cross the border

Why can't we access websites like Google?   Great Firewall of China

At the national level, network review and censorship are deemed necessary and justified for several reasons.
Firstly, it helps maintain social stability and security by preventing the spread of harmful or illegal information online, such as terrorism, extremism, pornography, and cyber fraud.
Secondly, it protects national sovereignty and interests by regulating and restricting access to foreign websites and services that may pose a threat to the country's political and economic systems.
Thirdly, it promotes cultural and moral values by filtering out content that is deemed inappropriate or offensive to the public, especially minors.

However, it should be noted that network review and censorship should be conducted within the bounds of the law, with transparency, accountability, and respect for human rights and freedoms. It should not be used as a tool to suppress dissenting opinions, stifle free speech or limit access to information without proper justification. It must also strike a balance between safeguarding national security and upholding individual rights and dignity.


if we want to cross the GFW, there are 3 ways:

cloud computing

Cloud computing is a computing model based on the Internet. It efficiently and securely manages and utilizes infrastructure and applications such as computation, storage, and networking by distributing computing resources and services across multiple data centers worldwide.

In terms of circumventing internet censorship, cloud computing is primarily used to provide efficient and stable proxy servers through multi-region resource deployment and rapid expansion capabilities. Users can purchase proxy servers provided by cloud computing service providers and use corresponding client software or browser plug-ins to access blocked websites.

vps

VPS (Virtual Private Server) is a virtualization technology that partitions a physical server into multiple virtual servers, isolates and protects resource sharing among users through software technology, and enables users to independently use server resources while enjoying traditional server security and reliability.

In terms of circumventing internet censorship, users can rent VPS servers and build proxy servers on them. Users can access the server through protocols such as SSH and SFTP, and install proxy software (such as Shado_socks and V_Ray) to provide efficient and stable circumvention services. Users can configure their browser or system network settings to set the proxy server as the default gateway, thereby accessing blocked websites.

cdn

CDN (Content Delivery Network) is a distributed network architecture that caches and distributes website content by deploying node servers worldwide, so that users can obtain required data nearby, thereby improving access speed and performance.

In terms of circumventing internet censorship, CDN can utilize its distributed node servers to provide efficient and stable proxy services. Users can register with a foreign CDN service provider, bind their domain name, and resolve the domain name of the blocked website to the CDN node server. This way, when users access the blocked website, they are actually accessing data on the corresponding CDN node server, thereby accessing the blocked website.


As ordinary users, We prefer to choose vps to cross the GFW.(Efficiency, controllability, cost, etc)


National-level network censorship and blockade is usually achieved through intermediaries such as operators and internet service providers. The main technical principles include:

  1. DNS pollution: When users attempt to visit a blocked website, they may be affected by DNS pollution, which redirects the Domain Name System to another IP address, resulting in users being unable to access the target website normally.
  2. IP blocking: By adding prohibited IP addresses to the routing tables of domestic operators and using the operators' own traffic filtering technology, users' access requests to prohibited websites are blocked.
  3. Deep packet detection: This method involves deep scanning, analysis, and filtering of data packets in network transmission to identify and intercept illegal content and behavior.

In addition, other technical means and control measures exist, such as HTTPS interception and VPN/proxy server blocking. These technical means can effectively achieve the purpose of censorship and lockdown, but may also bring certain negative impacts and risks, such as slow networks and unstable connections.

As you see, even we cross GFW by vps, we may still be intercepted because of Deep packet detection, so we need VPN protocol to avoid that. Or else your vps ip address may be judged to be illegal, and then it will bring some trouble……

posted @ 2023-05-01 00:25  Ashe|||^_^  阅读(19)  评论(0编辑  收藏  举报