{"id":65252,"date":"2015-04-11T07:43:10","date_gmt":"2015-04-11T11:43:10","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/great-cannon-widens-china-censorship-researchers\/"},"modified":"2015-04-11T07:43:10","modified_gmt":"2015-04-11T11:43:10","slug":"great-cannon-widens-china-censorship-researchers","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/great-cannon-widens-china-censorship-researchers\/","title":{"rendered":"&#39;Great Cannon&#39; widens China censorship: Researchers"},"content":{"rendered":"<p><p>    WASHINGTON - China has expanded its Internet censorship efforts    beyond its borders with a new strategy that attacks websites    across the globe, researchers said Friday.  <\/p>\n<p>    The new strategy, dubbed \"Great Cannon,\" seeks to shut down    websites and services aimed at helping the Chinese circumvent    the \"Great Firewall,\" according to a report by the Citizen Lab    at the University of Toronto.  <\/p>\n<p>    \"While the attack infrastructure is co-located with the Great    Firewall, the attack was carried out by a separate offensive    system, with different capabilities and design, that we term    the 'Great Cannon,'\" the report said.  <\/p>\n<p>    \"The Great Cannon is not simply an extension of the Great    Firewall, but a distinct attack tool that hijacks traffic to    (or presumably from) individual IP addresses.\"  <\/p>\n<p>    The report supports claims by the activist organisation    GreatFire, which last month claimed China was seeking to shut    down its websites that offer \"mirrored\" content from blocked    websites like those of the New York Times and others.  <\/p>\n<p>    The technique involves hijacking Internet traffic to the big    Chinese search engine Baidu and using that in \"denial of    service\" attacks which flood a website in an effort to knock it    offline.  <\/p>\n<p>    The report authors said the new tool represents \"a significant    escalation in state-level information control\" by using \"an    attack tool to enforce censorship by weaponizing users.\"  <\/p>\n<p>    The Great Cannon manipulates the traffic of \"bystander\" systems    including \"any foreign computer that communicates with any    China-based website not fully utilizing (encryption).\"  <\/p>\n<p>    'Puzzling' openness  <\/p>\n<p>    The Citizen Lab researchers said they found \"compelling    evidence that the Chinese government operates the GC (Great    Cannon),\" despite Beijing's denials of involvement in    cyberattacks.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/asiaone.feedsportal.com\/c\/34151\/f\/618414\/s\/4548f338\/sc\/15\/l\/0Lnews0Basiaone0N0Cnews0Casia0Cgreat0Ecannon0Ewidens0Echina0Ecensorship0Eresearchers\/story01.htm\/RK=0\/RS=DD0mdUtAfo_7WtwjY65gyRG6lyQ-\" title=\"&#39;Great Cannon&#39; widens China censorship: Researchers\">&#39;Great Cannon&#39; widens China censorship: Researchers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WASHINGTON - China has expanded its Internet censorship efforts beyond its borders with a new strategy that attacks websites across the globe, researchers said Friday. The new strategy, dubbed \"Great Cannon,\" seeks to shut down websites and services aimed at helping the Chinese circumvent the \"Great Firewall,\" according to a report by the Citizen Lab at the University of Toronto. \"While the attack infrastructure is co-located with the Great Firewall, the attack was carried out by a separate offensive system, with different capabilities and design, that we term the 'Great Cannon,'\" the report said.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/great-cannon-widens-china-censorship-researchers\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-65252","post","type-post","status-publish","format-standard","hentry","category-censorship"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/65252"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=65252"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/65252\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=65252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=65252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=65252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}