The Great Firewall (GFW; ) is the combination of legislative actions and technologies enforced by the
People's Republic of China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
to regulate the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
domestically. Its role in
internet censorship in China
The People's Republic of China (PRC) internet censorship, censors both the publishing and viewing of online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of ...
is to block access to selected foreign websites and to slow down cross-border internet traffic. The Great Firewall operates by checking
transmission control protocol
The Transmission Control Protocol (TCP) is one of the main communications protocol, protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, th ...
(TCP) packets for keywords or sensitive words. If the keywords or sensitive words appear in the TCP packets, access will be closed. If one link is closed, more links from the same machine will be blocked by the Great Firewall. The effect includes: limiting access to foreign information sources, blocking popular foreign websites (e.g.
Google Search
Google Search (also known simply as Google or Google.com) is a search engine operated by Google. It allows users to search for information on the World Wide Web, Web by entering keywords or phrases. Google Search uses algorithms to analyze an ...
,
Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
,
Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
,
Wikipedia
Wikipedia is a free content, free Online content, online encyclopedia that is written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and the wiki software MediaWiki. Founded by Jimmy Wales and La ...
, and others) and mobile apps, and requiring foreign companies to adapt to domestic regulations.
Besides censorship, the Great Firewall has also influenced the development of China's internal internet economy by giving preference to domestic companies
and reducing the effectiveness of products from foreign internet companies.
The techniques deployed by the Chinese government to maintain control of the Great Firewall can include modifying search results for terms, such as they did following
Ai Weiwei
Ai Weiwei ( ; , IPA: ; born 28 August 1957) is a Chinese contemporary artist, documentarian, and activist. Ai grew up in the far northwest of China, where he lived under harsh conditions due to his father's exile. As an activist, he has been ...
’s arrest, and petitioning global conglomerates to remove content, as happened when they petitioned
Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
to remove the
''Quartz'' business news publication’s app from its Chinese App Store after reporting on the
2019–2020 Hong Kong protests
The 2019–2020 Hong Kong protests (also known by other names) were a series of demonstrations against the Hong Kong government's introduction of a bill to amend the Fugitive Offenders Ordinance in regard to extradition. It was the largest ...
.
The Great Firewall was formerly operated by the
SIIO, as part of the
Golden Shield Project
The Golden Shield Project (), also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the e-government of the People's Republic of China. This project i ...
. Since 2013, the firewall is technically operated by the
Cyberspace Administration of China
The Cyberspace Administration of China (CAC; ) is the national internet regulator and censor of the People's Republic of China.
The agency was initially established in 2011 by the State Council as the State Internet Information Office (SIIO) ...
(CAC), which is the entity in charge of translating the
Chinese Communist Party
The Communist Party of China (CPC), also translated into English as Chinese Communist Party (CCP), is the founding and One-party state, sole ruling party of the People's Republic of China (PRC). Founded in 1921, the CCP emerged victorious in the ...
's
ideology
An ideology is a set of beliefs or values attributed to a person or group of persons, especially those held for reasons that are not purely about belief in certain knowledge, in which "practical elements are as prominent as theoretical ones". Form ...
and policy into technical specifications.
As mentioned in the "
one country, two systems
"One country, two systems" is a constitutional principle of the People's Republic of China (PRC) describing the governance of the special administrative regions of Hong Kong and Macau.
Deng Xiaoping developed the one country, two systems ...
" principle, China's
special administrative regions (SARs) such as
Hong Kong
Hong Kong)., Legally Hong Kong, China in international treaties and organizations. is a special administrative region of China. With 7.5 million residents in a territory, Hong Kong is the fourth most densely populated region in the wor ...
and
Macau
Macau or Macao is a special administrative regions of China, special administrative region of the People's Republic of China (PRC). With a population of about people and a land area of , it is the most List of countries and dependencies by p ...
are not affected by the firewall, as SARs have their own governmental and legal systems and therefore enjoy a higher degree of autonomy. Nevertheless, the
U.S. State Department has reported that the central government authorities have closely monitored Internet use in these regions, and Hong Kong's
National Security Law has been used to block websites documenting
anti-government protests.
Provincial governments in parts of China, such as
Henan Province
Henan; alternatively Honan is a province in Central China. Henan is home to many heritage sites, including Yinxu, the ruins of the final capital of the Shang dynasty () and the Shaolin Temple. Four of the historical capitals of China, Luo ...
