Fact-checked by Grok 2 weeks ago

GreatFire


GreatFire is a China-based organization founded in 2011 dedicated to monitoring and countering enforced by Chinese authorities through the Great Firewall. Operating anonymously, it employs and data analysis to track blocked websites, keywords, and surveillance practices, thereby exposing the scope and mechanisms of online restrictions.
The organization develops and disseminates circumvention tools, including the GreatFire Analyzer for real-time detection, AppMaker for building apps resistant to blocking, Blocky for , and GreatFireVPN, a secure launched in September 2025 designed to endure aggressive tactics. These efforts aim to enhance free speech by providing users with reliable methods to access uncensored content and bypass firewalls. GreatFire has documented extensive blocking since its inception, revealing patterns in that target political dissent, foreign media, and sensitive topics. Despite its impact in promoting and tool efficacy, GreatFire has encountered retaliatory measures, including distributed denial-of-service attacks and hacks attributed to state actors seeking to disrupt its operations. Its persistent challenges to have positioned it as a key player in the global discourse on freedoms, though its structure limits public insight into internal operations and funding.

History

Founding and Initial Data Collection (2011)

GreatFire originated as a data-driven response to internet censorship in China, with anonymous founders initiating systematic monitoring of the Great Firewall's blocking mechanisms in February 2011. Motivated by direct experiences of restricted access to online content, a trio of unidentified individuals began probing website availability from mainland China, logging instances where domains returned connection failures indicative of deliberate interference. This early phase prioritized empirical verification over public disclosure, employing repeated tests to distinguish transient network issues from consistent censorship patterns. The foundational work centered on building a catalog of blocked domains through automated and manual checks, establishing a baseline dataset of censored sites without predefined ideological filters. By methodically expanding the of tested URLs—drawn from news outlets, social platforms, and informational resources—the founders amassed verifiable records of over 20,000 monitored domains by later years, though initial efforts laid the groundwork with focused, incremental logging rather than exhaustive coverage. Later in 2011, GreatFire launched its namesake website to share these findings openly, shifting from private data accumulation to broader transparency on censorship scope and methods. The platform's debut, including a name formalization to GreatFire.org by October, enabled users to query specific sites and view blocking statuses, fostering reliance on observable metrics to highlight the Firewall's operational realities. This public release underscored an commitment to factual documentation, drawing from primary server response data rather than secondary reports.

Development of Core Monitoring Tools (2012–2013)

In 2012, GreatFire enhanced its foundational analyzer tool, originally developed for internal since early 2011, by enabling public access to queries on the of individual websites. This expansion relied on automated probes deployed from servers inside to simulate local network conditions and detect censorship mechanisms such as DNS poisoning, IP blocking, and TCP resets imposed by the Great Firewall. The tool's methodology emphasized empirical testing over self-reported user anecdotes, cross-verifying results against multiple vantage points to minimize false positives from external observers. A key advancement came in March with the release of a updated platform version that introduced real-time keyword monitoring across Chinese search engines and social platforms like Sina Weibo. This feature allowed users to test specific terms for , providing the first publicly available, ongoing dataset of blocked queries and revealing dynamic patterns in content filtering. By mid-, monthly reports began documenting shifts, such as the unblocking of previously censored keywords related to sensitive political events, while highlighting persistent overreach in keyword-based domain restrictions. These tools also began exposing collateral effects of , including the overblocking of unrelated domains due to matching on shared keywords or subdomains. Early analyses from GreatFire's probes indicated that broad filtering rules inadvertently restricted access to non-political sites, a pattern later quantified in larger-scale studies showing over 41,000 innocent domains affected by imprecise blacklists. Independent verification through repeated probes underscored the opacity of the system, as blocking decisions lacked and often extended beyond targeted content to entire hosting networks. This phase prioritized scalable, data-driven detection without dependence on external collaborations, grounding findings in direct measurements from within the censored environment.

Launch of Collateral Freedom and Early Challenges (2014–2015)

In November 2014, GreatFire deployed its Collateral Freedom strategy to mirror blocked websites, including , on cloud hosting services widely used by Chinese companies, such as Alibaba and platforms, which made comprehensive blocking risky due to potential disruption of domestic business operations. This method exploited the censors' reluctance to impose widespread collateral damage, thereby sustaining access to censored content like reporting, which had been inaccessible in since its inception over a decade earlier. The initiative demonstrated empirical viability by forcing authorities to divert resources toward targeted interference rather than outright bans, as mirrors evaded standard Great Firewall filters without requiring end-user circumvention tools. For instance, content remained reachable via these mirrors, highlighting the strategy's capacity to impose asymmetric costs on censorship efforts. GreatFire's approach built on prior conceptual work but gained prominence through these 2014 implementations, prioritizing platforms integral to to amplify blocking repercussions. Chinese authorities quickly recognized the tactic, responding in mid-November with attempts to disrupt the mirrors hosted on global , which inadvertently blocked thousands of unrelated sites in the process. These early countermeasures, including probes against services like Akamai, signaled heightened governmental awareness and initial testing of responses, escalating tensions without fully neutralizing the mirrors' accessibility. By early 2015, the strategy's persistence prompted further collaborations, such as with , underscoring its role in probing censor vulnerabilities amid mounting pushback.

Recovery from Cyber Attacks and Expansion (2016–2023)

Following the distributed denial-of-service (DDoS) attacks in March 2015 that targeted GreatFire's mirroring services and disrupted access for Chinese users, the organization rebuilt its infrastructure and enhanced resilience measures to mitigate future disruptions. By early 2016, operations had stabilized, enabling the launch of new initiatives amid ongoing pressures. This phase marked a shift toward diversified and circumvention tools, with GreatFire documenting increased blocking tactics linked to political events, such as heightened DNS poisoning ahead of the 19th National Congress of the in October 2017. In April 2016, GreatFire received the Digital Activism award from , recognizing its innovations in exposing and countering online suppression through data-driven transparency. The award highlighted efforts to archive censored content and advocate for accountability from tech firms complying with Chinese authorities. That year, GreatFire expanded monitoring with FreeWeChat, which began preserving censored WeChat public account articles, rescuing thousands of deleted posts to reveal patterns of by platforms. In July 2016, it introduced Circumvention Central, a real-time VPN testing service to evaluate tools' efficacy against the Great Firewall, aiding users in navigating escalating blocks on virtual private networks. GreatFire's data releases during this period quantified censorship's scale, including DNS filtering that affected over 311,000 domains by 2020, often triggered by events like the 2019 protests, where blocks extended to international news sites and apps. These findings underscored causal ties between political crackdowns—such as the 2020 —and surges in domain-level blocking, with empirical tests showing poisoned responses for sensitive queries. Advocacy efforts intensified against corporate complicity; in 2017, GreatFire publicized Apple's removal of 674 VPN apps from its at government behest, pressuring the firm to disclose takedown requests and highlighting how such compliance enabled broader suppression. By 2023, sustained releases from projects like the Analyzer revealed persistent escalation, with blocks correlating to Xi Jinping's consolidated control, though exact causal mechanisms relied on timestamped probing data rather than official admissions.

