2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) 2019
DOI: 10.1109/cyberc.2019.00027
|View full text |Cite
|
Sign up to set email alerts
|

The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 3 publications
0
11
0
1
Order By: Relevance
“…Moreover, there is nothing close to a free press anymore, leaving companies vulnerable to whatever line, positive or critical, that state media adopts and that China's rapid-fire social media censorship allows. China's internet censorship, known popularly as the Great Firewall (and more officially as the Golden Shield Project), has been implemented and refined since 2008, effectively blocking any sources of outside information the government deems undesirable, including most Western news and social media sites (Chandel, Jingji, Yunnan, Jingyao, & Zhipeng, 2019).…”
Section: Weak Rule Of Law and General Lack Of Transparencymentioning
confidence: 99%
“…Moreover, there is nothing close to a free press anymore, leaving companies vulnerable to whatever line, positive or critical, that state media adopts and that China's rapid-fire social media censorship allows. China's internet censorship, known popularly as the Great Firewall (and more officially as the Golden Shield Project), has been implemented and refined since 2008, effectively blocking any sources of outside information the government deems undesirable, including most Western news and social media sites (Chandel, Jingji, Yunnan, Jingyao, & Zhipeng, 2019).…”
Section: Weak Rule Of Law and General Lack Of Transparencymentioning
confidence: 99%
“…84 Many foreign websites, including Google, Twitter, and YouTube, are inaccessible to Chinese users, who instead use domestic equivalents such as Baidu (replacing Google) and Sina Weibo (replacing Twitter). 85 Relative to China and Russia, the United Kingdom currently regulates its domestic internet very lightly. This looks set to change.…”
Section: Defending Against Itmentioning
confidence: 99%
“…Some may merely wish to prevent their personal data from being accessible by big tech corporations (e.g., Google and Facebook) or government entities that track web traffic (Normile, 2017), others may have concerns about the ability of their ISP to protect their information (Ikram et al, 2016; Zhipeng et al, 2018), and yet others are engaged in activities that are unethical or illegitimate (e.g., hacking and spamming) and purposefully wish to maintain web anonymity (Van der Wagen & Pieters, 2015; Volz & Tau, 2020). It is also common to use a VPN to make it appear as though one’s web traffic originates from a different geographic location (e.g., a user located in China may use a VPN to falsely present an IP address associated with a U.S.-based location; Chandel et al, 2019; Normile, 2017). Regardless of the reason, accessing the internet through such a proxy changes the device’s IP address and the information that can be attained from it because the user now accesses the broader internet from the proxy’s intranet rather than the ISP’s intranet.…”
Section: Internet Protocol Addresses Internet Protocol Threat Scores ...mentioning
confidence: 99%