, run their own versions of the firewall.
The term ''Great Firewall of China'' is a combination of the word
firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spre ...
with the
Great Wall of China
The Great Wall of China (, literally "ten thousand ''li'' long wall") is a series of fortifications in China. They were built across the historical northern borders of ancient Chinese states and Imperial China as protection against vario ...
. The phrase "Great Firewall of China" was first used in print by Australian
sinologist
Sinology, also referred to as China studies, is a subfield of area studies or East Asian studies involved in social sciences and humanities research on China. It is an academic discipline that focuses on the study of the Chinese civilizatio ...
Geremie Barmé
Geremie R. Barmé (born 1954) is an Australian sinologist and film-maker on modern and traditional China. He was formerly Director, Australian Centre on China in the World and Chair Professor of Chinese History at Australian National Universit ...
in 1997.
History
A favorite saying of
Deng Xiaoping
Deng Xiaoping also Romanization of Chinese, romanised as Teng Hsiao-p'ing; born Xiansheng (). (22 August 190419 February 1997) was a Chinese statesman, revolutionary, and political theorist who served as the paramount leader of the People's R ...
's in the early 1980s, "If you open the window, both fresh air and flies will be blown in", is considered to be the political and ideological basis of the GFW Project.
[.]
There are several variants of this saying in Chinese, including "如果你打开窗户换新鲜空气,就得想到苍蝇也会飞进来。" and "打开窗户,新鲜空气进来了,苍蝇也飞进来了。". Their meanings are the same. The saying is related to a period of the economic reform of China that became known as the "
socialist market economy
The socialist market economy (SME) is the economic system and model of economic development employed in the China, People's Republic of China. The system is a market economy with the predominance of public ownership and State-owned enterpr ...
". Superseding the political ideologies of the
Cultural Revolution
The Cultural Revolution, formally known as the Great Proletarian Cultural Revolution, was a Social movement, sociopolitical movement in the China, People's Republic of China (PRC). It was launched by Mao Zedong in 1966 and lasted until his de ...
, the reform led China towards a
market economy
A market economy is an economic system in which the decisions regarding investment, production, and distribution to the consumers are guided by the price signals created by the forces of supply and demand. The major characteristic of a mark ...
and opened up the market for foreign investors. Nonetheless, despite the economic freedom, values and political ideas of the Chinese Communist Party (CCP) have had to be protected by "swatting flies" of other unwanted ideologies.
The
internet in China
China has been on the Internet intermittently since May 1989 and on a permanent basis since 20 April 1994, although with heavily Internet censorship in China, censored access. In 2008, China became the country with the largest population on th ...
arrived in 1994, as the inevitable consequence of and supporting tool for a "socialist market economy". Gradually, while Internet availability has been increasing, the Internet has become a common communication platform and tool for trading information.
The Chinese government's control over the Internet began in 1996 when Premier
Li Peng
Li Peng (; 20 October 1928 – 22 July 2019) was a Chinese politician who served as the 4th premier of China from 1987 to 1998, and as the chairman of the Standing Committee of the National People's Congress, China's top legislative body, from ...
signed State Council Order No. 195, issuing the "Interim Regulations on the Management of International Networking of Computer Information Networks". Article 6 of the Regulations states: "Computer information networks that directly connect to the international network must use the international entry and exit channels provided by the Ministry of Posts and Telecommunications’ national public telecommunications network. No unit or individual may establish or use other channels to connect to the international network on their own." This regulation was later widely used to punish "climbing over the firewall".
The
Ministry of Public Security
Ministry of Public Security can refer to:
* Ministry of Justice and Public Security (Brazil)
* Ministry of Public Security of Burundi
* Ministry of Public Security (Chile)
* Ministry of Public Security (China)
* Ministry of Public Security of Co ...
took initial steps to control Internet use in 1997, when it issued comprehensive regulations governing its use. The key sections, Articles 4–6, are:
In 1998, the Chinese Communist Party feared that the
China Democracy Party (CDP) would breed a powerful new network that CCP elites might not be able to control. The CDP was immediately banned, followed by arrests and imprisonment. That same year, the GFW project was started. The first part of the project lasted eight years and was completed in 2006. The second part began in 2006 and ended in 2008. On 6 December 2002, 300 people in charge of the GFW project from 31
provinces
A province is an administrative division within a country or state. The term derives from the ancient Roman , which was the major territorial and administrative unit of the Roman Empire's territorial possessions outside Italy. The term ''provi ...
