Examples of banned websites include '*greatfire.org' or '*falungong*', examples of whitelisted websites include 'developer.android.google.cn'.

The list of banned/allowed keywords seems to be shared between multiple Chinese Internet providers, suggesting central management.[36] The exact DNS software and configuration seems local to each Chinese ISP however.[37]

Contrary to popular belief,[38] foreign DNS resolvers such as Google Public DNS IP address 8.8.8.8 are reported to work correctly inside the country;[39] however, these DNS servers are also subject to hijacking: DNS queries do reach the DNS server, but if the request matches a banned keyword, the firewall will inject a fake DNS reply before the legitimate DNS server replies.

Since the major Chinese firewall upgrade of 2015, IP addresses returned for blocked domains are random IPs within the range of a black-holed network.[40]

Typical circumvention methods include modifying the Hosts file, typing the IP address instead of the domain name in a Web browser or using DNS over TLS/HTTPS.

URL filtering using transparent proxiesThe Chinese firewall is made of transparent proxies filtering web traffic. These proxies scan the requested URI, the 'Host' Header and the content of the web page (for HTTP requests) or the Server Name Indication (for HTTPS requests) for target keywords.[41] If the firewall believe that the page should be blocked, a 403 error page may displayed instead, or the page may not load at all.

Studies have found multiple limitations to these proxies, such as the inability to inspect POST data in HTTP requests, to filter malformed HTTP requests,[42] or to inspect new protocols like webSocket.

Like for DNS filtering, this method is keyword based. Encrypting the Server Name Indication can be used to bypass this method of filtering and is currently in development by the IETF.[43]

Quality of service filteringSince 2012, the GFW is able to 'learn, filter and block' users based on traffic behavior, using Machine learning.[44] This method was originally developed for blocking VPNs and has been extended to become part of the standard filtering system of the GFW. The method works by mirroring all traffic (using a network tap) to a dedicated analytics unit, that will then deliver a score for each destination IP based on how suspicious the connection is. This score is then used to determine a packet loss rate to be implemented by routers of the Chinese firewall, resulting in a slowed connection on the client side. The method aims to slow down traffic to such an extent that the request times out on the client side, thus effectively having succeeded in blocking the service altogether.

It is believed that the analytics system is using Side-channel (such as the number of recently contacted IP addresses) to estimate how suspicious is a connection.[45] It is able to detect traffic patterns (such as SSH tunneling, VPN or Tor protocols), and can measure packets Entropy to detect encrypted-over-encrypted traffic (such as HTTPS over an SSL tunnel).

The analytics system is made of Dawning superclusters running Red Hat Enterprise Linux.

This system does not require human interaction to work, and is completely separated from DNS filtering and proxies systems.

Packet forging and TCP reset attacksThe Chinese firewall may arbitrary terminate TCP transmissions, using packet forging. The blocking is performed using a TCP reset attack. This attack does not block TCP requests nor TCP replies, but send a malicious TCP RST packet to the sender, simulating an end-of-connection.

Side channel analysis seems to indicate that TCP Reset are coming from an infrastructure collocated or shared with QoS filtering routers.[46] This infrastructure seems to update the scoring system : if a previous TCP connection is blocked by the filter, future connection attempts from both sides may also be blocked for short period of times (up to few hours).

An efficient circumvention method is to ignore the reset packet sent by the firewall.[47] a patch for FreeBSD has been developed for this purpose.[48]

Man-in-the-middle attacks with TLSThe Chinese National Intelligence Law theoretically allows the Chinese government to request and use the root certificate from any Chinese certificate authority,[49] such as CNNIC, to make MITM attacks with valid certificates. No MITM attack using a valid certificate has yet been formally detected, but this is largely due to the fact that entities having both will and sufficient capabilities to detect such attack (eg: Google, Mozilla, Opera, and other web-browsers makers) have little or no adoption in China.