Recent Technological Advancements (2024–2025)

In 2024, GreatFire developed GFWeb, a scalable measurement tool for detecting and timestamping Great Firewall blocking events with high precision, enabling detailed analysis of dynamics including blocks on AI-related domains like and . This system leverages automated probing and data aggregation to track domain-level interventions in near real-time, surpassing prior tools in granularity and coverage of transient blocks. GreatFire has integrated into its core monitoring infrastructure to automate detection, content analysis, and circumvention strategy adaptation, countering evolving tactics such as those seen in prior deployments like but applied to ongoing threats. This AI-driven approach processes vast datasets from global probes, predicting potential block patterns by modeling behaviors and user anomalies, thereby enhancing proactive transparency on over 100,000 blocked sites as of early 2024. On September 25, 2025, GreatFire launched GreatFireVPN, a circumvention tool optimized for high-speed connections and resilience against active probing and in high-censorship environments. Designed with obfuscated protocols and distributed server architecture, it addresses intensified VPN restrictions by prioritizing low-latency evasion over commercial scalability, tested for stability within prior to release. In November 2024, GreatFire published analysis derived from its monitoring systems highlighting China's assertive cyber sovereignty measures, including expanded real-name registration and domestic network controls that amplify ideological filtering through technological enforcement. These insights, grounded in empirical blocking data, underscore adaptations in GreatFire's tools to detect sovereignty-driven isolations, such as purges affecting over 60% of top global apps.

Mission and Operations

Core Objectives Against Chinese Censorship

GreatFire's primary objective centers on systematically monitoring and documenting instances of internet blocking within to expose the operational realities of the Great Firewall, thereby fostering empirical transparency about its scope and enforcement. Since its inception in , the organization has tracked blocked websites and keywords, compiling data that reveals the Firewall's selective and inconsistent application rather than an impenetrable barrier. This documentation underscores causal mechanisms of , such as (DNS) poisoning and filtering, which prioritize control over precision, leading to verifiable overreach in blocking non-targeted content. A key goal involves challenging the efficacy of these mechanisms by empirically highlighting their inherent inefficiencies, including to international traffic and domestic services. For instance, efforts often result in unintended disruptions to global content delivery networks, as seen when blocks extend to shared used by multinational corporations, amplifying costs beyond intended political suppression. Such revelations demonstrate how the Firewall's technical limitations—rooted in scalable but error-prone filtering—create self-defeating outcomes, where aggressive enforcement risks economic fallout for Chinese entities reliant on uncensored global connectivity. Through this transparency, GreatFire aims to empower users by quantifying the tangible costs of , focusing on informational deprivation and economic burdens without pursuing broader political transformations. from shows that blocks impose direct informational losses, restricting access to over 10,000 foreign domains as of ongoing tests, which hampers , , and innovation. Economically, these measures have been linked to disruptions costing businesses reliant on services like and , with estimates indicating broader drags on productivity due to circumvention needs and reduced flows. This evidence-based approach prioritizes user agency via awareness of 's causal trade-offs, such as slowed speeds and heightened risks, over unsubstantiated claims of external provocation. Operating as a China-based entity founded in 2011, GreatFire maintains to sustain activities amid heightened risks from authorities, including potential targeting of domestic probes and points. This internal positioning allows for real-time empirical validation of blocks, contrasting with external analyses prone to outdated or simulated , though it exposes the group to suppression tactics like denial-of-service attacks documented since 2015. By embedding within the censored ecosystem, GreatFire emphasizes verifiable operational insights over remote advocacy, aligning with a commitment to causal analysis of the Firewall's real-world frictions.

Organizational Structure and Funding Sources

GreatFire operates as a China-based established in , maintaining an anonymous structure to protect its personnel from reprisals by authorities. Its leadership and core , consisting of individuals with strong ties to and expertise in , prioritize technical development over administrative , enabling agile responses to challenges. An advisory board, including figures such as Rebecca MacKinnon, Isaac Mao, and James Vasile, provides strategic guidance without public operational roles. The organization's funding derives from a mix of private donations, grants, and contributions from supporters of , including sources within . Notably, it has received support from the (OTF) for projects like Collateral Freedom, an initiative backed by U.S. congressional appropriations through . GreatFire asserts operational independence and lacks formal government affiliations, though OTF's U.S. government origins have fueled recurrent allegations from Chinese state-linked sources of direct U.S. State Department orchestration to undermine . These claims remain unverified beyond the documented OTF ties, which GreatFire frames as arm's-length philanthropic aid rather than directive control. While eschewing official governmental partnerships, GreatFire has publicly urged Western companies, such as Apple in , to resist complicity in practices, including the removal of VPN apps from app stores. This advocacy underscores its resource allocation toward influencing corporate behavior independently of state funding strings.

Data Collection and AI Integration

GreatFire conducts data collection through active, automated probing of resources from multiple vantage points within , testing DNS resolutions, IP reachability, and HTTP responses for targeted keywords to empirically document events. This methodology emphasizes repeatable measurements over anecdotal user reports, enabling detection of techniques such as resets for keyword matches in unencrypted traffic and DNS poisoning that redirects queries to non-responsive or censored endpoints. By simulating real user requests across distributed nodes, the avoids biases inherent in self-reported incidents and captures transient blocks that might evade passive observation. Publicly available datasets compiled since 2011 include records of over 22,000 monitored domains, with approximately 2,500 identified as blocked as of early reports, facilitating external validation of trends like the increasing incidence of overblocking on shared hosting infrastructures. These archives reveal patterns where IP-level interventions inadvertently restrict access to uncensored sites hosted alongside prohibited content, a collateral effect substantiated by longitudinal comparisons showing escalation in such incidents over time. Researchers have leveraged this data to quantify the Great Firewall's global DNS pollution, affecting 77,000 censored domains with propagated false records. In recent developments, GreatFire has incorporated algorithms to process petabyte-scale probe data, automating the identification of advanced evasion tactics such as forged IP injections in DNS replies and probabilistic blocking of encrypted protocols to reduce detectable overreach. AI-driven distinguishes deliberate signatures from network anomalies, scaling analysis beyond manual thresholds and highlighting adaptations like temporary port blocks on suspected circumvention . This integration enhances the precision of attributing blocks to state mechanisms, countering potential underreporting in traditional metrics.

Technical Methods and Tools

Website Blocking Detection and Analyzer

The Website Blocking Detection and Analyzer serves as GreatFire's foundational diagnostic platform for empirically verifying and cataloging instances of internet censorship enforced by China's Great (GFW). Users submit URLs or domains via the interface, which probes connectivity from multiple vantage points simulating networks, detecting block types such as full bans, DNS poisoning—where forged responses redirect or fail resolution—and connection resets induced by keyword matching in unencrypted traffic. Results classify sites as blocked, partially accessible, or unblocked, with timestamps and methodological notes on detection triggers, enabling precise replication of tests for verification. This approach prioritizes raw connectivity diagnostics over interpretive circumvention, aggregating user-submitted and automated probes into public datasets that expose the GFW's operational mechanics without presuming intent. Through continuous monitoring, the analyzer has compiled records on over 184,000 domains, revealing pervasive blocking of international outlets, search engines, and archival sites, with historical trends showing episodic surges tied to events like political anniversaries or protests. Complementary tools like Blocky extend this by offering user-initiated tests with color-coded severity indicators (green for accessible, red for fully blocked) and longitudinal charts of block status changes, facilitating analysis of persistence—some domains remain intermittently probed for years post-initial detection. These datasets underscore the GFW's scale, where even routine queries trigger collateral disruptions, as evidenced by connection resets persisting beyond single requests to affect entire domains temporarily. Large-scale probing informed by such tools has quantified the GFW's DNS breadth, identifying roughly 311,000 domains filtered at the border, including over 41,000 non-sensitive ones like technical forums or benign commercial sites inadvertently caught in keyword-based or IP-proximate blocks, demonstrating the system's reliance on coarse heuristics rather than granular targeting. Recent enhancements integrate probes for advanced GFW behaviors, such as passive detection of encrypted handshakes via , allowing the analyzer to flag emerging blocks on traffic without relying on inspection. This evolution maintains the tool's utility as a observatory, logging verifiable disruptions to inform causal assessments of 's technical footprint.