and
cities
A city is a human settlement of a substantial size. The term "city" has different meanings around the world and in some places the settlement can be very small. Even where the term is limited to larger settlements, there is no universally agree ...
throughout China participated in a four-day inaugural "Comprehensive Exhibition on Chinese Information System". At the exhibition, many western high-tech products, including
Internet security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
,
video monitoring and human
face recognition
A facial recognition system is a technology potentially capable of matching a human face from a digital image or a Film frame, video frame against a database of faces. Such a system is typically employed to authenticate users through ID verif ...
were purchased. It is estimated that around 30,000–50,000 police were employed in this gigantic project.
Fang Binxing is known for his substantial contribution to
China's Internet censorship infrastructure, and has been dubbed "Father of China's Great Fire Wall".
Origins of Chinese Internet law
China's view of the Internet is one of "
Internet sovereignty": the notion that the Internet inside the country is part of the country's sovereignty and should be governed by the country.
[
While the United States and several other western countries passed laws creating computer crimes beginning in the 1970s, China had no such legislation until 1997. That year, China's sole legislative body – the ]National People's Congress
The National People's Congress (NPC) is the highest organ of state power of the People's Republic of China (PRC). The NPC is the only branch of government in China, and per the principle of unified power, all state organs from the Sta ...
(NPC) – passed CL97, a law that deals with cyber crimes, which it divided into two broad categories: crimes that target computer networks, and crimes carried out over computer networks. Behavior illegal under the latter category includes, among many things, the dissemination of pornographic
Pornography (colloquially called porn or porno) is sexually suggestive material, such as a picture, video, text, or audio, intended for sexual arousal. Made for consumption by adults, pornographic depictions have evolved from cave paintings ...
material, and the usurping of " state secrets."
Some Chinese judges were critical of CL97, calling it ineffective and unenforceable. However, the NPC claimed that it intentionally left the law "flexible" so that it could be open to future interpretation and development. Given the gaps in the law, the central government of China relies heavily on its administrative body, the State Council, to determine what falls under the definitions, and their determinations are not required to go through the NPC legislative process. As a result, the Chinese Communist Party has ended up relying heavily on state regulation to carry out CL97.
The latter definition of online activities punishable under CL97, or "crimes carried out over computer networks", is used as justification for the Great Firewall, and can be cited when the government blocks any ISP, gateway connections, or any access to anything on the internet. The definition also includes using the internet to distribute information considered "harmful to national security," and using the internet to distribute information considered "harmful to public order, social stability, and Chinese morality." The central government relies heavily on its State Council regulators to determine what specific online behavior and speech fall under these definitions.
The reasons behind the Internet censorship in China include:
* Social control: the Internet is a means for freedom of speech, and dissemination of campaigns could lead to protests against the government.
* Sensitive content: to control information about the government in China.
* Economic protectionism: China prefers the use of local companies that are regulated by Chinese regulations, since they have more power over them, e.g. Baidu
Baidu, Inc. ( ; ) is a Chinese multinational technology company specializing in Internet services and artificial intelligence. It holds a dominant position in China's search engine market (via Baidu Search), and provides a wide variety of o ...
over Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
.
Campaigns and crackdowns
As part of the Great Firewall, beginning in 2003, China started the Golden Shield Project
The Golden Shield Project (), also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the e-government of the People's Republic of China. This project i ...
, a massive surveillance and censoring system, the hardware for which was provided by mostly U.S. companies, including Cisco Systems
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develops, m ...
. The project was completed in 2006, and is now carried out in buildings with machines operated by civilians and supervised by China's national police force, the Public Security Bureau (PSB). The main operating procedures of the gatekeepers at the Golden Shield Project include monitoring domestic websites, email, and searching for politically sensitive language and calls to protest. When damaging content is found, local PSB officials can be dispatched to investigate or make arrests. However, by late 2007, the Golden Shield Project proved to operate sporadically at best, as users had long adapted to internet blocking
On the Internet, a block is a technical measure intended to restrict access to information or resources. Blocking and its inverse, unblocking, may be implemented by the owners of computers using software.