Multiple TLS incidents also happened in the last decade, before the creation of the law:

On 26 Jan 2013, the GitHub SSL certificate was replaced with a self-signed certificate in China by the GFW.[50]

On 20 Oct 2014, iCloud SSL certificate was replaced with a self-signed certificate in China.[51] It is believed that the Chinese government discovered a vulnerability on Apple devices and was exploiting it[52]

On 20 Mar 2015, Google detected valid certificates for Google signed by CNNIC in Egypt. In response of this event, and after a deeper investigation, CNNIC certificate has been removed by some browsers.[53] Because of the removal being based on proofs and not suspicion, no other Chinese certificate authority has been removed from web browsers, and some have been added since then.[54]

This type of attack can be circumvented by websites implementing Certificate Transparency, or by using browser extensions.[55]

Other reported methods have included:

Crack
MethodDescription
Network enumerationIt has been reported that unknown entities within China, likely with deep packet inspection (DPI) capabilities, have initiated unsolicited TCP/IP connections to computers within the United States for the purported purpose of network enumeration of services, in particular TLS/SSL and Tor (anonymity network) services, with the aim of facilitating IP blocking.[56]

Effectiveness and impact[edit]

Some research evidence has indicated that suspicion of the Great Firewall in China and the sense that one is being surveilled online leads to chilled speech and self-censorship, which has been more effective at blocking internet content than the Great Firewall has been.[57]

The Great Firewall is a form of trade protectionism that has allowed China to grow its own internet giants: Tencent, Alibaba, and Baidu.[6][58] China has its own version of many foreign web properties, for example: Tencent Video (YouTube), Tencent Weibo (Twitter), Qzone (Facebook), WeChat (WhatsApp), Ctrip (Orbitz and others), Zhihu (Quora).[59] With nearly one quarter of the global internet population (700 million users), the internet behind the GFW can be considered a 'parallel universe' to the Internet that exists outside.[7]

Censored content[edit]

Mainland Chinese Internet censorship programs have censored Web sites that include (among other things):[citation needed]

  • Web sites belonging to 'outlawed' or suppressed groups, such as pro-democracy activists and Falun Gong.
  • News sources that often cover topics that are considered defamatory against China, such as police brutality, Tiananmen Square protests of 1989, freedom of speech, democracy sites.[60] These sites include Voice of America and the Chinese edition of BBC News.
  • Sites related to the Taiwanese government, media, or other organizations, including sites dedicated to religious content, and most large Taiwanese community websites or blogs.
  • Web sites that contain anything the Chinese authorities regard as obscenity or pornography.
  • Web sites relating to criminal activity.
  • Sites linked with the Dalai Lama, his teachings or the International Tibet Independence Movement.
  • Most blogging sites experience frequent or permanent outages.
  • Web sites deemed as subversive.
  • Other topics censored include: 2019 Hong Kong anti-extradition bill protests, Xinjiang re-education camps, Organ harvesting from Falun Gong practitioners in China, and more.

Blocked Web sites are indexed to a lesser degree, if at all, by some Chinese search engines. This sometimes has considerable impact on search results.[61]

According to The New York Times, Google has set up computer systems inside China that try to access Web sites outside the country. If a site is inaccessible, then it is added to Google China's blacklist.[62] However, once unblocked, the Web sites will be reindexed.Referring to Google's first-hand experience of the great firewall, there is some hope in the international community that it will reveal some of its secrets. Simon Davies, founder of London-based pressure group Privacy International, is now challenging Google to reveal the technology it once used at China's behest. 'That way, we can understand the nature of the beast and, perhaps, develop circumvention measures so there can be an opening up of communications.' 'That would be a dossier of extraordinary importance to human rights,' Davies says. Google has yet to respond to his call.[63][needs update]

Circumvention[edit]

Because the Great Firewall blocks destination IP addresses and domain names and inspects the data being sent or received, a basic censorship circumvention strategy is to use proxy nodes and encrypt the data. Most circumvention tools combine these two mechanisms.[64]

  • Proxy servers outside China can be used, although using just a simple open proxy (HTTP or SOCKS) without also using an encrypted tunnel (such as HTTPS) does little to circumvent the sophisticated censors.[64]
  • Companies can establish regional Web sites within China. This prevents their content from going through the Great Firewall of China; however, it requires companies to apply for local ICP licenses.
  • Onion routing and Garlic routing, such as I2P or Tor, can be used.[64]
  • Freegate, Ultrasurf, and Psiphon are free programs that circumvent the China firewall using multiple open proxies, but still behave as though the user is in China.[64]
  • VPNs (virtual private network) and SSH (secure shell) are the powerful and stable tools for bypassing surveillance technologies. They use the same basic approaches, proxies and encrypted channels, used by other circumvention tools, but depend on a private host, a virtual host, or an account outside of China, rather than open, free proxies.[64]
  • Open application programming interface (API) used by Twitter which enables to post and retrieve tweets on sites other than Twitter. 'The idea is that coders elsewhere get to Twitter, and offer up feeds at their own URLs—which the government has to chase down one by one.' says Jonathan Zittrain, co-director of Harvard's Berkman Center for Internet and Society.[65]
  • Reconfiguration at the end points of communication, encryption, discarding reset packets according to the TTL value (time to live) by distinguishing those resets generated by the Firewall and those made by end user, not routing any further packets to sites that have triggered blocking behavior.[66]