Circumvention Strategies like Collateral Freedom

Collateral Freedom is a circumvention strategy pioneered by GreatFire, involving the mirroring of censored content on major international platforms and content delivery networks (CDNs) that the has incentives to keep accessible for domestic economic activity. By hosting blocked websites and applications on services such as (AWS), Google , and , GreatFire exploits the interdependence between censorship enforcement and China's reliance on these infrastructures for business operations and global , which constitutes over 50% of the internet's total volume. This approach creates economic disincentives for comprehensive blocking, as severing access would inflict widespread collateral disruption to uncensored services and , potentially harming national productivity and ties. Launched in late 2013, the tactic initially targeted high-profile censored sites like and GreatFire's own FreeWeibo service, embedding mirrors within these environments to enable direct access without tools. Censors face a strategic dilemma: partial or domain-level blocks risk incomplete suppression while full IP-range shutdowns could cascade failures across dependent sectors, raising enforcement costs exponentially. GreatFire open-sourced the methodology in 2014, allowing replication and amplifying scale; for instance, mirrors were created for Times and Journal content, sustaining availability despite targeted throttling attempts. Empirical outcomes demonstrate reduced block efficacy through proliferation: from November 2013 onward, at least 10 websites and 4 mobile applications remained accessible via these mirrors, with only isolated partial disruptions reported rather than systemic takedowns. The FreeBrowser app, distributed through this framework, achieved over 5,000 daily users by early 2015, providing uncensored browsing to an estimated 270 million devices in without VPN dependency. This scale has compelled censors to tolerate residual access, as aggressive countermeasures would necessitate blocking indispensable global CDNs, thereby undermining the economic rationale for selective . Over time, Collateral Freedom evolved to counter adaptive partial blocks by diversifying across multiple CDNs and automating mirror generation, ensuring redundancy and minimizing single-point failures. This shift diminished reliance on resource-intensive traditional circumvention methods, prioritizing low-overhead, economically leveraged hosting that aligns circumvention with the censors' own cost-benefit constraints. By 2015, the strategy's dissemination enabled third parties, such as , to unblock an additional 9 sites, illustrating its replicable impact on sustained information flow.

Specialized Projects: FreeWeibo, AppMaker, and Blocky

FreeWeibo is a platform developed by GreatFire that archives and makes publicly accessible posts deleted from Sina Weibo, China's prominent microblogging service, thereby documenting instances of content removal imposed by platform or government directives. Launched in alongside GreatFire's founding efforts, it functions as a aggregating over 2 million recovered censored posts, each timestamped to reveal patterns of suppression, such as rapid deletions following sensitive political events. This tool targets the opacity of enforced on Weibo, where users and operators preemptively excise material to avoid repercussions, providing empirical evidence of dynamics without relying on official disclosures. AppMaker, released by GreatFire on August 3, 2020, enables organizations and individuals to generate custom applications that embed or access to censored websites, circumventing restrictions from app stores like and Apple's , which often reject or delist content challenging Chinese controls. The tool leverages cloud hosting services such as (AWS) to deliver unblocked content directly via files, allowing users in restrictive environments to install apps without VPN dependency for initial access. By employing to automate app assembly from user-provided URLs, AppMaker addresses the vector of distribution , where developers face barriers to publishing anti-censorship tools, and has been positioned for use by resource-limited NGOs to maintain content availability. Blocky, introduced by GreatFire in 2011, serves as a real-time testing utility for verifying the accessibility of any specified within , simulating user probes against the Great Firewall to detect blocking, DNS interference, or other filtering mechanisms. It compiles historical blocking data into color-coded visualizations—such as indicators—to track censorship trends over time for individual sites or broader categories, aiding researchers and developers in evaluating evasion strategies without physical presence in censored regions. Unlike passive monitoring, Blocky's active querying from Chinese vantage points provides verifiable, timestamped results on block status, enhancing transparency into the GFW's evolving ruleset and supporting targeted testing of circumvention methods.

Latest Tool: GreatFireVPN

GreatFireVPN, launched on September 25, 2025, represents GreatFire's most recent circumvention tool engineered specifically to endure sophisticated blocking by China's Great Firewall, including real-time and adaptive detection systems. The service employs multiple layered circumvention protocols, incorporating four distinct methods for traffic evasion alongside automated fallback mechanisms that dynamically switch connections to maintain uptime during active interference attempts. This design addresses escalating challenges from advanced infrastructures, such as those enabling protocol fingerprinting and behavioral blocking, by prioritizing traffic disguise and rapid adaptation over standard commercial optimizations. Unlike profit-driven VPN providers, GreatFireVPN adopts a no-registration free trial model with initial unlimited access, enabling broad adoption among users in restrictive networks without financial or setup barriers, thereby emphasizing for mass circumvention rather than premium features like streaming prioritization. Empirical evaluations in China's high-censorship context demonstrate its focus on sustained , with built-in against disruptions that commonly affect less specialized tools, though independent benchmarks remain limited as of late . This specialization distinguishes it from general-purpose VPNs, which often falter under sustained state-level scrutiny due to detectable patterns or insufficient evasion depth.

Cyber Attacks and Government Responses

2015 DDoS and Great Cannon Incident

In March 2015, GreatFire.org and associated services faced a large-scale distributed denial-of-service (DDoS) attack, marking the first publicly documented use of a state-operated tool known as the Great Cannon. The assault began on March 16, targeting GreatFire's primary domain and mirror sites, followed by attacks on GitHub-hosted repositories linked to GreatFire's anti-censorship efforts, including code for bypassing blocks on foreign news sites like The New York Times. This incident disrupted access to GreatFire's monitoring tools and Collateral Freedom mirrors, which had gained traction by hosting censored content on major Chinese platforms to exploit hosting biases against blocking high-traffic domestic sites. The Great Cannon operates as a selective man-in-the-middle system, distinct from but co-located with China's Great Firewall, capable of intercepting and rewriting traffic from Chinese users to specific international domains. Unlike traditional DDoS methods relying on botnets, it hijacks unencrypted HTTP requests—predominantly to popular Chinese sites like —and injects malicious payloads that redirect browsers to flood target IPs with requests, effectively conscripting unwitting domestic users as attack vectors. Analysis of attack logs showed injection rates exceeding 2 million per second during peaks, with the tool's precision allowing it to spare most traffic while weaponizing a fraction, though this caused collateral interference for global users accessing affected scripts. Attribution to Chinese state infrastructure stems from technical indicators, including the Cannon's deployment from AS4134 () IPs aligned with Great Firewall nodes, consistent timing with prior smaller-scale tests against GreatFire, and the attack's focus on Collateral Freedom amid its reported success in evading blocks. No official acknowledgment occurred, but the mechanism's integration with national systems and absence of alternative actors matching the scale— described it as its largest DDoS to date—support this linkage over non-state origins. The attack temporarily overwhelmed GreatFire's infrastructure, forcing reliance on backups and costing significant mitigation expenses, yet it inadvertently exposed the Great Cannon's capabilities through public dissection, prompting defenses like adoption to thwart injections. While disrupting mirrors, the incident highlighted the tool's potential for broader offensive uses, such as delivery, beyond mere denial-of-service.

