{"id":65253,"date":"2015-04-11T07:43:10","date_gmt":"2015-04-11T11:43:10","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/chinas-great-cannon-taking-censorship-across-country-borders\/"},"modified":"2015-04-11T07:43:10","modified_gmt":"2015-04-11T11:43:10","slug":"chinas-great-cannon-taking-censorship-across-country-borders","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/chinas-great-cannon-taking-censorship-across-country-borders\/","title":{"rendered":"China&#39;s &#39;Great Cannon&#39;: Taking censorship across country borders"},"content":{"rendered":"<p><p>  Summary:China's ruling party is ramping up the  censorship battle with a powerful new weapon which hijacks  traffic outside of the country.<\/p>\n<p>    China has developed a new censorship weapon to accompany its    Great Firewall in order to silence not only its citizens -- but    critics around the globe.  <\/p>\n<p>    According to a report released    Friday by Citizen Lab, the 'Great Cannon' was first used    against GitHub and Greatfire.org servers, both incidents of    which were     high-profile DDoS attacks designed to deny access to    materials criticizing China's regime, censorship tools and    copies of websites banned in the country.  <\/p>\n<p>    Researchers from the University of California, Berkeley,    University of Toronto's Citizen LabCitizen Lab, the    International Computer Science Institute (ICSI) and Princeton    University suggest in the paper that these attacks were    orchestrated by China's censorship barricade. However, while    the attacks -- which used malicious Javascript to redirect    Baidu connections to overwhelm the servers with traffic    intended for China's largest search engine -- originated from    the Great Firewall of China, the team say that the attack was    carried out by an entirely separate tool.  <\/p>\n<p>    This system, dubbed China's 'Great Cannon,' is reportedly a    \"distinct attack tool\" with different capabilities to the Great    Firewall. Rather than acting as an extension of the wall,    Citizen Labs says the tool can \"hijack traffic to (or    presumably from) individual IP addresses, and can arbitrarily    replace unencrypted content as a man-in-the-middle (MITM).\"  <\/p>\n<p>    \"The operational deployment of the Great Cannon represents a    significant escalation in state-level information control: the    normalization of widespread use of an attack tool to enforce    censorship by weaponizing users. Specifically, the Cannon    manipulates the traffic of \"bystander\" systems outside China,    silently programming their browsers to create a massive DDoS    attack,\" the researchers say.  <\/p>\n<p>    The Great Firewall of China is an on-path system which monitors    traffic between China and other countries. If requests for    banned content are received -- such as access to Google,    Facebook and Twitter -- the system terminates the request.    However, the researchers say the Great Cannon works    differently. The Great Cannon is in in-path system which is    capable of both injecting and suppressing traffic.  <\/p>\n<p>    In the attacks on GitHub and Greatfire.org, the new tool    intercepted traffic sent to Baidu servers which hosted    analytics, social and advertising scripts. If the Great Cannon    saw requests for particular Javascript files, it could take two    actions: pass the request on to Baidu servers or drop the    request and instead send a malicious script back. The report    states:  <\/p>\n<p>    The idea that China's cybercapabilities may allow it to divert    traffic from surfers outside of the country for its own ends is    concerning. Furthermore, the researchers also say the tool only    acts on a small percentage of the traffic it has the    capabilities to manipulate, and the Great Cannon's    functionality likely spans beyond such uses.  <\/p>\n<p>    According to the team, a few simple tweaks in the Great    Cannon's configuration -- switching to operating on traffic    from a specific IP address rather than to a specific address --    would allow malware payloads to be delivered to targeted users    who are communicating with Chinese servers without    cryptographic protections set in place.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/zdnet.com.feedsportal.com\/c\/35462\/f\/675663\/s\/45489910\/sc\/11\/l\/0L0Szdnet0N0Carticle0Cchinas0Egreat0Ecannon0Etaking0Ecensorship0Eacross0Ecountry0Eborders0C0Tftag0FRSSbaffb68\/story01.htm\/RK=0\/RS=W26oeOaqFYqXyDPTjkB09MGINhc-\" title=\"China&#39;s &#39;Great Cannon&#39;: Taking censorship across country borders\">China&#39;s &#39;Great Cannon&#39;: Taking censorship across country borders<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Summary:China's ruling party is ramping up the censorship battle with a powerful new weapon which hijacks traffic outside of the country. China has developed a new censorship weapon to accompany its Great Firewall in order to silence not only its citizens -- but critics around the globe. According to a report released Friday by Citizen Lab, the 'Great Cannon' was first used against GitHub and Greatfire.org servers, both incidents of which were high-profile DDoS attacks designed to deny access to materials criticizing China's regime, censorship tools and copies of websites banned in the country <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/chinas-great-cannon-taking-censorship-across-country-borders\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-65253","post","type-post","status-publish","format-standard","hentry","category-censorship"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/65253"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=65253"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/65253\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=65253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=65253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=65253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}