Unblocked websites[edit]

In 2008 the English-language BBC website (but not the Chinese language website) was unblocked.[67]

In 2017 China censored Google, including Google Maps. Alternate map applications are available.[68]

Exporting technology[edit]

Reporters Without Borders suspects that countries such as Cuba, Vietnam, Zimbabwe and Belarus have obtained surveillance technology from China, although the censorship in these countries is less stringent than in China.[69]

Even so, one can see the booming sector as well as one of the most dynamic. China is the second largest information and communication technology market, according to the International Data Corporation this market should reach US$844 billion by 2020. The market for big data is expected to become part of the industrial world of China by 2025. Regardless of the strictness the industrial internet architecture is already in place.[70]

Protest in China[edit]

Despite strict government regulations, the Chinese people continue to protest against their government's attempt to censor the Internet. The more covert protesters set up secure SSH and VPN connections using tools such as UltraSurf. They can also utilize the widely available proxies and virtual private networks to fanqiang (翻墙, 'climb over the wall'), or bypass the GFW. Active protest is not absent. Chinese people post their grievances online, and on some occasions, have been successful. In 2003, the death of Sun Zhigang, a young migrant worker, sparked an intense, widespread online response from the Chinese public, despite the risk of the government's punishment. A few months later, Premier Wen Jiabao abolished the Chinese law that led to the death of Sun. Ever since, dissent has regularly created turmoil on the Internet in China.[25] Also in January 2010, when Google announced that it will no longer censor its Web search results in China, even if this means it might have to shut down its Chinese operations altogether, many Chinese people went to the company's Chinese offices to display their grievances and offer gifts, such as flowers, fruits and cigarettes.[71]

Compliance[edit]

Chinese corporate statutes mandate that domestic and foreign internet companies doing business in Mainland China cooperate with its Great Firewall efforts. Companies are responsible for the content that they put on their websites as well as the content that users post on their website. This helps China promote self-censorship, making their censoring job less difficult, and allowing them to keep being a state that licenses all their media.[72]

The Chinese subsidiaries of American companies Yahoo!, Google, (Google services are blocked but Google still has a presence in China[73]) and Microsoft comply with this condition of operating there.[74] While the leadership of these companies regularly express their distaste for China's Great Firewall policies, in the same vein they consider it a necessary part of doing business in China and better than the alternative, which would be to not have any China business at all. Jerry Yang, a founder of Yahoo!, additionally has implied that the presence of foreign internet companies in China will eventually help bring about less internet restriction in China.[75]

Arguments against the GFW[edit]

Critics argue that the GFW is a consequence of China's paranoia of the potential that the Internet has of spreading opposition to their one-party rule. Other arguments given against China are that their method of having a limited Internet impedes freedom of speech and that it holds them down, economically speaking, by discouraging innovation, disapproving communication of important ideas and prohibiting firms the use of certain services that they use. It is also thought to be a detrimental approach for students and professors since they do not have access to resources which promote the sharing of work and ideas for a more comprehensive learning.[citation needed]

Another important argument against the GFW and fear that the critics have is that if other big countries begin following China's approach, the whole purpose of the creation of the Internet could be put in jeopardy. If like-minded countries are successful in imposing the same restrictions on their inhabitants and globalized online companies, then the free global exchange of information could cease to exist.[72]

Reaction of the United States[edit]

The United States Trade Representative's (USTR) “ National Trade Estimate Report ” in 2016 referred the China's digital Great Firewall: 'China's filtering of cross-border Internet traffic has posed a significant burden to foreign suppliers.'[76] Claude Barfield, the American Enterprise Institute's expert of International trade, suggested that the U.S. government should bring a case against the Firewall, a huge trade barrier, in the World Trade Organization in January 2017.[77] 8 of the 24 more trafficked websites in China have been blocked by The Great Firewall. This has created a burden to foreign suppliers who rely on these websites to sell their products or services.The lobby's 2016 business climate survey showed 79 percent of its members reported a negative impact on business due to internet censorship.[78]

According to Stephen Rosen, the GFW is reflective of the Chinese government's fear of civil disobedience or rebellion among the Chinese population against the Chinese Communist Party's rule:

If you want to know what people are worried about look at what they spend their money on. If you’re afraid of burglars you buy a burglar alarm. What are the Chinese spending their money on? We’re told from Chinese figures they’re spending on the People's Armed Police, the internal security force is about as big as they’re spending on the regular military. This whole great firewall of Chinese, this whole massive effort to control the internet, this effort to use modern information technology not to disseminate information, empowering individuals, but to make people think what you want them to think and to monitor their behavior so that you can isolate and suppress them. That’s because this is a regime which is fundamentally afraid of its own people. And it’s fundamentally hostile to them.[79]

See also[edit]

  • Fang Binxing, considered to be the Father of the Great Firewall of China
  • Great Cannon — A distributed denial-of-service attack tool co-located with the Great Firewall.
  • GreatFire — An organization monitoring the Great Firewall.
  • Great Wall of China — the physical analogy and the origin of the term, protecting China from foreign invasions in ancient times.
  • International Freedom of Expression Exchange – monitors Internet censorship in China

Notes[edit]

  1. ^Traditional Chinese: 公共信息網絡安全監察局; simplified Chinese: 公共信息网络安全监察局; pinyin: Gōnggòng xìnxī wǎngluò ānquán jiānchá jú) or (Chinese: 网监局; pinyin: wǎng jiān jú) for short
  2. ^Chinese: 打开窗户,新鲜空气和苍蝇就会一起进来。; pinyin: Dǎkāi chuānghù, xīnxiān kōngqì hé cāngying jiù huì yìqǐ jìnlái.
    There are several variants of this saying in Chinese, including '如果你打开窗户换新鲜空气,就得想到苍蝇也会飞进来。' and '打开窗户,新鲜空气进来了,苍蝇也飞进来了。'. Their meanings are the same.

References[edit]