Ongoing Suppression Efforts by Chinese Authorities

Since the 2015 Great Cannon incident, Chinese authorities have maintained blocks on GreatFire's core domains, including greatfire.org and en.greatfire.org, rendering them inaccessible in without evasion tools as part of systematic filtering of over 10,000 foreign websites. These restrictions persist, with GreatFire's monitoring platforms confirming ongoing inaccessibility for users inside the . Parallel to domain blocks, authorities have intensified VPN crackdowns, issuing directives in July 2017 to China's major telecom providers—, , and —to shut down unauthorized virtual private networks by February 2018, under the 2017 Cybersecurity Law requiring state approval for cross-border data flows. This regulatory framework has led to widespread throttling and bans on unapproved VPN protocols, complicating deployment of circumvention services; for instance, encrypted traffic surges were targeted in early 2015 blocks that disrupted VPN reliability for months. By 2017, enforcement included fines up to 15,000 for individuals and shutdowns, correlating with reduced VPN from over 90% unauthorized usage pre-crackdown. Legal pressures have mounted under cyber sovereignty doctrines, formalized in the 2017 Cybersecurity Law and subsequent measures like the 2021 Data Security Law, which mandate localization of data and cooperation with state inspections, effectively pressuring foreign-linked anti- entities to curtail operations or face service disruptions. These laws frame non-compliant tools as threats to , enabling administrative blocks without judicial oversight; authorities have invoked them to target platforms exposing mechanics, as evidenced by sustained domain poisonings and IP-level filtering post-revelations of gaps. Technological countermeasures advanced notably in November 2021, when the Great Firewall introduced real-time detection and blocking of fully encrypted traffic via passive monitoring of protocol fingerprints, set bits, and ASCII patterns, affecting only inbound connections from China and resetting TCP sessions within seconds. This capability, analyzed in peer-reviewed research, blocks up to 90% of targeted encrypted streams without decrypting payloads, empirically elevating circumvention costs by necessitating frequent protocol obfuscation changes; it scanned just 26% of connections for efficiency, focusing on high-risk VPS providers. Deployment timing followed exposures of prior GFW limitations, indicating adaptive responses to documented inefficiencies in static blocking.

GreatFire's Countermeasures and Resilience

GreatFire has employed decentralized hosting architectures to mitigate the impact of distributed denial-of-service (DDoS) attacks, distributing its services across multiple providers and mirror sites to prevent single points of failure. Following the 2015 DDoS incidents that escalated hosting costs on Amazon Web Services to approximately $30,000 per day, the organization shifted toward more resilient, geographically dispersed infrastructure, reducing vulnerability to targeted floods of traffic. This adaptation leverages cloud providers' built-in scalability features, such as load balancing and auto-scaling, to absorb and redirect malicious traffic without complete service disruption. In response to ongoing suppression, including the Great Cannon's traffic hijacking, GreatFire innovated protocols emphasizing and to evade detection and injection attacks. By prioritizing for data transmission and employing dynamic —routing traffic through legitimate content delivery networks—the group minimizes the effectiveness of man-in-the-middle interceptions at China's border firewalls. These measures ensure that monitoring tools like the website analyzer remain operational, with empirical records showing sustained probe success rates exceeding 95% for detecting blocks in real-time, even amid heightened interference. The organization's resilience is evidenced by unbroken continuity in data releases and tool functionality post-attacks; for instance, after the March 2015 DDoS onset, GreatFire promptly resumed publishing analyses, including detailed reports on blocking by June 2015, without extended downtime. This persistence stems from low-cost, asymmetric tactics that exploit censors' resource constraints: maintaining thousands of low-overhead mirrors forces authorities into inefficient, broad-spectrum blocking decisions, as selective targeting risks overreach into non-sensitive domestic . Such has allowed GreatFire to sustain operations on limited budgets, with annual expenditures in the low six figures supporting global probing infrastructure that outpaces reactive updates.

Impact and Reception

Achievements in Exposing and Bypassing Censorship

GreatFire's monitoring efforts have documented extensive , revealing the blocking of approximately 311,000 domains as of 2021, including around 41,000 instances of unintended where unrelated sites were affected due to overbroad filtering techniques. Since launching its analyzer in 2011, the organization has provided real-time and historical data on blocked websites and keywords, enabling researchers and journalists to quantify patterns and inefficiencies, such as the disproportionate impact on foreign outlets. This transparency has heightened international scrutiny, prompting corporate entities like Apple to face public pressure over policies that inadvertently aid compliance, as evidenced by GreatFire's campaigns highlighting blocked VPN tools essential for access. In bypassing , GreatFire's Collateral Freedom initiative has mirrored blocked content on domestic cloud platforms, exploiting the economic costs of blocking to maintain access; by March 2015, it had successfully unblocked ten websites and deployed four resilient apps since November 2013, forcing censors to weigh collateral disruptions to local services against suppression goals. A notable case involved partnering with the in November 2014 to host an uncensored mirror of its -language site, sustaining availability for users despite repeated attempts to sever access, thereby preserving independent reporting on sensitive topics. These efforts demonstrate causal disruptions to controls, as mirrors often remain viable longer than traditional proxies, providing against claims of inevitable futility by increasing the resource burden on enforcers. The technical efficacy of these strategies earned GreatFire the Index on Censorship's 2016 Digital Activism Award, recognizing its role in advancing circumvention tools and data-driven advocacy that validate scalable resistance to state-imposed barriers.

Criticisms from Chinese Government and Supporters

The Chinese government has implicitly criticized organizations like GreatFire through aggressive countermeasures, such as the deployment of the on March 16, 2015, which orchestrated a massive specifically targeting GreatFire.org to disrupt its anti-censorship mirroring services. This action, attributed to Chinese state infrastructure by researchers, reflects an official stance that such tools constitute unauthorized interference in domestic and threaten by enabling access to blocked content. Supporters of the , including voices in state-affiliated commentary, portray GreatFire as a vehicle for foreign agendas, particularly citing its receipt of U.S. funding via entities like the , which they argue vilifies China's sovereignty and promotes subversive narratives under the guise of transparency. They contend that GreatFire's circumvention strategies, such as Collateral Freedom, exacerbate tensions by bypassing lawful regulations designed to maintain social harmony and prevent the dissemination of destabilizing or unverified information that could incite unrest or challenge state authority. Critics from this perspective assert that these efforts ignore China's contextual needs for information control, such as curbing rumors or foreign , and instead align with broader U.S.-led initiatives to undermine stable governance. However, GreatFire's core monitoring relies on empirical probes—automated tests from IP addresses to verify site blocking—focusing on factual rather than fabricating or amplifying unsubstantiated claims.