Blocking may also refer to denying ac ...
by using proxy servers, among other strategies, to make communications and circumnavigate to blocked content.
Internet cafés
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, publ ...
, an extremely popular way of getting online in developing countries and where fewer people can afford a personal computer, are regulated by the Chinese government and by local Chinese government officials. Minors (in China, those under the age of 18) are not allowed into Internet cafés, although this law is widely ignored, and when enforced, has spurred the creation of underground "Black Web Bars" visited by those underage. As of 2008, internet cafés were required to register every customer in a log when they used the internet there. These records may be confiscated by either local government officials or the PSB. To illustrate local regulation of internet cafés, in one instance, a government official in the town of Gedong lawfully banned internet cafés from operating in the town because he believed them to be harmful to minors, who frequented them to play online games (including those considered violent) and surf the internet. However, internet cafés in this town simply went underground, and most minors were not deterred from visiting them.
In May 2015, China indefinitely blocked access to the Chinese-language Wikipedia. In 2017, China discussed plans for its own version of Wikipedia. As of May 2019, all language versions of Wikipedia have been blocked by the Chinese government.
Blocking methods
The Great Firewall is mainly deployed at three large internet exchanges in Beijing, Shanghai, and Guangzhou.
Active filtering
One function of the Chinese firewall is to selectively prevent content from being accessed. It is mostly made of Cisco, Huawei, and Semptian hardware. Not all sensitive content gets blocked; in 2007, scholar Jedidiah R. Crandall and others argued that the main purpose is not to block 100%, but rather to flag and to warn, in order to encourage self-censorship. An illustrative but incomplete list of tactics includes:
Active probing
In addition to previously discussed techniques, the CAC is also using active probing in order to identify and block network services that would help escaping the firewall. Multiple services such as Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
or VPN
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not c ...
providers reported receiving unsolicited TCP/IP connections shortly after legitimate use, for the purported purpose of network enumeration of services, in particular TLS/ SSL and Tor services, with the aim of facilitating IP blocking. For example, shortly after a VPN request is issued by a legitimate Chinese VPN client and passes outbound though the Great Firewall to a hidden VPN IP, the Great Firewall may detect the activity and issue its own active probe to verify the nature of the previously unknown VPN IP and, if the probe confirms the IP is part of a blacklisted VPN, blacklist the IP. This attack can be circumvented with the Obfs4 protocol, which relies on an out-of-band shared secret
In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. This usually refers to the key of a symmetric cryptosystem. The shared secret can be a PIN code, a password, a passphrase, a b ...
.
Proxy distribution
The Great Firewall scrapes the IPs of Tor and VPN servers from the official distribution channels, and enumerates them. The strategy to resist this attack is to limit the quantity of proxy IPs revealed to each user and making it very difficult for users to create more than one identity. Academics have proposed solutions such as Salmon, a volunteer-based proxy network designed to combat censorship. Dynamic IPs are quite effective to flush out from blacklists.
Goals, impact and resistance
Goal of the Firewall
Article 15 of a 20 September 2000 document from the Chinese State Council, posted by the Xinhua News Agency, lists 9 categories of information which should be censored
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
, blocked, or filtered from access to the citizens using the internet within China:
# Opposing the basic principles as they are confirmed in the Constitution.
# Jeopardizing the security of the nation, divulging state secrets, subverting state power, or jeopardizing the integrity of the nation's unity
# Harming the honor or the interests of the nation
# Inciting hatred against peoples, racism against peoples, or disrupting the solidarity of peoples
# Disrupting national policies on religion, propagating evil cults and feudal superstitions
# Spreading rumors, disturbing social order or disrupting social stability
# Spreading obscenity, pornography, gambling, violence, murder, terror, or abetting the commission of a crime
# Insulting or defaming third parties, infringing on the legal rights and interests of third parties
# Containing any other content prohibited by law or administrative rules
To filter this content, the Chinese government not only uses its own blocking methods, but also heavily relies on internet companies, such as ISPs, social media operators such as Weibo, and others to actively censor their users. This results in private companies censoring their own platform for filtered content, forcing Chinese internet users to use websites not hosted in China to access this information. Much of this information is related to sensitive topics.[�]
FORBIDDEN FEEDS: Government Controls on Social Media in China
," ''PEN America''. (March 13, 2018) p. 24. The Great Firewall's goal is perceived by the Chinese Communist Party as helping to protect the Chinese population by preventing users from accessing these foreign websites which, in their opinion, host content which would be 'spiritual pollution', as well as information about these sensitive topics. These topics include:
* Names of paramount leader
Paramount leader () is an informal term for the most important Supreme leader, political figure in the China, People's Republic of China (PRC). The paramount leader typically controls the Chinese Communist Party (CCP) and the People's Liberatio ...
