The Great Firewall (GFW; ) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic. The Great Firewall operates by checking transmission control protocol (TCP) packets for keywords or sensitive words. If the keywords or sensitive words appear in the TCP packets, access will be closed. If one link is closed, more links from the same machine will be blocked by the Great Firewall. The effect includes: limiting access to foreign information sources, blocking foreign internet tools (e.g. Google Search, Facebook, Twitter, Wikipedia, and others) and mobile apps, and requiring foreign companies to adapt to domestic regulations.
Besides censorship, the Great Firewall has also influenced the development of China's internal internet economy by giving preference to domestic companies and reducing the effectiveness of products from foreign internet companies. The techniques deployed by the Chinese government to maintain control of the Great Firewall can include modifying search results for terms, such as they did following Ai Weiwei’s arrest, and petitioning global conglomerates to remove content, as happened when they petitioned Apple to remove the Quartz business news publication’s app from its Chinese App Store after reporting on the 2019–2020 Hong Kong protests.
The Great Firewall was formerly operated by the SIIO, as part of the Golden Shield Project. Since 2013, the firewall is technically operated by the Cyberspace Administration of China (CAC), which is the entity in charge of translating the Chinese Communist Party's doctrine and policy into technical specifications.
As mentioned in the "one country, two systems" principle, China's special administrative regions (SARs) such as Hong Kong and Macau are not affected by the firewall, as SARs have their own governmental and legal systems and therefore enjoy a higher degree of autonomy.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
This advanced course will provide students with the knowledge to tackle the design of privacy-preserving ICT systems. Students will learn about existing technologies to prect privacy, and how to evalu
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as, for example, Wikipedia.org) but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible.
China has been on the Internet intermittently since May 1989 and on a permanent basis since 20 April 1994, although with heavily filtered access. In 2008, China became the country with the largest population on the Internet and, , has remained so. As of July 2023, 1.05 billion (73.7% of the country's total population) use internet in China. China's first foray into the global cyberspace was an email (not TCP/IP based and thus technically not internet) sent on 20 September 1987 to the Karlsruhe Institute of Technology, reading, "Across the Great Wall, towards the rest of the world" ().
China censors both the publishing and viewing of online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of their government, and severely restricting freedom of the press. China's censorship includes the complete blockage of various websites, apps, video games, inspiring the policy's nickname, the "Great Firewall of China", which blocks websites.
Explores Tor bridges enumeration, ScrambleSuit for censorship resistance, and mimicking whitelisted applications like Skype.
Explores network security through NAT, firewalls, and deep packet inspection, emphasizing the importance of robust host-level defenses and the limitations of protection techniques.
Explores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.
This paper introduces a new modeling and inference framework for multivariate and anisotropic point processes. Building on recent innovations in multivariate spatial statistics, we propose a new family of multivariate anisotropic random fields, and from th ...
Cell-free biology is increasingly utilized for engineering biological systems, incorporating novel functionality, and circumventing many of the complications associated with cells. The central dogma describes the information flow in biology consisting of t ...
FRONTIERS MEDIA SA2022
In recent years we have seen a marked increase in disinformation including as part of a strategy of so-called hybrid warfare. Adversaries not only directly spread misleading content but manipulate social media by employing sophisticated techniques that exp ...