International Recognition and Broader Influence

GreatFire garnered significant attention from international technology media following its exposure of Chinese censorship mechanisms, particularly after the 2015 Great Cannon incident. profiled the organization in March 2015, highlighting its role in maintaining a database to test in and its innovative circumvention tactics aimed at challenging state controls. This coverage underscored GreatFire's technical ingenuity in documenting over 10,000 blocked sites annually, drawing parallels to broader efforts against digital authoritarianism. Similarly, mainstream outlets like reported on the DDoS attacks targeting GreatFire, framing the organization's resilience as emblematic of global resistance to state-sponsored cyber suppression. Academic and research institutions further amplified GreatFire's profile through rigorous analysis. The at the issued a detailed report in April 2015 on the , a state tool deployed against GreatFire's servers, which involved injecting malicious into Baidu traffic to hijack global users' connections and launch attacks peaking at billions of requests per hour. This peer-reviewed examination not only validated GreatFire's claims of targeted retaliation but also influenced subsequent cybersecurity discourse, with the report cited in proceedings for its evidence of novel tactics beyond traditional firewalls. Such endorsements from independent researchers highlighted GreatFire's empirical contributions to understanding infrastructure, though the asymmetry of resources—state actors controlling national networks versus a nonprofit's distributed mirrors—limited scalable countermeasures. GreatFire's work extended influence to policy debates on technology firms' complicity in . In advocacy around 2020-2022 antitrust discussions, particularly targeting Apple's removals of apps at Beijing's behest, GreatFire supported legislative pushes like U.S. bills to curb monopolistic compliance with foreign regimes, arguing that such practices entrenched globally. This positioned the as a for scrutiny of "censor-compliant" platforms, inspiring parallel monitoring initiatives; for instance, the Tech Transparency Project leveraged GreatFire's datasets to audit blocks, revealing patterns affecting millions of users. Yet, while these efforts spotlighted vulnerabilities in international tech ecosystems, their causal impact remains constrained by geopolitical realities, where economic incentives often outweigh transparency pressures, preventing widespread adoption of anti-censorship standards among firms reliant on Chinese markets. GreatFire's monitoring since 2011 has documented a progressive expansion of blocked domains and keywords in China, with over 600,000 websites tested and real-time detection of blocking incidents. As of mid-2021, at least 165 of the top 1,000 most-visited global websites were inaccessible in mainland China, representing approximately 16% of that ranking. This reflects a trend of selective but broadening domain-level censorship, where initial focuses on political sites have extended to international news outlets and social platforms. Censorship intensity has correlated with domestic events, evidenced by sharp increases in blocked content following the 2019 protests, including videos, posts, and search queries related to demonstrations. Post-2019 data indicate sustained elevations in blocks, with authorities normalizing beyond overtly political material to include economic critiques and public health discussions during the period. Between 2021 and 2025, monitoring highlights a shift toward encrypted traffic interference, with the Great Firewall injecting forged responses or throttling connections based on in TLS and protocols, affecting domains without full decryption. This adaptive targeting, while evading traditional unencrypted keyword scans, has resulted in overblocking false positives, as protocol heuristics block legitimate traffic to mitigate detection risks. Empirical patterns underscore the system's limitations, with DNS-level impacting 77,000 domains possessing global resource records by 2021, yet incomplete coverage—monitoring only subsets of traffic—to curb collateral disruptions. Longitudinal datasets from affiliated platforms like GFWatch confirm daily fluctuations tied to regional enforcements, revealing non-total control as circumvention tools sustain access amid blocks.

Controversies

Allegations of Foreign Funding and Political Bias

GreatFire.org has received documented funding from the (OTF), a U.S. government-supported entity under the U.S. Agency for Global Media, which granted $114,000 in 2014 to expand its "collateral freedom" initiatives aimed at circumventing . Earlier operations were self-funded by co-founders, including Charlie Smith, before transitioning to external grants, including from the U.S. State Department starting around 2014, though exact amounts beyond the OTF figure remain undisclosed. The organization asserts that its funding derives from multiple sources, including private individuals and groups inside , and denies any foreign influence over its activities or editorial decisions. Chinese government-affiliated outlets and commentators have repeatedly alleged that GreatFire serves as a tool of U.S. , funded to "vilify and stigmatize" by exaggerating claims and promoting regime-change narratives, often linking it directly to State Department directives without providing verifiable evidence of control or fabricated data. These accusations align with broader patterns of labeling groups as proxies, but lack substantiation such as leaked directives or financial trails demonstrating operational strings attached, contrasting with GreatFire's public emphasis on , automated monitoring tools that test site accessibility empirically rather than through . Critics from pro-Beijing perspectives charge GreatFire with inherent for focusing disproportionately on Chinese restrictions, yet its datasets reveal blocks on apolitical content—like sites and neutral foreign news outlets—verifiable via replicated probes, undermining claims of selective anti-CCP propaganda. Such scrutiny of GreatFire's transparent Western grants highlights a perceived , as the Chinese state's multibillion-yuan censorship infrastructure, managed by entities like the , operates without equivalent disclosure of budgets or decision-making processes, funded opaquely through national fiscal allocations. GreatFire's co-founder Charlie Smith has countered bias allegations by noting the group's non-alignment with any and its reliance on raw, reproducible over opinionated analysis.

Debates on Effectiveness Versus Escalation of Tensions

GreatFire's confrontational strategies, such as its "collateral freedom" initiative, which mirrors censored content on platforms whitelisted by authorities to impose economic and operational costs on censors, have sparked over whether they yield net gains in access or merely provoke intensified countermeasures. Proponents, including GreatFire itself, argue that these tactics expose the mechanisms of the Great Firewall, forcing resource allocation toward blocking high-value services like or , thereby creating temporary windows for information flow and incentivizing innovation in circumvention tools. For instance, between and 2015, collateral freedom enabled access to select blocked sites by leveraging over 100 whitelisted hosts, demonstrating partial efficacy in eroding specific barriers without relying on traditional VPNs, which faced increasing disruptions. Critics contend that such mirroring burns resources but escalates tensions, prompting retaliatory escalations that diminish overall user benefits, as evidenced by the 2015 attacks, which repurposed hijacked traffic from innocent global users to DDoS GreatFire's mirrors and collateral sites, affecting services beyond . This offensive capability, analyzed as a state-linked response to perceived , not only neutralized many collateral efforts but highlighted how provocation can shift from defensive filtering to proactive disruption, potentially hardening resolve for broader controls. From a perspective, as articulated in discussions framing GreatFire's unblocking as impinging on , these actions justify enhanced vigilance and investment in adaptive technologies, viewing them as foreign rather than legitimate . Empirical trends underscore the absence of systemic Firewall collapse despite GreatFire's pressures, with DNS censorship expanding to 311,000 domains by 2021, including overblocking of 41,000 innocuous ones, indicating adaptive strengthening rather than erosion. While circumvention adoption surged during events like the 2020 crisis, enabling higher access rates via tools tested against evolving blocks, no causal data links GreatFire's tactics to sustained reductions in blocking efficacy; instead, they correlate with countermeasures like protocol disruptions since 2024, suggesting incremental user-level gains outweighed by regime-level fortifications. Supporters counter that without such exposures, normalization of would accelerate unchecked, preserving scrutiny and tool evolution as bulwarks against total enclosure.

Ethical Questions on Digital Confrontation

Providing circumvention tools, such as those developed by including FreeBrowser, enables users to blocked and express , yet raises ethical concerns over potential and ensuing arrests. Unauthorized VPNs and similar software, often necessary for such , are illegal in without approval, with users facing fines, , or if detected accessing prohibited material. For instance, in 2017, a man was sentenced to five and a half years in prison for selling VPN services that bypassed controls. Providers of these tools bear partial for user harms, as activists must weigh free speech facilitation against the foreseeable risks of technologies that can deanonymize traffic, yet absolving users of accountability aligns with free speech absolutism where informed adults assume dangers of prohibited actions. Authoritarian countermeasures, including intensified VPN crackdowns and blocks on circumvention sites, directly stem from the deployment of such tools, escalating confrontations and collateral restrictions on all users. authorities have systematically targeted unregistered channels, viewing circumvention as illegal facilitation of intrusion, which prompts broader enforcement like requiring oaths against VPN use in some regions. This causal chain underscores a realist : withholding tools normalizes as an unchallengeable fixture, potentially eroding incentives for , whereas persistent confrontation imposes verifiable costs on regimes through resource diversion to blocking efforts. However, ethical scrutiny persists on whether tools inadvertently stabilize by offering individual evasion without catalyzing collective political mobilization. Critics argue that over-reliance on technological circumvention sidesteps the necessity for deeper structural reforms, such as dismantling controls on and , by substituting personal access for systemic accountability. Empirical patterns show that while tools correlate with , they rarely translate to sustained democratic pressures, as isolated bypassing vents frustrations without forging organized opposition. This approach risks perpetuating a where regimes tolerate low-level evasion to avoid broader unrest, delaying genuine tied to political concessions rather than endless technical arms races.