s, such as Xi Jinping
Xi Jinping, pronounced (born 15 June 1953) is a Chinese politician who has been the general secretary of the Chinese Communist Party (CCP) and Chairman of the Central Military Commission (China), chairman of the Central Military Commission ...
and Deng Xiaoping
Deng Xiaoping also Romanization of Chinese, romanised as Teng Hsiao-p'ing; born Xiansheng (). (22 August 190419 February 1997) was a Chinese statesman, revolutionary, and political theorist who served as the paramount leader of the People's R ...
* Political movements and protests
* Falun Gong
Falun Gong, also called Falun Dafa, is a new religious movement founded by its leader Li Hongzhi in China in the early 1990s. Falun Gong has its global headquarters in Dragon Springs, a compound in Deerpark, New York, United States, near t ...
and other spiritual groups
* The Tiananmen Square Massacre
The Tiananmen Square protests, known within China as the June Fourth Incident, were student-led demonstrations held in Tiananmen Square in Beijing, China, lasting from 15 April to 4 June 1989. After weeks of unsuccessful attempts between t ...
* The Xinjiang internment camps
The Xinjiang internment camps, officially called vocational education and training centers by the government of the People's Republic of China, are internment camps operated by the government of Xinjiang and the Chinese Communist Party P ...
* Discussions of Tibetan Independence
A 2020 study found that the Great Firewall blocks approximately 311,000 domains.
Impact on people in China
The Cybersecurity Law behind the firewall is targeted at helping increase internet user privacy, increase protections on personal data, and making companies more responsible for monitoring bad actors, in hopes to make the Internet a safer place for Chinese citizens. Despite this, there have been growing criticisms that the actions of the Chinese government have only hurt Chinese free speech, due to increased censorship, and lack of non-sanctioned sources of information, such as Wikipedia and many English news sources. This has resulted in reports of some cases of legal persecution of those charged with spreading this information.
The Chinese government itself does legally support free speech; article 35 of the Constitution of China
The Constitution of the People's Republic of China is the supreme law of the People's Republic of China (PRC). In September 1949, the first plenary session of the Chinese People's Political Consultative Conference adopted the Common Progr ...
states that "citizens of the People's Republic of China enjoy freedom of speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
, of the press, of assembly, of association, of procession, and of demonstration." In recent decades, many criticisms of the Chinese government found that some of these laws are often abused. A study by PEN America
PEN America (formerly PEN American Center), founded in 1922, and headquartered in New York City, is a 501(c)(3) nonprofit organization whose goal is to raise awareness for the protection of free expression in the United States and worldwide th ...
claimed that "Some of the government's most rights-abusive laws are aimed at criminalizing free speech that — in the eyes of the government — encourages subversion, separatism, or rejection of the State’s authority."
Censorship of sensitive topics in China has also been easier for the government because of the firewall and its filtering. Because the monitoring of social media and chat apps in China presents a possibility of punishment for a user, the discussion of these topics is now limited to the thought of the Chinese Communist Party, or one's home and private spaces, reducing the chance for information about these topics to spread, reducing any threat of protest against the CCP. According to Yaqiu Wang, a prominent human rights researcher, there was a time in China where the internet provided a method for Chinese citizens to learn about the sensitive topics the government had censored in the news, through access to international news reports and media coverage. She claims that, in the past 10 years, it has been increasingly difficult to access second opinions on events, meaning that students rarely have the opportunity to learn diverging viewpoints — only the "correct" thought of the CCP.
Economic impacts
The Great Firewall has also allowed China to develop its own major internet services, such as Tencent
Tencent Holdings Ltd. ( zh, s=腾讯, p=Téngxùn) is a Chinese Multinational corporation, multinational technology Conglomerate (company), conglomerate and holding company headquartered in Shenzhen. It is one of the highest grossing multimed ...