  1. ^Mozur, Paul (13 September 2015). 'Baidu and CloudFlare Boost Users Over China's Great Firewall'. The New York Times.
  2. ^'Wikipedia founder defends decision to encrypt the site in China'. Retrieved 17 April 2018.
  3. ^Skipper, Ben (2015-12-07). 'China's government has blocked Wikipedia in its entirety again'. International Business Times UK. Retrieved 2018-05-02.
  4. ^Mozur, Paul; Goel, Vindu (5 October 2014). 'To Reach China, LinkedIn Plays by Local Rules'. The New York Times.
  5. ^Branigan, Tania (28 June 2012). 'New York Times launches website in Chinese language'. The Guardian.
  6. ^ abDenyer, Simon (23 May 2016). 'China's scary lesson to the world: Censoring the Internet works'. The Washington Post. Retrieved 5 September 2017.
  7. ^ abcRauhala, Emily (19 July 2016). 'America wants to believe China can't innovate. Tech tells a different story'. The Washington Post. Retrieved 5 September 2017.
  8. ^'How China's Internet Police Control Speech on the Internet'. Radio Free Asia. Retrieved 2018-08-15.
  9. ^'China (includes Tibet, Hong Kong, and Macau) - Hong Kong'. U.S. Department of State. Retrieved 2018-07-29.
  10. ^Lanfranco, Edward (September 9, 2005). 'The China Yahoo! welcome: You've got Jail!'. UPI.
  11. ^Barme, Geremie R.; Ye, Sang (6 January 1997). 'The Great Firewall of China'. Wired. Retrieved 29 December 2015.
  12. ^Koppel, Andrea (February 9, 1996). 'China Roadblocks the Internet'. CNN.
  13. ^Magistad, Mary Kay (May 14, 1996). 'Internet Cafe'. NPR.
  14. ^R. MacKinnon 'Flatter world and thicker walls? Blogs, censorship and civic discourse in China' Public Choice (2008) 134: p. 31–46, Springer
  15. ^'中国接入互联网'. chinanews.com. Retrieved 28 August 2013.
  16. ^'China and the Internet.', International Debates, 15420345, Apr2010, Vol. 8, Issue 4
  17. ^Goldman, Merle Goldman. Gu, Edward X. [2004] (2004). Chinese Intellectuals between State and Market. Routledge publishing. ISBN0415325978
  18. ^Goldsmith, Jack L.; Wu, Tim (2006). Who Controls the Internet?: Illusions of a Borderless World. New York: Oxford University Press. p. 91. ISBN0-19-515266-2.
  19. ^首屆「2002年中國大型機構信息化展覽會」全國31省市金盾工程領導雲集(in Chinese)
  20. ^http://chinadigitaltimes.net/china/fang-binxing/ ‘Father’ of China's Great Firewall Shouted Off Own Microblog
  21. ^''Father' of China's Great Firewall Shouted Off Own Microblog – China Real Time Report – WSJ'. Wall Street Journal. 20 December 2010. Retrieved 25 December 2010.
  22. ^'防火墙之父'北邮校长方滨兴微博遭网民'围攻' (in Chinese). Yunnan Information Times. 23 December 2010. Retrieved 20 May 2011.
  23. ^Denyer, Simon (May 23, 2016). 'China's scary lesson to the world: Censoring the Internet works'. Washington Post.
  24. ^Keith, Ronald; Lin, Zhiqiu (2006). New Crime in China. Routledge Taylor & Francis Group. pp. 217–225. ISBN0415314828.
  25. ^ abAugust, Oliver (2007-10-23). 'The Great Firewall: China's Misguided — and Futile — Attempt to Control What Happens Online'. Wired Magazine.
  26. ^'Website Test behind the Great Firewall of China'.
  27. ^Cody, Edward (2007-02-09). 'Despite a Ban, Chinese Youth Navigate to Internet Cafés'. The Washington Post. Retrieved 2015-04-01.
  28. ^Smith, Charlie (18 June 2015). 'We Had Our Arguments, But We Will Miss You Wikipedia'. Huffington Post. Retrieved 31 December 2018.
  29. ^'en.wikipedia.org in China'. GreatFire. Retrieved 31 December 2018.
  30. ^Toor, Amar (May 4, 2017). 'China is building its own version of Wikipedia'. The Verge.
  31. ^Watt, Louise (4 May 2017). 'China is launching its own Wikipedia – but only the government can contribute to it'. The Independent.
  32. ^'Search result not found: China bans Wikipedia in all languages'. Washington Post. Retrieved 2019-06-06.
  33. ^ScienceBlog.com. 'China's 'Eye on the Internet' a Fraud'. Retrieved 12 September 2007.
  34. ^'Deconstructing the Great Firewall of China'. Network Intelligence Blog ThousandEyes. 2016-03-08. Retrieved 2019-06-01.
  35. ^'how to unblock websites in China'. pcwizardpro.com. Retrieved 27 January 2018.
  36. ^ ab'The Great DNS Wall of China - Analysis of the DNS infrastructure'(PDF).
  37. ^DNS Servers of china unicom have a very recognizable signature ('Why query me?Your IP had been logged!'), indicating a common source code or configuration within this ISP.
  38. ^'8.8.8.8 goes pretty well in the Chinese market. (8 being a popular number.) I th... Hacker News'. news.ycombinator.com. Retrieved 2019-05-31.
  39. ^'r/China - DNS servers in China'. reddit. Retrieved 2019-05-31.
  40. ^'Solidot 防火长城使用有效IP投毒DNS,其中包括色情网站IP'. www.solidot.org. Retrieved 2019-06-13.
  41. ^'Internet Censorship in China'(PDF).
  42. ^'Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion, Page 4, section Protocol Message Interpretation'(PDF).