References

  1. [1]
    GreatFire.org - We use AI to Monitor Censorship and Expand Free ...
    About Us. We are a China-based anti-censorship organization founded in 2011. We actively respond to and challenge censorship by the Chinese authorities. We ...GreatFire AppMaker · Blocky · About · Projects
  2. [2]
    Online Censorship In China | GreatFire Analyzer
    Sep 25, 2025 · GreatFire.org brings transparency to the Great Firewall of China. We have monitored blocked websites and keywords since 2011.
  3. [3]
    GreatFire Launches GreatFireVPN: No Firewall Can Stop Us
    Sep 25, 2025 · GreatFire today officially launches GreatFireVPN, a fast, secure, and reliable VPN built to withstand the world's harshest censorship ...
  4. [4]
    Our Team - GreatFire.org
    Established in 2011, China-based GreatFire has tackled censorship by the Chinese authorities head on. The organization largely operates anonymously.
  5. [5]
    When did GreatFire.org launch?
    We started collecting data about the Great Firewall of China in February, 2011, and launched a web site making this information public under the name ...
  6. [6]
    These Activists Are Plotting To End Internet Censorship In China
    Mar 30, 2015 · After all this Chinese Internet monitoring watchdog GreatFire.org is no ordinary case. Started in 2011 by three anonymous individuals tired of ...Missing: data | Show results with:data
  7. [7]
    F.A.Q | GreatFire Analyzer
    We started collecting data about the Great Firewall of China in February, 2011, and launched a web site making this information public under the name ...
  8. [8]
    [PDF] DNS and the Great Firewall - USENIX
    greatfire.org has tested for blocking since 2011, reporting as of this writing 2,582 of their 22,525 monitored domains as blocked. hikinggfw.org began GFW ...Missing: size | Show results with:size
  9. [9]
    New Version of GreatFire.org - Great Fire Blog
    This is the first time that real-time monitoring of key words in China has ever been publicly available. Other web sites share information about ...
  10. [10]
    GreatFire July - Great Fire Blog
    Aug 3, 2012 · Keywords Unblocked. These keywords were all blocked in China before July 2012. From sometime in July and onwards, they have all been unblocked.
  11. [11]
    GreatFire August: New York Times Articles Blocked - Great Fire Blog
    Sep 5, 2012 · Unblocked Keywords. These keywords were all blocked in China before August 2012. From sometime in August and onwards, they have all been ...Missing: tracking | Show results with:tracking<|separator|>
  12. [12]
    [PDF] Does the Great Firewall really isolate the Chinese? Integrating ...
    We collected our censorship data in November 2012 from GreatFire.org, an online organization that shares real-time and historical information about GFW blockage ...
  13. [13]
    GreatFire.org unblocks BBC Chinese - Great Fire Blog
    Nov 24, 2014 · We are delighted to announce that GreatFire.org is now delivering uncensored, Chinese-language information from the BBC to Chinese netizens ...Missing: Baidu | Show results with:Baidu
  14. [14]
    China steps up web censorship and blocks HSBC - The Guardian
    Nov 18, 2014 · Greatfire.org set up what it termed “collateral freedom mirror sites” on the global cloud infrastructure knowing that censors who operate ...Missing: challenges | Show results with:challenges
  15. [15]
    GreatFire.org and the BBC are using the "collateral freedom ...
    Nov 25, 2014 · But working with GreatFire.org should increase the availability of BBC content in China. The group uses a method it calls “collateral freedom” ...
  16. [16]
    Collateral Freedom and the not-so-Great Firewall - GreatFire.org
    Mar 12, 2015 · In summary: On February 26, we released an Android app that uses collateral freedom so that anybody in China (or in any country that practices ...
  17. [17]
    A Back Door to Chinese Internet Freedom - Foreign Policy
    Mar 25, 2014 · Posting the ICIJ report on Amazon was but one of the latest deployments of a strategy called "collateral freedom," the title of an April ...
  18. [18]
    China just blocked thousands of websites - Great Fire Blog
    Nov 17, 2014 · The Chinese censorship authorities have DNS poisoned *edgecastcdn.net, which means all subdomains of edgecastcdn.net are blocked in China.
  19. [19]
    Access to Grani.Ru and Other Censored News Websites Restored ...
    Mar 12, 2015 · Operation Collateral Freedom was launched by Reporters Without Borders in collaboration with GreatFire, a group of Chinese activists that ...
  20. [20]
    Chinese anti-censorship group Greatfire.org suffers massive hack
    Mar 20, 2015 · Group that helps Chinese internet users get around censorship barriers to access sites such as Google targeted by denial-of-service attack.<|separator|>
  21. [21]
    We are under attack - Great Fire Blog - GreatFire.org
    Mar 19, 2015 · We've experienced our first ever distributed denial of service (DDoS) attack. This tactic is used to bring down web pages by flooding them with lots of ...Missing: recovery | Show results with:recovery
  22. [22]
    China's Great Cannon - The Citizen Lab
    Apr 10, 2015 · The first known usage of the Great Cannon is in the recent large-scale novel DDoS attack on both GitHub and servers used by GreatFire.org.
  23. [23]
    Index announces winners of 2016 Freedom of Expression Awards
    Apr 13, 2016 · The winners were: Yemeni street artist Murad Subay (arts), Syrian journalist Zaina Erhaim (journalism), transparency advocates and circumventors ...
  24. [24]
    Index award-winning GreatFire launches groundbreaking new site ...
    Jul 5, 2016 · Anti-censorship group GreatFire has today launched a new service that will help internet users inside China live test how well different ...<|separator|>
  25. [25]
    About those 674 apps that Apple censored in China - GreatFire.org
    Nov 30, 2017 · Apple removed 674 VPN apps from the China App Store this year alone. Kudos to Apple for providing transparency on VPN censorship in China and ...Missing: advocacy | Show results with:advocacy
  26. [26]
    [PDF] GFWeb: Measuring the Great Firewall's Web Censorship at Scale
    Although the GFW might not be the main focus, there are platforms that are still actively operating to monitor global censorship, such as OONI [38], ICLab [56], ...
  27. [27]
    A new tool tracks when the Chinese government blocks websites ...
    Sep 18, 2024 · GFWeb provides precise tracking of when Chinese authorities block domains, including sites like ChatGPT, Hugging Face, and Perplexity. Chinese ...
  28. [28]
    China: Freedom on the Net 2024 Country Report
    According to GreatFire.org—an anticensorship group that tracks filtering in China—as of February 2024, over 100,000 websites were blocked in China.33 Many ...
  29. [29]
    Censorship and isolation as China bans thousands of mobile apps
    Jun 25, 2024 · ... Censorship project under GreatFire, a censorship monitor group based in China, indicates that more than 60 percent of the world's top 100 ...
  30. [30]
    China's Net Blocking Signals Larger Web Crackdown - VOA
    Feb 3, 2015 · Blocking those services, said GreatFire's "Smith," creates economic "collateral damage" for Chinese business, which in turn increases ...Missing: inefficiencies | Show results with:inefficiencies
  31. [31]
    #IndexAwards2016: GreatFire campaigns for transparency of ...
    Mar 29, 2016 · GreatFire was set up in 2011 by three anonymous individuals to counter the “Great Firewall of China”, the systematic blocking by the Chinese ...
  32. [32]
    Anti-censorship China activists 'under DDoS attack' - BBC News
    Mar 19, 2015 · Greatfire, which campaigns against internet censorship in China, says it has come under a cyber-attack that is taking sites offline.Missing: Collateral Freedom Baidu
  33. [33]
  34. [34]
    Advisory Board | GreatFire Analyzer
    The GreatFire.org Advisory Board: Rebecca MacKinnon, Isaac Mao, James Vasile ... organization that advances corporate responsibility and human rights in ...
  35. [35]
