Great Firewall of China

The Great Firewall of China refers to legislative actions and technologies put in place by the People’s Republic of China to domestically regulate the internet. It is a nation-wide firewall composed of multiple layers and managed by government IT personnel that allows China to control content through the largest system of censorship in the world. Sites blocked by the Great Firewall include Twitter, Facebook, the New York Times, and Google and its services, such as YouTube.

The Great Firewall is a national effort to protect Chinese infrastructure from cyberattacks. It was formerly a part of the Golden Shield Project, but since 2013, it’s been operated by the Cyberspace Administration of China, the central internet regulator, censor, oversight, and control agency for the People’s Republic of China.

How does the Great Firewall of China work?

The firewall uses IP address blocking, DNS cache poisoning, analyzing and filtering of URLs, packet inspection and filtering, and resetting connections to redirect IP requests if they are for blocked websites or keywords. In China, most Virtual Private Network (VPN) providers are also blocked, and citizens must use a government-approved option, which doesn’t give them much flexibility to use the internet.

Websites that are blocked by the Great Firewall appear as though they are experiencing technical issues rather than communicating that the site has been blocked. Technical issue messages that a blocked site may show include a 404 Page Not Found error, the connection needs to be reset, or the page has timed out.

There are ways to circumvent censorship using proxy nodes and encrypting data. Methods for evading the Great Firewall are as follows:

  • Using free programs such as Freegate, Ultrasurf, Psiphon, and Lantern to circumvent the firewall using multiple open proxies
  • Using a proxy server
  • Using a VPN
  • Using Tor, a free and open source software used for anonymous communication by directing traffic through an overlay network that conceals a user’s location and usage from anyone conducting network surveillance or traffic analysis.
  • Using I2P, an anonymous network layer similar to Tor that allows for censorship-resistant communication. Since I2P is less popular than Tor, it faces less blocking attempts.

 

Abby Braden
Abby Braden
Abby Braden is an award-winning writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com, where she covers technology trends and enterprise and SMB project management platforms. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...