Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Wed, Apr 01, 2015

Twitter: GreatFireChina Seems DDOS against GIthub and our websites has stopped retweet
Twitter: GreatFireChina Everyone who cares about free speech should care about the attacks on Github via @voxdotcom retweet

Tue, Mar 31, 2015

Chinese authorities compromise millions in cyberattacks

The Great Firewall has switched from being a passive, inbound filter to being an active and aggressive outbound one. This is a frightening development and the implications of this action extend beyond control of information on the internet. In one quick movement, the authorities have shifted from enforcing strict censorship in China to enforcing Chinese censorship on internet users worldwide.
Twitter: GreatFireChina RT @githubstatus: Everything operating normally. retweet
Twitter: GreatFireChina "Obama administration could increase pressure & enact stiffer penalties against China if (DDoS) attacks continue." retweet
Twitter: GreatFireChina "GFW platform 4 conducting DDoS attacks against targets worldwide w/help of innocent users visiting Chinese sites." retweet
Twitter: GreatFireChina RT @oiax: 编程网站Github遭遇网络攻击 - 新闻与分析 - FT中文网: retweet
Twitter: GreatFireChina China's Man-on-the-Side Attack on GitHub retweet
Twitter: GreatFireChina Evidence shows Cyberspace Administration of China compromised millions in cyberattacks against GitHub and GreatFire retweet

Mon, Mar 30, 2015

Twitter: GreatFireChina RT @klustout: What will it take for Facebook to come to China? @niubi & @AmnestyOnline's Roseanne Rife #OnChina @cnni retweet
Twitter: GreatFireChina RT @paulmozur: China rereleases its censorship anthem, this time w/ sheet music so you can sing along at home http:/… retweet

Fri, Mar 27, 2015

CNNIC censored Google and Mozilla’s posts about CNNIC CA

This week, Google found unauthorized digital certificates for several Google domains, the root CA of which is CNNIC. Google and Mozilla both publicly disclosed this security incident and published blog posts(Google, Mozilla). However, Chinese translations of Google’s and Mozilla's blog posts were censored on the Chinese Internet.

  • William Long is a prominent Chinese blogger on IT and tech. He translated Google’s security post without adding any personal opinions. The Chinese blogpost ranked #1 when searching CNNIC MITM in Chinese on Google and Baidu. He tweeted that he received a phone call from propaganda department demanding the post to be removed immediately. The post was deleted. Google cache is still available.

Wed, Mar 25, 2015

Evidence shows CNNIC and CAC behind MITM attacks

Since 2013, we have repeatedly called on major software vendors to revoke CNNIC-issued certificates. Most notably, we raised this issue when we reported on the Cyberspace Administration of China’s (CAC) man-in-the-middle (MITM) attacks on Google, Microsoft’s Outlook, Apple, Yahoo and Github. Mainstream media have reported about these security vulnerabilities before and on March 24, Ars Technica reported on Google’s announcement that they have definitive evidence that CNNIC (China Internet Network Information Center) was behind a new MITM attack on Google.

From our October, 2014 blog post:

Thu, Mar 19, 2015

We are under attack

We are under attack and we need help.

Likely in response to a recent story in the Wall Street Journal (WSJ), we’ve experienced our first ever distributed denial of service (DDoS) attack. This tactic is used to bring down web pages by flooding them with lots of requests - at the time of writing they number 2.6 billion requests per hour. Websites are not equipped to handle that kind of volume so they usually “break” and go offline.

This kind of attack is aggressive and is an exhibition of censorship by brute force. Attackers resort to tactics like this when they are left with no other options.

We are not equipped to handle a DDoS attack of this magnitude and we need help. Some background:

  • The attack started on March 17 and we are receiving up to 2.6 billion requests per hour which is about 2500 times more than normal levels.

Thu, Mar 12, 2015

Collateral Freedom and the not-so-Great Firewall

Recognizing that the authorities have been hesitant to crackdown on our method of circumvention, we have accelerated our expansion of the development of collateral freedom, in three key areas.