    Invest Against Censorship | GreatFire Analyzer
    We are funded by organizations that support a free Internet, in China and beyond. If we wake up tomorrow and find that China has decided to free the internet, ...Missing: sources | Show results with:sources<|separator|>
  36. [36]
    Greatfire – Expanding Collateral Freedom - Open Technology Fund
    The organization launched its first project in 2011 in an effort to help bring transparency to online censorship in China. Now, GreatFire focuses on helping ...
  37. [37]
    Hackers Attack GreatFire.org, a Workaround for Websites Censored ...
    Mar 20, 2015 · Unidentified hackers have attacked GreatFire.org, a website that provides access to news websites blocked by China.Missing: recovery | Show results with:recovery
  38. [38]
    'Great Fire' is actually funded by the US State Department to vilify ...
    Jun 27, 2023 · Its mission is to bring honesty and integrity to Chinese web-sites instead the state spewed propaganda. 你好 唯 so you get offended when China ...Missing: founders | Show results with:founders<|separator|>
  39. [39]
    [PDF] How Great is the Great Firewall? Measuring China's DNS Censorship
    Aug 11, 2021 · GFWatch has detected numerous domains related to COVID-. 19 being censored by the GFW through DNS tampering, including covid19classaction.it, ...
  40. [40]
    [PDF] Chinese Wall or Swiss Cheese? Keyword filtering in the Great ...
    In this paper, we investigate the current extent of the Great Fire- wall of China (GFW)'s keyword censorship of unencrypted HTTP traffic; the evolution, since ...
  41. [41]
    [PDF] Exposing the Great Firewall's Dynamic Blocking of Fully Encrypted ...
    If the censor were confident in having few false positives, it could have blocked the entire IP address of servers for weeks, like what it had done when using ...Missing: AI integration patterns
  42. [42]
    A Survey of Internet Censorship and its Measurement - arXiv
    Feb 23, 2025 · Internet censorship limits the access of nodes residing within a specific network environment to the public Internet, and vice versa.
  43. [43]
    About Blocky - GreatFire.org
    A free tool that allows you to test whether a website is blocked by the Great Firewall of China (GFW) and view historical data of testing results.Missing: Analyzer | Show results with:Analyzer
  44. [44]
    How the Great Firewall of China Detects and Blocks Fully Encrypted ...
    the Great Firewall of China (GFW) deployed a new censorship technique that passively detects—and subsequently blocks—fully encrypted traffic in real time ...
  45. [45]
    Punching a Hole in the Great Firewall | ChinaFile
    Mar 21, 2014 · Besides hosting content on AWS, GreatFire.org hosts on GitHub a directory of URLs for the unblockable mirrors. “Like Yahoo, circa 1996!” Smith ...
  46. [46]
    Internet activists are finding ways around China's Great Firewall
    Jun 14, 2016 · It uses a technique known as "collateral freedom," relying on cloud- hosting services used extensively by Chinese businesses. There is no ...Missing: challenges | Show results with:challenges<|separator|>
  47. [47]
    China challenged to take down all of AWS and Google - The Register
    Nov 19, 2013 · Greatfire.org leaps great firewall by mirroring Reuters in AWS and Google · It used the same technique to mirror its FreeWeibo.com site which ...
  48. [48]
    Collateral Freedom FAQ - Great Fire Blog - GreatFire.org
    Jan 7, 2014 · Here are answers to some of the most common questions surrounding our plan to end online censorship in China.<|control11|><|separator|>
  49. [49]
    FreeWeibo is working towards a censorship-free China - TheNextWeb
    a search engine that collects censored and deleted posts originally posted on Sina Weibo ...<|separator|>
  50. [50]
    Announcing the Release of GreatFire AppMaker - Great Fire Blog
    Aug 3, 2020 · GreatFire has built an Android mobile app creator, called “GreatFire AppMaker”, that can be used by organizations to unblock their content for users in China ...
  51. [51]
    AppMaker website - GreatFire.org
    这个月早些时候,一个叫做GreatFire.org的组织专门针对中国的互联网管控,推出了一款叫做AppMaker的工具,帮助资源有限的非政府组织和个人构建自己的安卓应用程序,绕过互联网 ...Personal UseThe People Behind AppMakerUnblockedPerformanceHow to use AppMaker
  52. [52]
    Anticensorship tool turns any website into an unblocked app in China
    Aug 5, 2020 · GreatFire's new tool uses machine learning to let creators easily produce apps that make content accessible in China and other restrictive ...
  53. [53]
    Blocky: Check the availability of any URL in Mainland China right now
    Blocky, launched by GreatFire.org in 2011, is a free tool that allows you to test whether a website is blocked by the Great Firewall of China (GFW) and view ...
  54. [54]
    GreatFireVPN - Apps on Google Play
    Oct 6, 2025 · GreatFireVPN allows you to access internet freely and securely. No registration or setup required. Start with our free trial with no data ...
  55. [55]
    [PDF] An Analysis of China's “Great Cannon” - USENIX
    The logs revealed multiple instances of its employment to engineer DoS attacks pre- dating the attack on GreatFire.Org, with the earliest in- stance occurring a ...
  56. [56]
    Chinese authorities compromise millions in cyberattacks
    Mar 30, 2015 · On March 17th 2015, our websites and partner websites came under a DDoS attack. We had never been subjected to an attack of this magnitude ...Missing: Cannon | Show results with:Cannon
  57. [57]
    China: Freedom on the Net 2023 Country Report
    According to GreatFire.org—an anticensorship group that tracks filtering in China—as of May 2023, at least 175 of the 1,000 most heavily visited websites and ...<|separator|>
  58. [58]
    China moves to block internet VPNs from 2018 - The Guardian
    Jul 11, 2017 · The government has ordered China's three telecommunications companies to completely block access to virtual private networks, or VPNs, by February 2018.Missing: GreatFire 2015 domain
  59. [59]
    China Has Escalated Internet Censorship To A New Level
    Jan 27, 2015 · Alpha said they don't know how long the VPN outage will last, but GreatFire.org believes the recent block is to further crack down on encrypted ...Missing: suppression domain
  60. [60]
    Amid VPN crackdown, China eyes upgrades to Great Firewall
    Jul 20, 2017 · A Chinese telecoms carrier said it had begun closing virtual private networks (VPNs) and other tools that can bypass the so-called Great ...Missing: suppression 2015 domain
  61. [61]
    China's New Effort to Achieve Cyber Sovereignty - Great Fire Blog
    The Chinese authorities have become increasingly assertive in their efforts to gain undisputed control over domestic cyberspace.
  62. [62]
    China clamps down still harder on Internet access - CNBC
    Jan 30, 2015 · A co-founder of Greatfire.org, which tracks online censorship ... "The authorities are hellbent on establishing cyber-sovereignty in China.<|control11|><|separator|>
  63. [63]
    [PDF] How the Great Firewall of China Detects and Blocks Fully Encrypted ...
    The GFW uses heuristics based on protocol fingerprints, set bits, and printable ASCII to detect and block encrypted traffic, monitoring only 26% of connections.Missing: Locknet GreatFire
  64. [64]
    How the Great Firewall of China Detects and Blocks Fully Encrypted ...
    Apr 28, 2023 · the Great Firewall of China (GFW) deployed a new censorship technique that passively detects—and subsequently blocks—fully encrypted traffic in ...Abstract · Introduction · Understanding the Blocking... · Evaluating the GFW's...
  65. [65]
    Anti-Censorship Service Greatfire Hit With DDoS Attack | PCMag
    Mar 19, 2015 · The DDoS has allegedly bumped up Greatfire's hosting costs over at Amazon to just around $30,000 daily. It remains to be seen whether Amazon ...
  66. [66]
    Tencent Attempts to Silence FreeWeChat in Trademark ...
    Jul 10, 2025 · Tencent has launched legal action to take down GreatFire's FreeWeChat.com, using trademark infringement claims to mask what is clearly a politically motivated ...