, Alibaba, Baidu
Baidu, Inc. ( ; ) is a Chinese multinational technology company specializing in Internet services and artificial intelligence. It holds a dominant position in China's search engine market (via Baidu Search), and provides a wide variety of o ...
, Renren
The Renren Network ( zh, s=人人网, hp=Rénrénwǎng, l=Everyone's Network), formerly known as the Xiaonei Network ( zh, c=校内网, hp=Xiàonèiwǎng, l=on-campus network, links=no), was a Chinese social networking service similar to Facebo ...
, Youku
Youku Tudou Inc. (formerly Youku Inc.), doing business as Youku (), is a video streaming service and former video sharing website based in Beijing, China. It operates as a subsidiary of Alibaba Group Holding Limited.
Youku has its headquart ...
, and Weibo
Weibo (), or Sina Weibo (), is a Chinese microblogging ( weibo) website. Launched by Sina Corporation on 14 August 2009, it is one of the biggest social media platforms in China, with over 582 million monthly active users (252 million daily ac ...
. China has its own version of many foreign web properties, for example: Bilibili
Bilibili (stylized in all lowercase), nicknamed B Site, is a Chinese online video sharing website based in Shanghai where users can submit, view, and add overlaid commentary on videos.
Bilibili hosts videos on various themes, including ...
and Tencent Video
Tencent Video ( zh, s=腾讯视频, p=Téngxùn Shìpín, also called WeTV outside of China) is a Chinese video streaming website owned by Tencent, launched in April 2011. As of October 2022, Tencent Video has 120 million paid subscribers, maki ...
(YouTube), Weibo
Weibo (), or Sina Weibo (), is a Chinese microblogging ( weibo) website. Launched by Sina Corporation on 14 August 2009, it is one of the biggest social media platforms in China, with over 582 million monthly active users (252 million daily ac ...
(Twitter), Moments and Qzone (Facebook), WeChat
WeChat or Weixin in Chinese ( zh, c=微信, p=Wēixìn , l=micro-message) is an instant messaging, social media, and mobile payment mobile app, app developed by Tencent. First released in 2011, it became the world's largest standalone mobile a ...
(WhatsApp), Ctrip (Orbitz and others), and Zhihu
Zhihu () is a Quora-type question and answer site and news aggregator. Originally based in Chengdu and with creators from Sichuan, China, the website launched on January 26, 2011. The number of registered users on Zhihu exceeded 10 million by the ...
(Quora
Quora is an American social question-and-answer website and online knowledge market headquartered in Mountain View, California. It was founded on June 25, 2009, and made available to the public on June 21, 2010. Users can post questions, answ ...
). With nearly one quarter of the global internet population (700 million users), the internet behind the GFW can be considered a "parallel universe" to the Internet that exists outside.
Resistance
While the Great Firewall has had an impact on Chinese citizens' ability to use the internet to find information about sensitive topics about the Chinese Communist Party, it has not completely stopped them from doing so. The firewall itself has caused much frustration amongst both individuals and internationally operating companies in China, many of whom have turned to VPNs, speaking in codes, and other methods to retain their access to the international internet.
Circumvention
Methods for bypassing the firewall
Because the Great Firewall blocks destination IP addresses and domain names and inspects the data being sent or received, a basic censorship circumvention strategy is to use proxy nodes and encrypt the data. Bypassing the firewall is known as (翻墙, "climb over the wall"), and most circumvention tools combine these two mechanisms:["Splinternet Behind the Great Firewall of China: The Fight Against GFW"]
, Daniel Anderson, ''Queue'', Association for Computing Machinery (ACM), Vol. 10, No. 11 (29 November 2012), . Retrieved 11 October 2013.
* Proxy servers outside China can be used, although using just a simple open proxy (HTTP or SOCKS) without also using an encrypted tunnel (such as HTTPS) does little to circumvent the sophisticated censors.[
* Freegate, Ultrasurf, Psiphon, and ]Lantern
A lantern is a source of lighting, often portable. It typically features a protective enclosure for the light sourcehistorically usually a candle, a oil lamp, wick in oil, or a thermoluminescence, thermoluminescent Gas mantle, mesh, and often a ...
are free programs designed and experienced with circumventing the China firewall using multiple open proxies.
