Online Censorship In China brings transparency to the Great Firewall of China. We have monitored blocked websites and keywords since 2011.

Latest Stats

Monitoring 935 Alexa Top 1000 Domains:142 are blocked in China
Monitoring 44665 Domains:5843 are blocked in China
Monitoring 18275 Google Searches:18275 are blocked in China
Monitoring 833 Google Sites:742 are blocked in China
Monitoring 18709 HTTPS:4652 are blocked in China
Monitoring 17994 IP Addresses:8214 are blocked in China
Monitoring 237576 URLs:64931 are blocked in China
Monitoring 27525 Weibo Searches:3186 are blocked in China
Monitoring 1215 Wikipedia Pages:878 are blocked in China

Latest News

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Thu, Nov 26, 2015

Twitter: GreatFireChina RT @YourAnonNews: .@vocativ compiled an interesting analysis of the motivations behind #Anonymous operations: https… retweet
Twitter: GreatFireChina 希望能邀请您加入我的领英职业人脉圈。I'd like to add you to my professional network on LinkedIn. retweet

Wed, Nov 25, 2015

Twitter: GreatFireChina RT @HeathaT: Global beauty pageants @missearth & @MissWorldLtd bow to China's censorship demands retweet
Twitter: GreatFireChina RT @beijingcream: Chinese Film Crew Survives ISIS, Doesn’t Survive Chinese Censors: by @valentinaluo retweet

Tue, Nov 24, 2015

Twitter: GreatFireChina McAfee believes Chinese cyber war will be America's next Pearl Harbour retweet
Twitter: GreatFireChina Another one bites the dust: Advanced Chinese iOS Proxy Tool Surge To Be Pulled From App Store - TechNode retweet
Twitter: GreatFireChina Bangladesh: Blocking social networking sites and applications is a complete failure of the government mechanism retweet

Thu, Sep 24, 2015

Apple blocked CNNIC CA months after MITM attacks

In March of this year, Google found unauthorized digital certificates for several Google domains. The root certificate authority for these domains was the China Internet Network Information Center (CNNIC). CNNIC was controlled by the Chinese government through the Ministry of Industry and Information Technology and is now under the management of the Cyberspace Administration of China (CAC). CNNIC was recognized by all major browsers as a trusted Certificate Authority. If CNNIC signs a fake certificate used in a man-in-the-middle attack, no browser will warn of any unusual activity unless the certificate is pinned.

Wed, Sep 23, 2015

Malicious Xcode could spread via download manager Xunlei

What’s at stake?

We reported last week that popular Chinese iOS apps were compromised in an unprecedented malware attack. We discovered that the source of the infection was compromised copies of Xcode hosted on Baidu Pan. Apple has published an article urging developers to download Xcode directly from the Mac App Store, or from the Apple Developer website and validate signatures. We’ve now discovered that even if a developer uses a download link seemingly from Apple, he might still be possible to obtain a compromised copy of Xcode.

Please note that we do not have evidence that such attacks has happened. But it is an easy attack that anyone can implement.

How does it work?

This compromise happened because of Xunlei. Xunlei is the most popular download manager in China. Much of its popularity is due to the fact they can accelerate download speeds by pulling resources from other Xunlei users as well as cached copies on the Xunlei server. All of this, however, is invisible to users. Users can simply enter a regular http download address into Xunlei  download manager and the download will start. Chinese developers were using direct download addresses such as to download Xcode.

Mon, Sep 21, 2015



Sat, Sep 19, 2015

Popular Chinese iOS apps compromised in unprecedented malware attack

What happened?

According to recent reports, some versions of Xcode used by developers in China have been compromised and are being used to inject tracking codes in iOS apps without developer knowledge. (1,2). Unaware of the injection, those developers then released their compromised iOS apps to the App Store which were then later approved by Apple. At the time of writing this post, the compromised apps are still available in the App store. Any user who has installed and launched these compromised apps will be a victim of these tracking codes.

This is a significant compromise of Apple’s app store. Apple notoriously manually reviews all app submissions and, in comparison to Android stores, has been relatively malware-free. This is the most widespread and significant spread of malware in the history of the Apple app store, anywhere in the world.

The compromised version of Xcode was hosted on Baidu Pan. It is unlikely that Baidu was aware of the compromised version of Xcode. The company removed the files yesterday when news of the compromise surfaced. Because of slow download speeds from foreign websites in China, many Chinese developers prefer to download apps from domestic websites. Many Chinese also use download software like Xunlei, rather than downloading directly from the official Mac App Store.

According to users reports, many prominent Chinese apps are affected. We have included links to the compromised apps in the list below but DO NOT DOWNLOAD these apps. We are simply linking to them so that users can recognize the apps. Affected apps include:  

Wechat The most popolar messaging app in China 

More News