Saturday, August 31, 2019

What kind of "over the wall" is illegal?

According to Article 6 of the Interim Provisions on the Administration of International Network Management of Computer Information Network of the People's Republic of China (hereinafter referred to as the “Interim Provisions”), “Computer information networks must be directly connected to the international network, and must use the international gateways provided by the National Public Telecommunications Network of the Ministry of Posts and Telecommunications. Any Units and individuals may not establish or use other channels for international networking." The public security organ may give a warning to those who violate this regulation and impose a fine of up to 15,000 yuan.

https://www.topvpnguides.com/purevpn-review/
https://www.topvpnguides.com/privatevpn-review/
https://www.topvpnguides.com/vyprvpn-review/

The State Council issued the "Interim Provisions" in 1996 and revised it in 1997. Li Zhian said that this provision has been "prepared for use" in the past 20 years and has a legal effect, but it has not fulfilled its law enforcement actions.

Law enforcement mainly began in 2017, when China tightened the VPN market.

On January 22, 2017, the Ministry of Industry and Information Technology of the People's Republic of China announced the “Notice on Clearing the Regulation of the Internet Network Access Service Market” (hereinafter referred to as the “Notice”), and decided to use it from the same day to March 31, 2018. Inspect the network infrastructure and network access resources such as IP addresses and broadband.

Li Zhian said that since then, the authorities have released a signal to warn companies and individuals to pay attention to the legal consequences of "over the wall."

On July 1, 2017, GreenVPN, a veteran VPN service provider with a large number of users, stopped service. Later, more VPN service providers terminated their operations at the request of the regulatory authorities, including Tianhang VPN and Cloud Wall VPN. In 2017, Apple vacated 674 VPN applications in the China Store app as a result of breaking Chinese law.

Li Zhian explained that it is only legal to conduct overseas server docking services through the three major telecom operators (China Mobile, China Unicom and China Telecom). Other forms of “over the wall” are in the “Interim Regulations”. "Illegal fixed channel."

"You may just download a VPN software to help you connect to foreign countries, in fact, it is illegal."

How was the “over the wall” detected?

In principle, Li Zhian said that China's domestic network is connected to foreign networks through a limited number of key nodes, which are equivalent to the hub of telecommunications.

When the user "over the wall" through the VPN, it must be realized through these key nodes. At this time, the firewall can identify the IP address according to the information flow transmitted by the VPN at a certain node.


VPNs come in a variety of forms and are constantly challenged by firewall technologies based on their protocols, applications, and device types. Li Zhian said that in the past few years, China's firewall technology and VPN technology have broken through firewalls. Some VPNs have encryption capabilities that bypass the firewall and are not detected. Even some high-end VPNs have anti-detection techniques.

Li Zhiwen said that between the investigation and the investigation, it seems that there is no end to the confrontation between the righteous and the evil.

Thursday, August 29, 2019

China cracks down on "illegal management" of proxy servers

The Ministry of Industry and Information Technology of China announced a one-year operation to rectify Internet access services.

The Ministry of Industry and Information Technology issued a notice on the weekend requesting the investigation and punishment of various “unlicensed operations, over-range operations, and “layer-level sub-leasing” and other illegal acts”, which explicitly required to prevent unauthorized construction or lease of dedicated lines and proxy servers (VPNs) without permission from the telecommunications department. service.

https://www.topvpnguides.com/cyberghost-review/
https://www.topvpnguides.com/ipvanish-review/
https://www.topvpnguides.com/purevpn-review/
https://www.topvpnguides.com/privatevpn-review/
https://www.topvpnguides.com/vyprvpn-review/

The English version of the "Global Times" of the People's Daily, the People's Daily, said on Monday (January 23) that this would help regulate the development of the Internet industry.

The Chinese government uses the popular folk saying "The Great Firewall of China" technology to review and block content that the authorities believe is harmful. VPN, which is also called virtual private network, is a means that netizens often use to "over the wall" to access overseas websites.

These blocked websites include many Western media, and China recently asked Apple to remove the New York Times mobile app from the Chinese version of the App Store, further limiting access to such content by Chinese netizens. .

Some Chinese netizens are worried that their freedom to browse the Internet is further restricted.

Chinese VPN users are fined. How to break the wall?

According to the information released by the Shaoguan Municipal Public Security Bureau on January 4th, local citizen Zhu was accused of “authorizing the establishment and use of illegal channels for international networking” and was warned and fined 1,000 yuan.

https://www.topvpnguides.com/nordvpn-review/
https://www.topvpnguides.com/expressvpn-review/
https://www.topvpnguides.com/surfshark-review/

A "Administrative Punishment Decision Letter" bearing the official seal of the Nanxiong City Public Security Bureau was spread on the Internet. According to the document, during the period from August to December 2018, Zhu installed the Lantern Pro with his mobile phone and connected to the broadband network in the home to “turn over the wall” to access the Internet and log in within one week before the investigation. 487 times.