* VPN
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not c ...
s (virtual private networks) are one of the most popular tools used by Westerners for bypassing censorship technologies. They use the same basic approaches, proxies, and encrypted channels used by other circumvention tools, but depend on a private host, a virtual host, or an account outside of China, rather than open, free proxies.[
* ]Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
partially can be used in China. Since 2010, almost all bridges at TorProject.org are blocked through proxy distribution. Tor still functions in China using Snowflake, independently published Obfs4 bridges and meek.
* I2P or garlic routing
Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis while also increasing the speed of data transfer.
Michael J. Freedman defined garlic routi ...
is useful when properties similar to Tor's anonymity are needed. Due to I2P being much less popular than Tor, it has faced little to no blocking attempts.
In 2017, the Chinese government declared unauthorized VPN services illegal, requiring VPN providers to obtain state approval. Although China restricts VPNs, they remain widely used by private individuals. State-owned enterprises or state institutions also use VPNs for official work. The Chinese government has authorized several official VPN providers. Those who develop or sell their own VPNs potentially face years in prison.
Non-proxy circumvention strategies include:
* Using encrypted DNS may bypass blocking of a few sites including TorProject and all of GitHub, which may be used to obtain further circumvention. In 2019 Firefox released an update to make it easy to enable DNS over HTTPS. Despite DNS over encryption, the majority of services remain blocked by IP.
* Ignoring TCP reset packets sent by the GFW. Distinguishing them by the TTL value (time to live), and not routing any further packets to sites that have triggered blocking behavior.
Known blocked methods
* The OpenVPN
OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server appl ...
protocol is detected and blocked. Connections not using symmetric keys or using "tls-auth" are blocked at handshake, and connections using the new "tls-crypt" option are detected and throttled (under 56 kbit/s) by the QoS filtering system.
* GRE tunnels and protocols that use GRE (e.g., PPTP) are blocked.
* TLS, the Great Firewall can identify the difference between HTTPS TLS and other implementations by inspecting the handshake parameters.
Outside China
Off-target incidents
In 2010, a root name server
A root name server is a name server for the root zone of the Domain Name System (DNS) of the Internet. It directly answers requests for records in the root zone and answers other requests by returning a list of the authoritative name servers for ...
run by Netnod in China started returning poisoned DNS results to global users, preventing users in Chile
Chile, officially the Republic of Chile, is a country in western South America. It is the southernmost country in the world and the closest to Antarctica, stretching along a narrow strip of land between the Andes, Andes Mountains and the Paci ...
and the U.S. from accessing sites such as Facebook. The server was shut down to stop the poisoning.
In 2014, two-thirds of China's DNS infrastructure began resolving unrelated domains to 65.49.2.178, an address owned by the US-based Dynamic Internet Technology, Inc., resulting in widespread internet outage in China. No damage to DIT services were reported despite what amounts to an accidental DDoS
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
. While some sources attribute this incident to GFW's DNS poisoning, others (mostly quoting Chinese sources) speculate this incident was somehow caused by DIT themselves.
Exporting Great Firewall technology
Reporters Without Borders
Reporters Without Borders (RWB; ; RSF) is an international non-profit and non-governmental organisation, non-governmental organization headquartered in Paris, which focuses on safeguarding the right to freedom of information. It describes its a ...
suspects that countries such as Cuba
Cuba, officially the Republic of Cuba, is an island country, comprising the island of Cuba (largest island), Isla de la Juventud, and List of islands of Cuba, 4,195 islands, islets and cays surrounding the main island. It is located where the ...
, Iran
Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, Vietnam
Vietnam, officially the Socialist Republic of Vietnam (SRV), is a country at the eastern edge of mainland Southeast Asia, with an area of about and a population of over 100 million, making it the world's List of countries and depende ...
, Zimbabwe
file:Zimbabwe, relief map.jpg, upright=1.22, Zimbabwe, relief map
Zimbabwe, officially the Republic of Zimbabwe, is a landlocked country in Southeast Africa, between the Zambezi and Limpopo Rivers, bordered by South Africa to the south, Bots ...
, and Belarus
Belarus, officially the Republic of Belarus, is a landlocked country in Eastern Europe. It is bordered by Russia to the east and northeast, Ukraine to the south, Poland to the west, and Lithuania and Latvia to the northwest. Belarus spans an a ...
have obtained surveillance technology from China, although the censorship in these countries is less stringent than in China.
