TechBiiTechBii
  • Android
  • Computer Tips
  • How To Guides
  • SEO
  • WordPress
  • Content Writing
  • Tech News
Search
Categories
Reading: The Creator of China’s Great Firewall Uses a Proxy to Skip it!
Share
Font ResizerAa
TechBiiTechBii
Font ResizerAa
Search
Follow US
Tech Stuff

The Creator of China’s Great Firewall Uses a Proxy to Skip it!

Sidharth
Last updated: September 17, 2023 8:11 am
Sidharth
Published: October 25, 2019
Share
5 Min Read

In China there is the Great Wall of China, and also the Great Chinese Firewall. The authorities prefer to call it Project Golden Shield, but in reality, it is a Great Firewall that filters all the Internet content that arrives in China.

Table of Contents
Fang Binxing is considered the architect of this Great Chinese Firewall:Advantages and disadvantages of a proxyAdvantagesDisadvantages
firewall

This firewall censors all content that is banned by the Chinese government. If an Internet user from that country looks for information about the Dalai Lama, sex, or online gambling, the only thing he will find is a blank page with the phrase “Web not found”.

It is estimated that more than 100,000 people work to censor in real time the comments that are published in forums, websites, and social networks. The popular social network Weibo, the Chinese Twitter, has 4000 employees dedicated solely to the task of censoring the comments of its users.

Fang Binxing is considered the architect of this Great Chinese Firewall:

Last week he was caught in a compromised situation when he used a virtual private network (VPN) or proxy to bypass his own protection during a conference at the Heilongjiang Institute of Technology, with the aim of accessing a South Korean website that was censored but needed to conduct the conference.

According to Techworm, Fang Binxing himself realized what he was doing and asked attendees not to imitate his example. The irony of the case is that by using the VPN the firewall he had designed himself blocked it and Mr. Binxing could not access the web he needed.

After the conference was scheduled a round of questions and answers that was suddenly cancelled.

According to Statista, 29% of Chinese Internet users use a proxy or VPN to skip the Great Firewall and access censored websites, which include search engines such as Google or social networks such as Facebook, but also casinos and gambling websites. You can also do the same if you look and purchase the Pirate Bay proxy list.

Advantages and disadvantages of a proxy

Advantages

In general, proxies make several new things possible:

  1. Control: only the intermediary does the real work, so you can limit and restrict the rights of users, and give permissions only to the proxy.
  2. Savings. Therefore, only one of the users (the proxy) has to be equipped to do the real work.
  3. Speed If several clients are going to request the same resource, the proxy can cache: save the response of a request to give it directly when another user requests it. So you don’t have to contact the destination again, and you end up faster.
  4. Filtering. The proxy can refuse to respond to some requests if it detects that they are prohibited.
  5. Modification. As an intermediary, a proxy can falsify information, or modify it following an algorithm.
  6. Anonymity. If all users are identified as one, it is difficult for the accessed resource to be able to differentiate them. But this can be bad, for example when you must necessarily make the identification.

Disadvantages

In general, the use of an intermediary can cause:

  1. Abuse. Being willing to receive and respond to requests from many users, you may be doing some work that you don’t touch. So you have to control who has access to your services and who doesn’t, which is usually very difficult.
  2. Load. A proxy has to do the work of many users.
  3. Interference. It’s one more step between origin and destination, and some users may not want to go through the proxy. And less if it caches and keeps copies of the data.
  4. Inconsistency. If you’re caching, you might get it wrong and give an old response when there’s a newer one in the target resource. This problem doesn’t really exist with today’s proxy servers, as they connect to the remote server to check that the cached version is still the same as the one on the remote server.
  5. Irregularity. The fact that the proxy represents more than one user gives problems in many scenarios, specifically those that presuppose direct communication between 1 sender and 1 receiver (such as TCP/IP).
Share This Article
Facebook Pinterest Whatsapp Whatsapp LinkedIn Reddit Telegram Threads Email Copy Link Print
Share
BySidharth
Follow:
Professional Blogger. Android dev. Audiophile.
Previous Article tech How Today’s Tech Can Improve Business Communication
Next Article Writing content paper document online on website Premium Vector Comparium Review: A Powerful Assistant to Keep a Check on Website Performance
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You Might Also Like

IP Telephony cloud pbx concept, telephone device with illustration icon of voip services and networking data center on background
Tech Stuff

SIP Trunking: 5 Fundamental Principles Explained

December 6, 2022
agile_vs_devops
Tech Stuff

Agile and DevOps – Does it Have to be One or the Other?

October 29, 2023
D:\Monika\2020\June 2020\Blogs\Blog Images\RailRestro\1-railrestro.jpg
Tech Stuff

RailRestro: A Patna-Based Start-up Changing the Face of E-Catering in Indian Railways

April 8, 2024
Tech Stuff

5 Ways Technology is Optimizing Employee Experience

July 18, 2022
FacebookLike
XFollow
PinterestPin
LinkedInFollow
  • Contact Us
  • Submit Guest Post
  • Advertisement Opportunities
Copyright © 2012-2024 TechBii. All Rights Reserved
adbanner
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?