At the same time, another "Notice of the Family of the Summoned Persons" from the official seal of the Public Security Bureau of Rongchang District, Chongqing City was also exposed on the Internet. The notice showed that Chongqing netizen Huang was also charged the same.

This is a rare event in which Internet users are subject to administrative charges for personal “over the wall” behavior.

Li Zhian, an associate professor at the School of Law at the Chinese University of Hong Kong, who specializes in Chinese Internet law, said that similar penalties were not the first to appear. Since 2017, there have been similar news.

He told the BBC Chinese network that this time it was directly released by the official news, it is intended to be one hundred and one hundred.


VPN was first used to help multinational companies connect to offices around the world, allowing employees in different locations to access the company's intranet and perform high-permission tasks. In the past, companies that acquired VPN services required an invitation code to register and log in to an overseas mailbox. As the technology matures, ordinary people can “over the wall” by downloading apps from their mobile phones.

Li Zhian said that according to conservative estimates, the number of Chinese Internet users using VPN is currently 20 to 30 million. Some college students and scholars use VPN to connect to foreign libraries to download materials, or to Google Scholar to view the latest published research. For those with a professional background in the Internet, it is easy to learn the technical principles on the Internet and build a VPN platform.

Liu Yuan, a network engineer in Suzhou, graduated from a university in Hong Kong in 2010 and returned to his hometown to work for a local software development company. He told the BBC Chinese network that he had been accustomed to Hong Kong's free network environment when he was studying. After returning to the mainland, he felt that he was clinging to his hands, so he built a VPN or downloaded various VPN software on his mobile phone.

Liu Yuan said that in the usual work, when developing software, it will encounter difficult problems from time to time. It is necessary to “over the wall” to the overseas network, use Google to query the solutions of foreign professional peers, or download the file package from the foreign software sharing forum. “This will not only improve work efficiency, but also learn the latest technology,” he said.

https://www.topvpnguides.com/cyberghost-review/
https://www.topvpnguides.com/ipvanish-review/
https://www.topvpnguides.com/purevpn-review/

His classmate Zheng Tao is now a programmer at a network security company in Wuhan. Before returning home, he worked in a Hong Kong company. After leaving, he will still use the VPN account provided by the original company to browse the industry information. After the company canceled its account, it also “turned over the wall” through the proxy server, but often gave up because of the unstable signal and slow transmission speed.

For Liu Yuan, if he can't realize the "over the wall", he will analyze the software code himself, find the programming logic, and solve the problem. "It may take an hour to complete the work in five minutes." Now he will still buy offshore VPN software to meet his work needs.

Friday, August 2, 2019

The global VPN usage is greatly decrypted. Do you use it right?

The US empire that dominates the world will also worry about using the right VPN. It seems that this is a personal problem.

As a "brick home" in network security, I have learned about the use of VPNs around the world because of my professional habits. I don’t know if I investigate. I also made a jump in the investigation. Here are some of my investigations. Share it with everyone.

The function of the virtual private network is to establish a private network on the public network for encrypted communication. Widely used in enterprise networks. The VPN gateway implements remote access by encrypting the data packet and converting the destination address of the data packet. There are many ways to classify VPNs, mainly by classification. VPN can be implemented in various ways such as server, hardware, and software.

https://www.topvpnguides.com/best-vpn-for-bittorrent/
https://www.topvpnguides.com/best-vpn-for-china/
https://www.topvpnguides.com/nordvp-review/

Current technical classification

MPLS: Multiprotocol Label Switching (MPLS) is a system for fast packet switching and routing that provides the ability to target, route, forward, and exchange network traffic. More specifically, it has a mechanism to manage various forms of communication flow. It provides a way to map IP addresses to simple fixed-length tags for different packet forwarding and packet switching techniques.

SSL: The SSL (Secure Sockets Layer) protocol, which specifies a mechanism for providing data security layering between application protocols such as HTTP, Telenet, NMTP, and FTP, and the TCP/IP protocol. It provides data encryption, server authentication, message integrity, and optional client authentication for TCP/IP connections.

IPSec: IPSec is an open standard framework that ensures secure and secure communications over Internet Protocol networks by using encrypted security services.

business background

In the 1990s, computers connected to the Internet through very expensive leased lines or dial-ups. The distance between sites can cost thousands or tens of thousands of dollars.

In order to avoid the connection of multiple dedicated lines to the Internet, VPN came into being. Because VPNs can reduce network expenses, users can safely exchange private data, VPNs become popular, and expensive private lines become redundant.

Due to the restrictions on the overseas network in mainland China, it is more popular in mainland China to connect overseas via free or paid VPN. At the same time, foreign companies want to connect to overseas websites, and they also set up their own VPN or use paid VPN services.