{"id":22542,"date":"2008-08-06T03:48:10","date_gmt":"2008-08-06T10:48:10","guid":{"rendered":"http:\/\/chinadigitaltimes.net\/?p=22542"},"modified":"2009-06-26T07:15:24","modified_gmt":"2009-06-26T14:15:24","slug":"vaulting-the-great-firewall","status":"publish","type":"post","link":"https:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/","title":{"rendered":"Vaulting The Great Firewall"},"content":{"rendered":"

From Comment is free<\/a>:<\/p>\n

The Tor Project<\/a>, originating from the US Naval Research Laboratory to assist defence and intelligence services in anonymous internet browsing, today comprises one of the most successfully and widely used anonymity networks. Maintained by a worldwide collective of supergeeks (or, rather, security and anonymity specialists), it uses several thousand servers around the world to disguise your internet identity and the destination of the website you are wishing to visit.<\/p>\n

To make Tor unblockable in China and other countries, a new feature has recently been added. Instead of joining the Tor network directly, thereby revealing your intention, you first connect to a computer set up by your friends or colleagues, who then introduce you to the Tor network (a “virtual bridge”, they call it). Because the Chinese cannot know in advance who these friends of yours will be (technically speaking, their IP address), they cannot pre-empt by blacklisting. Once you do connect through the bridge to the Tor network, it is almost impossible for surveillance agencies to know that you are using Tor.<\/p><\/blockquote>\n

Read also Global Internet Freedom Consortium (GIFC) Offers China-Based Reporters Software to Break Through Internet Blockade<\/a> via GFW Blog, and Chaos Computer Club offers help to victims of censorship in China<\/a> from Chaos Computer Club e.V.<\/p>\n","protected":false},"excerpt":{"rendered":"