  43. ^'draft-ietf-tls-esni-03 - Encrypted Server Name Indication for TLS 1.3'. datatracker.ietf.org. Retrieved 2019-06-13.
  44. ^Arthur, Charles (14 December 2012). 'China tightens 'Great Firewall' internet control with new technology'. guardian.co.uk. London: The Guardian. Retrieved 2013-03-08.
  45. ^'My Experience With the Great Firewall of China'. blog.zorinaq.com. Retrieved 2019-06-01.
  46. ^'Ignoring TCP RST send by the firewall'(PDF).
  47. ^'zdnetasia.com'. zdnetasia.com. Retrieved 13 June 2011.
  48. ^'FreeBSD patch - ignore TCP RST'.
  49. ^'Cyber-security Law of the People's Republic of China'. www.dezshira.com. Retrieved 2019-06-01.
  50. ^'GitHub SSL replaced by self-signed certificate in China Hacker News'. News.ycombinator.com. Retrieved 2013-06-15.
  51. ^'Chinese MITM Attack on icloud'.
  52. ^'Apple CVE exploited by chinese government'.
  53. ^'TLS certificate blunder revisited – whither China Internet Network Information Center?'. nakedsecurity.sophos.com. Retrieved 2018-10-18.
  54. ^'1128392 - Add GDCA Root Certificate'. bugzilla.mozilla.org. Retrieved 2019-06-01.
  55. ^'Certificate Patrol - a psyced Firefox/Mozilla add-on'. patrol.psyced.org. Retrieved 2019-07-07.
  56. ^Wilde, Tim (7 January 2012). 'Knock Knock Knockin' on Bridges' Doors'. Tor Project.
  57. ^Fell, Andy (September 11, 2007). 'China's Eye on the Internet'. UC Davis.
  58. ^Chen, Te-Ping (28 January 2015). 'China Owns 'Great Firewall,' Credits Censorship With Tech Success'. WSJ.
  59. ^Millward, Steven (January 12, 2017). 'China's answer to Quora now worth a billion bucks'. Tech in Asia.
  60. ^Marquand, Robert (24 February 2006). 'China's media censorship rattling world image'. The Christian Science Monitor. Retrieved 22 May 2011.
  61. ^'controlling information: you can't get there from here – filtering searches'. The tank man. Frontline (pbs.org).
  62. ^Thompson, Clive (23 April 2006). 'Google's China Problem (and China's Google Problem)'. The New York Times. p. 8. Retrieved 22 May 2011.
  63. ^Will Google's help breach the great firewall of China? By: Marks, Paul, New Scientist, 02624079, 4/3/2010, Vol. 205, Issue 2754
  64. ^ abcde'Splinternet Behind the Great Firewall of China: The Fight Against GFW', Daniel Anderson, Queue, Association for Computing Machinery (ACM), Vol. 10, No. 11 (29 November 2012), doi:10.1145/2390756.2405036. Retrieved 11 October 2013.
  65. ^'Leaping the Great Firewall of China ', Emily Parker, Wall Street Journal, 24 March 2010. Retrieved 11 October 2013.
  66. ^'Ignoring the Great Firewall of China', Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson, PET'06: Proceedings of the 6th international conference on Privacy Enhancing Technologies, Springer-Verlag (2006), pages 20–35, ISBN3-540-68790-4, doi:10.1007/11957454_2. Retrieved 11 October 2013.
  67. ^'BBC website 'unblocked in China''. BBC News. 25 March 2008. Retrieved 22 May 2011.
  68. ^'百度地图'. map.baidu.com. Retrieved 2019-02-07.
  69. ^'Going online in Cuba: Internet under surveillance'(PDF). Reporters Without Borders. 2006. Archived from the original(PDF) on 2009-03-03.
  70. ^'China - Technology and ICT'. Export.gov. Retrieved 3 September 2018.
  71. ^Ramzy, Austin (13 April 2010). 'The Great Firewall: China's Web Users Battle Censorship'. Time. Retrieved 4 February 2011.
  72. ^ ab'The Great Firewall of China'. Bloomberg. Retrieved 2 April 2018.
  73. ^'Google Continues to Hire in China Even as Search Remains Blocked'. Bloomberg News. 5 September 2017.
  74. ^Shemel, Sidney; Krasilovsky, M. William (2007). This Business of Music. Billboard Books. p. 441. ISBN0823077233.
  75. ^Mills, Elinor (2006-03-08). 'Yang speaks on Yahoo's China policy'. CNET. Retrieved 2015-04-01.
  76. ^Barfield, Claude (April 29, 2016). 'China's Internet censorship: A WTO challenge is long overdue'. TechPolicyDaily.com. Retrieved 26 January 2017.
  77. ^Barfield, Claude (January 25, 2017). 'China bans 8 of the world's top 25 websites? There's still more to the digital trade problem'. American Enterprise Institute. Retrieved 26 January 2017.
  78. ^Martina, Paul. 'U.S. says China internet censorship a burden for businesses'. Reuters. Reuters. Retrieved 23 March 2018.
  79. ^'Stephen Rosen interview with Bill Kristol' (30 November 2018), Conversations With Bill Kristol, transcript

Further reading[edit]

  • Nilekani, Nandan, 'Data to the People: India's Inclusive Internet', Foreign Affairs, vol. 97, no. 5 (September / October 2018), pp. 19–26.
  • Segal, Adam, 'When China Rules the Web: Technology in Service of the State', Foreign Affairs, vol. 97, no. 5 (September / October 2018), pp. 10–14, 16–18.

External links[edit]

Look up firewall in Wiktionary, the free dictionary.
  • Quotations related to Great Firewall at Wikiquote
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Great_Firewall&oldid=909668999'
Posted :