SlideShare uma empresa Scribd logo
1 de 19
Cross the Great FireWall of China




                Bin Cai
         bc2e10@ecs.soton.ac.uk
Introduction
Beautiful World of Internet




http://www.appappeal.com/web-2-0-application-world-mosaic/
Great FireWall
• Great Wall, most famous attraction in
  China;
• operated by the Ministry of Public Security;
• start in 1998;
• block websites which government don’t
  want people to access.
Methods
Methods used to block
      website
• IP blocking;
• DNS filtering and redirection;
• URL filtering;
• Package filtering;
• Connection reset.
Bypass
How to bypass GFW
• Proxy server located outside of China;
• Auto-proxy software and onion routing,
  such as FreeGate;
• APIs;
• SSH tunnel;
• VPN.
Conclusion
Conclusion

• China has strict regulations on the Internet;
• We always have a way;
• Desire for freedom is irresistible.
Reference

• Ignoring the Great Firewall of China, Richard
  Clayton, Steven J. Murdoch, and Robert N.
  M. Watson, Computer Laboratory,
  University of Cambridge, accessed 17
  September 2011
Q &A

Mais conteúdo relacionado

Destaque

Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Simon Kemp
 
Chinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important SitesChinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important SitesChris Baker
 
Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015We Are Social Singapore
 
2016 China's Social Media Trend Report
2016 China's Social Media Trend Report2016 China's Social Media Trend Report
2016 China's Social Media Trend ReportChris Baker
 
Lofter - China's New Social Media
Lofter - China's New Social MediaLofter - China's New Social Media
Lofter - China's New Social MediaChris Baker
 

Destaque (9)

Firewall
FirewallFirewall
Firewall
 
Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)
 
Chinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important SitesChinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important Sites
 
Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015
 
2016 China's Social Media Trend Report
2016 China's Social Media Trend Report2016 China's Social Media Trend Report
2016 China's Social Media Trend Report
 
Lofter - China's New Social Media
Lofter - China's New Social MediaLofter - China's New Social Media
Lofter - China's New Social Media
 
An Introduction To Human Rights
An Introduction To Human RightsAn Introduction To Human Rights
An Introduction To Human Rights
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Cross the Great Firewall of China

  • 1. Cross the Great FireWall of China Bin Cai bc2e10@ecs.soton.ac.uk
  • 3. Beautiful World of Internet http://www.appappeal.com/web-2-0-application-world-mosaic/
  • 4. Great FireWall • Great Wall, most famous attraction in China; • operated by the Ministry of Public Security; • start in 1998; • block websites which government don’t want people to access.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Methods used to block website • IP blocking; • DNS filtering and redirection; • URL filtering; • Package filtering; • Connection reset.
  • 15. How to bypass GFW • Proxy server located outside of China; • Auto-proxy software and onion routing, such as FreeGate; • APIs; • SSH tunnel; • VPN.
  • 17. Conclusion • China has strict regulations on the Internet; • We always have a way; • Desire for freedom is irresistible.
  • 18. Reference • Ignoring the Great Firewall of China, Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson, Computer Laboratory, University of Cambridge, accessed 17 September 2011
  • 19. Q &A

Notas do Editor

  1. Good morning, everyone! My name is Bin Cai. My topic of today’s presentation is Cross the Great FireWall of China.\n
  2. Let’s start from the introduction.\n
  3. Look at this beautiful world map of web applications. Can you imagine how your life will be without these websites? No facebook, no Youtube, no twitter, even no google! But in mainland China, it really happens because of GFW, which is the abbreviation of Great FireWall.\n
  4. You have probably heard of the Great Wall, which is the most famous attraction in China. The name Great Firewall comes from it. It’s a project operated by the Ministry of Public Security and started in 1998. It’s used to block websites which government don’t want people to access. \n
  5. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  6. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  7. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  8. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  9. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  10. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  11. There are various methods which are used by GFW.\n
  12. It can block the IP address of the server which the web site host on. It can also use DNS filtering and redirection to redirect the domain name to a fault address. URL and Package filtering will check the content of url or package to make sure it doesn’t contain forbidden keywords. If you search the forbidden keywords in search engines such as google, the GFW will not allow this query and reset the connection.\n
  13. However, since smart chinese people can build such a GFW, we can also find out some ways to bypass it.\n
  14. The most common way is use proxy server located outside of China. While its speed is very low. So many people choose to use some free auto-proxy software and onion routing, such as FreeGate and Tor. APIs which provided by application providers can be used to build new applications and host wherever you want. You can also buy accounts to use SSH tunnel and VPN connection to bypass the GFW.\n
  15. \n
  16. Though China has very strict regulations on the Internet, we can always find a way to cross the GFW. Because Chinese people’s desire for freedom is irresistible.\n
  17. My presentation is based on this paper.\n
  18. Any question?\n