From Comment is free: The Tor Project, originating from the US Naval Research Laboratory to assist defence and intelligence services in anonymous internet browsing, today comprises one of the most successfully and widely used anonymity networks. Maintained by a worldwide collective of supergeeks (or, rather, security and anonymity specialists), it uses several thousand servers around […]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,100,6],"tags":[2731,8290,6354,6300,4076,4100],"class_list":["post-22542","post","type-post","status-publish","format-standard","hentry","category-information-revolution","category-politics","category-sci-tech","tag-anti-censorship-tools","tag-fang-binxing","tag-great-firewall","tag-internet-censorship","tag-psiphon","tag-tor","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"yoast_head":"\nVaulting The Great Firewall<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vaulting The Great Firewall\" \/>\n<meta property=\"og:description\" content=\"From Comment is free: The Tor Project, originating from the US Naval Research Laboratory to assist defence and intelligence services in anonymous internet browsing, today comprises one of the most successfully and widely used anonymity networks. Maintained by a worldwide collective of supergeeks (or, rather, security and anonymity specialists), it uses several thousand servers around […]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"China Digital Times (CDT)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ChinaDigitalTimes\" \/>\n<meta property=\"article:published_time\" content=\"2008-08-06T10:48:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2009-06-26T14:15:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"186\" \/>\n\t<meta property=\"og:image:height\" content=\"177\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Liu Yong\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdt\" \/>\n<meta name=\"twitter:site\" content=\"@cdt\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liu Yong\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/\"},\"author\":{\"name\":\"Liu Yong\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/bde859fa557a468c7a4b1a9d9db2b46c\"},\"headline\":\"Vaulting The Great Firewall\",\"datePublished\":\"2008-08-06T10:48:10+00:00\",\"dateModified\":\"2009-06-26T14:15:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/\"},\"wordCount\":217,\"publisher\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\"},\"keywords\":[\"anti-censorship tools\",\"Fang Binxing\",\"Great Firewall\",\"Internet censorship\",\"psiphon\",\"Tor\"],\"articleSection\":[\"Information Revolution\",\"Politics\",\"Sci-Tech\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/\",\"url\":\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/\",\"name\":\"Vaulting The Great Firewall\",\"isPartOf\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#website\"},\"datePublished\":\"2008-08-06T10:48:10+00:00\",\"dateModified\":\"2009-06-26T14:15:24+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chinadigitaltimes.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vaulting The Great Firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#website\",\"url\":\"https:\/\/chinadigitaltimes.net\/\",\"name\":\"China Digital Times (CDT)\",\"description\":\"Covering China from Cyberspace\",\"publisher\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chinadigitaltimes.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#organization\",\"name\":\"China Digital Times\",\"url\":\"https:\/\/chinadigitaltimes.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg\",\"contentUrl\":\"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg\",\"width\":186,\"height\":177,\"caption\":\"China Digital Times\"},\"image\":{\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ChinaDigitalTimes\",\"https:\/\/x.com\/cdt\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/bde859fa557a468c7a4b1a9d9db2b46c\",\"name\":\"Liu Yong\",\"url\":\"https:\/\/chinadigitaltimes.net\/author\/liu-yong\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vaulting The Great Firewall","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/","og_locale":"en_US","og_type":"article","og_title":"Vaulting The Great Firewall","og_description":"From Comment is free: The Tor Project, originating from the US Naval Research Laboratory to assist defence and intelligence services in anonymous internet browsing, today comprises one of the most successfully and widely used anonymity networks. Maintained by a worldwide collective of supergeeks (or, rather, security and anonymity specialists), it uses several thousand servers around […]","og_url":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/","og_site_name":"China Digital Times (CDT)","article_publisher":"https:\/\/www.facebook.com\/ChinaDigitalTimes","article_published_time":"2008-08-06T10:48:10+00:00","article_modified_time":"2009-06-26T14:15:24+00:00","og_image":[{"width":186,"height":177,"url":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.png","type":"image\/png"}],"author":"Liu Yong","twitter_card":"summary_large_image","twitter_creator":"@cdt","twitter_site":"@cdt","twitter_misc":{"Written by":"Liu Yong","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/#article","isPartOf":{"@id":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/"},"author":{"name":"Liu Yong","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/bde859fa557a468c7a4b1a9d9db2b46c"},"headline":"Vaulting The Great Firewall","datePublished":"2008-08-06T10:48:10+00:00","dateModified":"2009-06-26T14:15:24+00:00","mainEntityOfPage":{"@id":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/"},"wordCount":217,"publisher":{"@id":"https:\/\/chinadigitaltimes.net\/#organization"},"keywords":["anti-censorship tools","Fang Binxing","Great Firewall","Internet censorship","psiphon","Tor"],"articleSection":["Information Revolution","Politics","Sci-Tech"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/","url":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/","name":"Vaulting The Great Firewall","isPartOf":{"@id":"https:\/\/chinadigitaltimes.net\/#website"},"datePublished":"2008-08-06T10:48:10+00:00","dateModified":"2009-06-26T14:15:24+00:00","breadcrumb":{"@id":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/chinadigitaltimes.net\/2008\/08\/vaulting-the-great-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chinadigitaltimes.net\/"},{"@type":"ListItem","position":2,"name":"Vaulting The Great Firewall"}]},{"@type":"WebSite","@id":"https:\/\/chinadigitaltimes.net\/#website","url":"https:\/\/chinadigitaltimes.net\/","name":"China Digital Times (CDT)","description":"Covering China from Cyberspace","publisher":{"@id":"https:\/\/chinadigitaltimes.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chinadigitaltimes.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chinadigitaltimes.net\/#organization","name":"China Digital Times","url":"https:\/\/chinadigitaltimes.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/","url":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg","contentUrl":"https:\/\/chinadigitaltimes.net\/wp-content\/uploads\/2021\/08\/CDT-logo.jpg","width":186,"height":177,"caption":"China Digital Times"},"image":{"@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ChinaDigitalTimes","https:\/\/x.com\/cdt"]},{"@type":"Person","@id":"https:\/\/chinadigitaltimes.net\/#\/schema\/person\/bde859fa557a468c7a4b1a9d9db2b46c","name":"Liu Yong","url":"https:\/\/chinadigitaltimes.net\/author\/liu-yong\/"}]}},"_links":{"self":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts\/22542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/comments?post=22542"}],"version-history":[{"count":0,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/posts\/22542\/revisions"}],"wp:attachment":[{"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/media?parent=22542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/categories?post=22542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chinadigitaltimes.net\/wp-json\/wp\/v2\/tags?post=22542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}