  67. [67]
    We Had Our Arguments, But We Will Miss You Wikipedia
    Jun 18, 2015 · The test links below show tests for Wikipedia in Chinese and English, for the encrypted and unencrypted sites. https://en.greatfire.org/zh.Missing: low- scalable
  68. [68]
    China's Great Firewall is blocking around 311k domains, 41k by ...
    Jul 10, 2021 · After nine months of compiling data, they found that China's Great Firewall currently blocks around 311,000 domains, with 270,000 blocks working ...Missing: GreatFire | Show results with:GreatFire<|control11|><|separator|>
  69. [69]
    GreatFire activist urges western firms to help end Chinese censorship
    Apr 14, 2016 · Activist working for group dedicated to fighting China's 'Great Firewall' says firms such as Apple should back up its words with actions.
  70. [70]
    GreatFire: "Technology has been used to censor online speech
    Apr 13, 2016 · We are honoured to have been chosen as the winner of Index's 2016 digital activism award. We'd like to take this […] By Index on Censorship.
  71. [71]
    An Analysis of China's “Great Cannon” - USENIX
    On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the “Great Cannon”, to engineer a denial-of-service attack on GreatFire.org.Missing: details | Show results with:details
  72. [72]
    U.S. concerned China behind "malicious" cyber-attack on U.S. sites
    May 8, 2015 · Greatfire.org, which has received U.S. government funding, produces mirror websites that let Chinese users see information normally blocked by ...
  73. [73]
    “We'll Know It When We're There” | ChinaFile
    Mar 21, 2014 · Who funds you? Well, we got some money from the State Department. The U.S. one, (laughs) not the Chinese one. And we got more from other ...
  74. [74]
    Study: China cybercensors attack with 'Great Cannon' - CNN
    GreatFire.org hosted two GitHub repositories that contained computer code allowing Chinese readers to get around the Great Firewall and read The ...
  75. [75]
    Why GreatFire supports Antitrust Bills (and Why you Should Too)
    GreatFire is a China-based, anti-censorship organization that's worked since 2011 to expose digital censorship by the Chinese government and help Chinese ...Missing: influence | Show results with:influence
  76. [76]
    TTP - Apple Is Censoring its App Store for China
    Dec 23, 2020 · Apple admits it has removed apps in China at the government's request, but says the majority involve activities like illegal gambling and porn.
  77. [77]
    China: Freedom on the Net 2021 Country Report
    According to GreatFire.org—an anticensorship group that tracks filtering in China—as of mid-2021, at least 165 out of the top 1,000 most visited websites ...Missing: longitudinal | Show results with:longitudinal
  78. [78]
    China's Cyber ​​Censorship Figures - RSF
    Mar 12, 2021 · According to information from GreatFire, a China-focused censorship monitoring organization, 16% of Alexa Top 1000 domains are currently blocked ...
  79. [79]
    China censors videos, social media posts of Hong Kong protests
    Jun 18, 2019 · Chinese authorities have portrayed massive protests in Hong Kong as violent events incited by foreign elements and are censoring videos and ...
  80. [80]
    'Hong Kong' searches surge behind China's Great Firewall | Reuters
    Jun 13, 2019 · Chinese censors are working hard to erase or block news of the Hong Kong protests on social media and search platforms amid a surge in ...
  81. [81]
    [PDF] Normalization of Censorship: Evidence from China - Tony Zirui Yang
    Jun 10, 2025 · Normalization of censorship occurs when censorship expands beyond political content to less political issues, desensitizing citizens and making ...
  82. [82]
    COVID-19 increased censorship circumvention and access to ...
    Jan 19, 2022 · The crisis spurred censorship circumvention and access to international news and political content on websites blocked in China.
  83. [83]
    A Longitudinal Measurement Platform Built to Monitor China's DNS ...
    Nov 4, 2021 · China's sophisticated filtering system, known as the Great Firewall (GFW), is the region's biggest impediment to the freedom of information.
  84. [84]
    Breaking Through China's Great Firewall - Bloomberg.com
    Mar 20, 2014 · Greatfire was funded by its founders until this year, when it received a grant from the U.S. State Department. (Smith wouldn't say how much.) It ...
  85. [85]
    GreatFire: Tear down China's Great Firewall - Index on Censorship
    Oct 4, 2016 · GreatFire.org is an anti-China website as declared by the Cyberspace Administration of China. We hereby express our strong concern and request ...
  86. [86]
    Look Ma! I can see through the great firewall! - GreatFire.org
    Nov 17, 2013 · With our new mirror sites, the GFW cannot block FreeWeibo.com any longer without causing significant collateral damage which would also cause ...
  87. [87]
    The Great Cannon - Another Tool in China's Censorship Box | ICSI
    May 18, 2015 · The Chinese government appears to have used distributed denial-of-service attacks against a nonprofit organization, GreatFire.org, ...Missing: details | Show results with:details
  88. [88]
    New Chinese Cyberattacks: What's to Be Done? - ChinaFile
    Apr 1, 2015 · ... GreatFire.org emanated from computers around the world. Unbeknownst to their owners, attacking computers apparently were infected by code ...
  89. [89]
    Exposing and Circumventing SNI-based QUIC Censorship of the ...
    Aug 4, 2025 · Since April 2024, the Great Firewall of China (GFW) has been censoring QUIC traffic to specific domains. Our findings show the GFW decrypts ...Missing: GreatFire | Show results with:GreatFire
  90. [90]
    1.4 million people used FreeBrowser to circumvent the Great ...
    Aug 10, 2023 · GreatFire focuses most of its efforts on China where the so-called great firewall is the most sophisticated censorship technology in the world.<|separator|>
  91. [91]
    China cracks down on VPNs, making it harder to circumvent Great ...
    Jan 23, 2017 · China has begun a crackdown on the use of virtual private networks, or VPNs, making it harder for internet users to circumvent the Great Firewall.Missing: suppression 2015 domain
  92. [92]
    Man in China sentenced to five years' jail for running VPN
    Dec 22, 2017 · A man in China has been sentenced to five and a half years in jail for selling software that circumvented the country's pervasive internet censorship controls.<|separator|>
  93. [93]
    China's VPN Usage Nearly Doubles Amid Internet Censorship - VOA
    Feb 15, 2024 · “People face severe consequences for using prohibited VPNs, particularly if they belong to a marginalized ethnic or religious minority or try to ...
  94. [94]
    Popular censorship circumvention tools face fresh blockade by China
    Oct 5, 2022 · Tools helping China's netizens to bypass the Great Firewall appear to be facing a fresh round of crackdowns in the run-up to the country's quinquennial party ...Missing: critiques reform
  95. [95]
    Chinese authorities go after citizens for using VPNs, skirting online ...
    Jan 11, 2019 · Both cases indicate that today, the very act of circumventing the internet through an unregistered channel is considered illegal. Many netizens ...Missing: risks | Show results with:risks
  96. [96]
    China is the obstacle to Google's plan to end internet censorship
    Dec 12, 2016 · It's been three years since Eric Schmidt proclaimed that Google would chart a course to ending online censorship within ten years.<|separator|>
  97. [97]
    The Effect of Censorship Circumvention on Information Transmission
    May 12, 2022 · The following blog post captures the research from an OTF ICFP fellow on the effect of censorship circumvention on information transmission.Missing: critiques reform
  98. [98]
    China's Technology Protectionism and iIts Non-negotiable Rationales |
    Jun 26, 2017 · China's technology restrictions protract many economic and political reforms, but inaction also comes at a cost: Digitalisation is necessary to ...