SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Cross the Great FireWall of China




                Bin Cai
         bc2e10@ecs.soton.ac.uk
Introduction
Beautiful World of Internet




http://www.appappeal.com/web-2-0-application-world-mosaic/
Great FireWall
• Great Wall, most famous attraction in
  China;
• operated by the Ministry of Public Security;
• start in 1998;
• block websites which government don’t
  want people to access.
Methods
Methods used to block
      website
• IP blocking;
• DNS filtering and redirection;
• URL filtering;
• Package filtering;
• Connection reset.
Bypass
How to bypass GFW
• Proxy server located outside of China;
• Auto-proxy software and onion routing,
  such as FreeGate;
• APIs;
• SSH tunnel;
• VPN.
Conclusion
Conclusion

• China has strict regulations on the Internet;
• We always have a way;
• Desire for freedom is irresistible.
Reference

• Ignoring the Great Firewall of China, Richard
  Clayton, Steven J. Murdoch, and Robert N.
  M. Watson, Computer Laboratory,
  University of Cambridge, accessed 17
  September 2011
Q &A

Weitere ähnliche Inhalte

Andere mochten auch

Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Simon Kemp
 
Chinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important SitesChinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important SitesChris Baker
 
Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015We Are Social Singapore
 
2016 China's Social Media Trend Report
2016 China's Social Media Trend Report2016 China's Social Media Trend Report
2016 China's Social Media Trend ReportChris Baker
 
Lofter - China's New Social Media
Lofter - China's New Social MediaLofter - China's New Social Media
Lofter - China's New Social MediaChris Baker
 

Andere mochten auch (9)

Firewall
FirewallFirewall
Firewall
 
Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)
 
Chinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important SitesChinese Social Media - Quick Guide to Important Sites
Chinese Social Media - Quick Guide to Important Sites
 
Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015Digital, Social & Mobile in China in 2015
Digital, Social & Mobile in China in 2015
 
2016 China's Social Media Trend Report
2016 China's Social Media Trend Report2016 China's Social Media Trend Report
2016 China's Social Media Trend Report
 
Lofter - China's New Social Media
Lofter - China's New Social MediaLofter - China's New Social Media
Lofter - China's New Social Media
 
An Introduction To Human Rights
An Introduction To Human RightsAn Introduction To Human Rights
An Introduction To Human Rights
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Kürzlich hochgeladen

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Cross the Great Firewall of China

  • 1. Cross the Great FireWall of China Bin Cai bc2e10@ecs.soton.ac.uk
  • 3. Beautiful World of Internet http://www.appappeal.com/web-2-0-application-world-mosaic/
  • 4. Great FireWall • Great Wall, most famous attraction in China; • operated by the Ministry of Public Security; • start in 1998; • block websites which government don’t want people to access.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Methods used to block website • IP blocking; • DNS filtering and redirection; • URL filtering; • Package filtering; • Connection reset.
  • 15. How to bypass GFW • Proxy server located outside of China; • Auto-proxy software and onion routing, such as FreeGate; • APIs; • SSH tunnel; • VPN.
  • 17. Conclusion • China has strict regulations on the Internet; • We always have a way; • Desire for freedom is irresistible.
  • 18. Reference • Ignoring the Great Firewall of China, Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson, Computer Laboratory, University of Cambridge, accessed 17 September 2011
  • 19. Q &A

Hinweis der Redaktion

  1. Good morning, everyone! My name is Bin Cai. My topic of today’s presentation is Cross the Great FireWall of China.\n
  2. Let’s start from the introduction.\n
  3. Look at this beautiful world map of web applications. Can you imagine how your life will be without these websites? No facebook, no Youtube, no twitter, even no google! But in mainland China, it really happens because of GFW, which is the abbreviation of Great FireWall.\n
  4. You have probably heard of the Great Wall, which is the most famous attraction in China. The name Great Firewall comes from it. It’s a project operated by the Ministry of Public Security and started in 1998. It’s used to block websites which government don’t want people to access. \n
  5. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  6. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  7. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  8. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  9. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  10. These are the some famous examples that we can’t visit directly from China. But luckily, we have these copycats.\n
  11. There are various methods which are used by GFW.\n
  12. It can block the IP address of the server which the web site host on. It can also use DNS filtering and redirection to redirect the domain name to a fault address. URL and Package filtering will check the content of url or package to make sure it doesn’t contain forbidden keywords. If you search the forbidden keywords in search engines such as google, the GFW will not allow this query and reset the connection.\n
  13. However, since smart chinese people can build such a GFW, we can also find out some ways to bypass it.\n
  14. The most common way is use proxy server located outside of China. While its speed is very low. So many people choose to use some free auto-proxy software and onion routing, such as FreeGate and Tor. APIs which provided by application providers can be used to build new applications and host wherever you want. You can also buy accounts to use SSH tunnel and VPN connection to bypass the GFW.\n
  15. \n
  16. Though China has very strict regulations on the Internet, we can always find a way to cross the GFW. Because Chinese people’s desire for freedom is irresistible.\n
  17. My presentation is based on this paper.\n
  18. Any question?\n