Since at least 2015, the Russian Roskomnadzor
The Federal Service for Supervision of Communications, Information Technology and Mass Media, abbreviated as ''Roskomnadzor'' (RKN), is the Russian federal executive agency responsible for monitoring, controlling and censoring Russian mass media. ...
agency collaborates with Chinese Great Firewall security officials in implementing its data retention and filtering infrastructure. During his visit to Beijing in June 2016, Vladimir Putin signed a joint communiqué with Xi Jinping
Xi Jinping, pronounced (born 15 June 1953) is a Chinese politician who has been the general secretary of the Chinese Communist Party (CCP) and Chairman of the Central Military Commission (China), chairman of the Central Military Commission ...
on information space, followed by Russia's National Forum for Information Security in October hosted by Fang Binxing, the architect of the Chinese Great Firewall.
Especially since the 2022 Russian invasion of Ukraine
On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...
, in order to enforce the war censorship law, Russian authorities were making an internet surveillance system akin to Chinese Great Firewall.
Opposition
Critics have argued that if other large countries begin following China's approach, the whole purpose of the creation of the Internet could be put in jeopardy. If like-minded countries are successful in imposing the same restrictions on their inhabitants and globalized online companies, then the free global exchange of information could cease to exist.
The United States Trade Representative
The Office of the United States Trade Representative (USTR) is an agency of the Federal government of the United States, United States federal government responsible for developing and promoting Foreign trade of the United States, United States ...
's (USTR) "National Trade Estimate Report" in 2016 referred the China's digital Great Firewall: "China's filtering of cross-border Internet traffic has posed a significant burden to foreign suppliers." Claude Barfield, the American Enterprise Institute
The American Enterprise Institute for Public Policy Research, known simply as the American Enterprise Institute (AEI), is a center-right think tank based in Washington, D.C., that researches government, politics, economics, and social welfare ...
's expert of International trade, suggested that the U.S. government should bring a case against the Firewall, a huge trade barrier, in the World Trade Organization in January 2017. Eight of the 24 more trafficked websites in China have been blocked by the Great Firewall. This has created a burden to foreign suppliers who rely on these websites to sell their products or services. The lobby's 2016 business climate survey showed 79 percent of its members reported a negative impact on business due to internet censorship.
According to Stephen Rosen, the GFW is reflective of the Chinese government's fear of civil disobedience or rebellion among the Chinese population against the Chinese Communist Party's rule:
See also
* List of websites blocked in mainland China
Many domain names are blocked in mainland China under the country's Internet censorship policy, which prevents users from accessing certain websites from within the country.
A majority of apps and websites blocked are the result of the compan ...
* Bamboo Curtain
* Censorship in China
Censorship in the People's Republic of China (PRC) is mandated by the country's ruling party, the Chinese Communist Party (CCP). It is one of the strictest censorship regimes in the world. The government censors content for mainly political re ...
* Censorship of Wikipedia by China
* Cypher
* Great Cannon
The Great Cannon of China is an Internet attack tool that is used by the government of the People's Republic of China to launch distributed denial-of-service attacks on websites by performing a man-in-the-middle attack on large amounts of web t ...
— A distributed denial-of-service attack tool co-located with the Great Firewall.
* GreatFire — An organization monitoring and providing apps, 12 websites, code, tests and tools related to the Great Firewall
* Green Dam Youth Escort
* Great Wall of Sand
* International Freedom of Expression Exchange
IFEX, formerly International Freedom of Expression Exchange, is a global network of more than 119 independent non-governmental organisations that work at a local, national, regional, or international level to defend and promote freedom of expre ...
– monitors
* Internet censorship circumvention
* Media of China
The mass media in the People's Republic of China primarily consists of television, newspapers, radio, and magazines. Since the start of the 21st century, the Internet has also emerged as an important form of mass media and is under the direct ...
* Politics of China
In the People's Republic of China, politics functions within a socialist state framework based on the system of people's congress under the leadership of the Chinese Communist Party (CCP), with the National People's Congress (NPC) functionin ...
* Splinternet
The splinternet (also referred to as cyber-balkanization or internet balkanization) is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and diver ...
* '' Who Controls the Internet?''
Notes
References
Further reading
*
*
*
External links
*
*
*
{{Internet censorship circumvention technologies
Internet censorship in China
Firewall software