IT security expert Sebastian Wolfgarten wanted to find out if he could get
around the so-called Great Firewall of China, a vast Internet
censorship system that prevents Chinese citizens from accessing
information their government deems sensitive. Yesterday, he told Chaos Communication Congress attendees how he did it.
Researchers have known
for the past several years that when Chinese citizens type certain
phrases like “Falun Gong” and “Taiwan” into Google, they
receive very different results than people outside the region do. Wolfgarten
wanted to know why, and whether there might be a simple technical way
to dig a little escape route through the Great Firewall.
Getting into China's network turned out to be easier than you might imagine. Wolfgarten simply bought a server at a Chinese ISP by phone. Once the server was set up, he could log into it from Germany. And all the data that went through the server
would be subject to the same digital censorship that Chinese citizens
experience every day. He quickly discovered that when he requested
information on Taiwan through his Chinese server, he got
no data in return. Sometimes, he couldn't access his server for days
on end. When he phoned the ISP for information, workers there told
him the server was running. He was just blocked from reaching it.
Over the next year, he tried several methods for getting uncensored data to his Chinese server through the Great Firewall. He would log into the server, then make requests for information about Amnesty.org or Falun Gong. What he discovered was that there are three fairly simple ways to trick the automatic Chinese censorship system.
The first, and easiest, is to use the anonymous network Tor. Though there has been some debate as to whether Tor would work in China, it seems to be successful for now. Another method, which had been previously identified by researchers with the OpenNet Initiative a couple of years ago, involves essentially ignoring censorship commands sent by Chinese servers. Apparently the Great Firewall censors data by responding to forbidden key words with a network command called a "reset." The reset instructs the Chinese computer to drop its connection. The hitch is that the data is still coming in, but injected with the "reset" command. Program your own firewall to ignore "reset" commands and you've got uncensored data.
Crafty anti-censorship types in China can also get uncensored data by doing something called "tunnelling," which seems particularly appropros when dealing with a Great Firewall. Wolfgarten tested what happened when he hid requests for "Falun Gong" inside seemingly-innocuous requests for e-mail or basic network information. A computer outside the Wall unwraps the requests, gets the data, rewraps them and returns them to China uncensored.
Wolfgarten admitted that it's not clear that servers owned by foreigners are subject to the same treatment as Chinese-owned servers. He concluded by saying that a lot more research needs to be done, and invited others to help him.
You can read Wolfgarten's paper about his research here. --Annalee Newitz
So i also come from China, but i something differert to show to us.
Chinese direct wholesale:http://www.sourcingmap.com
Chinese direc retail:http://www.uxcell.com
Posted by: sourcingmap | January 24, 2007 at 09:41 PM
There is an easy way to check in real time if any resource on the web is blocked by the Chinese government. It is at http://www.websitepulse.com/help/testtools.china-test.html
Posted by: Ray S | October 28, 2007 at 07:46 AM
Advertise your MP3 site on the internet. A good, inexpensive way to do this is by approaching owners of other sites that compliment yours and requesting to do a banner exchange program with them. This will allow you to advertise your site on their site in exchange for them advertising on yours.
Posted by: Cellphone | January 16, 2009 at 08:49 PM
So i also come from China, but i something differert to show to us.asus L3800 laptop li ion battery
Posted by: laptop power battery | February 22, 2009 at 05:24 AM
So i also come from China, but i something differert to show to us. averatec laptop 6100 li ion battery
Posted by: laptop power battery | February 27, 2009 at 01:48 AM
I recently came across your blog and have been reading along. I thought I would leave my first comment. I don't know what to say except that I have enjoyed reading. Nice blog. I will keep visiting this blog very often.
Joannah
http://2gbmemory.net
Posted by: Joannah | March 27, 2009 at 01:42 AM
So i also come from China
Posted by: شات صوتى | July 19, 2009 at 05:55 AM
So i also come from China
Posted by: شات | July 19, 2009 at 05:57 AM
thanks for the article,
great job.
------------
http://job.com, http://ecrazysales.com, http://now2.com
Posted by: smart | July 31, 2009 at 12:29 AM
hm. love it
Posted by: Japanese Cheerleaders Dressing | September 10, 2009 at 03:58 AM
Thanks for the article!
Posted by: ohio state store | November 24, 2009 at 05:47 PM
I recently came across your blog and have been reading along. I thought I would leave my first comment. I don't know what to say except that I have enjoyed reading. Nice blog. I will keep visiting this blog very often.
Posted by: carpet cleaners rentals | November 24, 2009 at 05:49 PM
What happens if the find you under their wall?
Posted by: chi hairdryer | November 24, 2009 at 05:51 PM
There will always be a way around the Chinease censors. Its a cat and mouse game.
Posted by: commercial coffee maker | November 24, 2009 at 05:53 PM
But happens if you get caught in China viewing something you are not suppose to? Are you put in jail, fined, and or something worse?
Posted by: commercial espresso makers | November 24, 2009 at 05:55 PM
I dont know what would happen but I would not like to find out.... Way too scary for my blood....lol
Posted by: discounted contacts | November 24, 2009 at 05:56 PM
I couldnt even have the guts to try and hack around in a place I was not suppose in China. They will get you and throw away the key.
Posted by: emergency survival kit | November 24, 2009 at 05:58 PM
I hacked some site while I visited China for 3 months. It was awesome and the best part is, I never got caught.
Posted by: hon file cabinet | November 24, 2009 at 06:00 PM
Come on man! Be serious. If you did what you say you did, you would not be braggin about it. Am guessing, but if you did, hats off....Thats is way cool stuff.....
Posted by: super solano hair dryers | November 24, 2009 at 06:02 PM
I think you people are all crazy for talking about the subject in an open forum like this. You dont know who is listening.....
Posted by: wireless barcode scanner | November 24, 2009 at 06:03 PM
I'm using Freedur to bypass the great firewall. It is very fast.
Posted by: zaczum | December 02, 2009 at 01:51 AM
FYI, the owner of Freedur Chris Mathews and his operations are very shady. There is so many bad comments floating around the internet about Chris Mathews, Freedur, ShoeMash and OpenTerrace LTD. Supposedly, Chris Mathews has stolen Freedur from its real owner - StackFile (owner - Paul Hay).
Freedur server is full of stolen files, just as example - https://freedur.net/images/placeholder/stackfile_logo.jpg
You can read the law suit against Freedur/Chris Mathews here http://www.skydur.com/law-suit-against-chris-mathews.php.
If I were you I would stay away from Freedur, ShoeMask and Open Terrace LTD.
Blake
Posted by: Blake | December 12, 2009 at 08:25 PM
Nice blog.Keep it up good work.
Posted by: Fog Light | December 21, 2009 at 11:06 PM
It's really funny.I like it very much.
Posted by: HID Bulb | December 21, 2009 at 11:27 PM
Very nice posting. I liked it.
thank you for your great posting.
Well that was a nice post
http://www.webroyalty.com
Posted by: Nick Matyas | January 04, 2010 at 04:18 AM