Concept

Internet censorship in China

China censors both the publishing and viewing of online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of their government, and severely restricting freedom of the press. China's censorship includes the complete blockage of various websites, apps, video games, inspiring the policy's nickname, the "Great Firewall of China", which blocks websites. Methods used to block websites and pages include DNS spoofing, blocking access to IP addresses, analyzing and filtering URLs, packet inspection, and resetting connections. China's Internet censorship is more comprehensive and sophisticated than any other country in the world. The government blocks website content and monitors Internet access. As required by the government, major Internet platforms in China have established elaborate self-censorship mechanisms as well as implementing a real-name system. As of 2019, more than sixty online restrictions had been created by the Government of China and implemented by provincial branches of state-owned ISPs, companies and organizations. Some companies hire teams and invest in powerful artificial intelligence algorithms to police and remove illegal online content. Amnesty International states that China has "the largest recorded number of imprisoned journalists and cyber-dissidents in the world" and Reporters Without Borders stated in 2010 and 2012 that "China is the world's biggest prison for netizens." Commonly alleged user offenses include communicating with organized groups abroad, signing controversial online petitions, and forcibly calling for government reform. The government has escalated its efforts to reduce coverage and commentary that is critical of the regime after a series of large anti-pollution and anti-corruption protests. Many of these protests were organized or publicized using instant messaging services, chat rooms, and text messages. China's Internet police force was reported by official state media to be 2 million strong in 2013.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related courses (1)
CS-523: Advanced topics on privacy enhancing technologies
This advanced course will provide students with the knowledge to tackle the design of privacy-preserving ICT systems. Students will learn about existing technologies to prect privacy, and how to evalu
Related lectures (12)
Anonymity Online: Techniques and Weaknesses
Explores online anonymity techniques and weaknesses, including bypassing geo-blocking and avoiding tracking.
Censorship Resistance
Explores censorship resistance technologies to ensure freedom of expression and access to information online.
Censorship Resistance
Explores techniques for censorship resistance in the Internet and discusses solutions like CloudTransport and CovertCast.
Show more
Related publications (9)

Moby: A Blackout-Resistant Anonymity Network for Mobile Devices

Bryan Alexander Ford, Antoine Rault, Amogh Pradeep, Hira Javaid

Internet blackouts are challenging environments for anonymity and censorship resistance. Existing popular anonymity networks (e.g., Freenet, I2P, Tor) rely on Internet connectivity to function, making them impracticable during such blackouts. In such a set ...
2022

The Role of Compromised Accounts in Social Media Manipulation

Tugrulcan Elmas

In recent years we have seen a marked increase in disinformation including as part of a strategy of so-called hybrid warfare. Adversaries not only directly spread misleading content but manipulate social media by employing sophisticated techniques that exp ...
EPFL2022

Privacy-preserving photo sharing based on blockchain

Touradj Ebrahimi, Pablo Pfister

Sharing photos online has become an extremely popular activity, raising a wide concern on privacy issues related to the shared content. ProShare, a photo-sharing solution developed by Multimedia Signal Processing Group of EPFL addresses some of these priva ...
SPIE-INT SOC OPTICAL ENGINEERING2020
Show more
Related concepts (16)
Internet censorship
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as, for example, Wikipedia.org) but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible.
YouTube
YouTube, LLC is an American online video sharing and social media platform headquartered in San Bruno, California, United States. Accessible worldwide, it was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by Google and is the second most visited website, after Google Search. YouTube has more than 2.5 billion monthly users, who collectively watch more than one billion hours of videos each day. , videos were being uploaded at a rate of more than 500 hours of content per minute.
Great Firewall
The Great Firewall (GFW; ) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic. The Great Firewall operates by checking transmission control protocol (TCP) packets for keywords or sensitive words. If the keywords or sensitive words appear in the TCP packets, access will be closed.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.