This article may be expanded with text translated from the corresponding article in Chinese. (May 2016) Click [show] for important translation instructions.
Machine translation like Deepl or Google Translate is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedia.
Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
You must provide copyright attribution in the edit summary accompanying your translation by providing an interlanguage link to the source of your translation. A model attribution edit summary (using German): Content in this edit is translated from the existing German Wikipedia article at [[:de:Exact name of German article]]; see its history for attribution.
The Great Firewall of China (GFW) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in Internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic.[1]
The effect includes: limiting access to foreign information sources, blocking foreign internet tools (e.g. Google search, Facebook, Twitter, Wikipedia,[2][3] and others) and mobile apps, and
requiring foreign companies to adapt to domestic regulations.[4][5]
Besides censorship, the GFW has also influenced the development of China's internal internet economy by nurturing domestic companies[6]
and reducing the effectiveness of products from foreign internet companies.[7] The techniques deployed by the Chinese government to maintain control of the Great Firewall can include modifying search results for terms, such as they did following Ai Weiwei’s arrest, and petitioning global conglomerates to remove content, as happened when they petitioned Apple to remove the Quartz business news publication’s app from its Chinese App Store after reporting on the 2019 Hong Kong protests.[8][9]
As mentioned in the "One country, two systems" principle, China's special administrative regions (SARs) such as Hong Kong and Macau are not affected by the firewall, as SARs have their own governmental and legal systems and therefore enjoy a high degree of autonomy. Nevertheless, the U.S. State Department has reported that the central government authorities have closely monitored Internet use in these regions.[11]
The political and ideological background of the GFW Project is considered to be one of Deng Xiaoping’s favorite sayings in the early 1980s: "If you open the window, both fresh air and flies will be blown in."[nb 1] The saying is related to a period of the economic reform of China that became known as the "socialist market economy". Superseding the political ideologies of the Cultural Revolution, the reform led China towards a market economy and opened up the market for foreign investors. Nonetheless, despite the economic freedom, values and political ideas of the Communist Party of China have had to be protected by "swatting flies" of other unwanted ideologies.[16]
The Internet in China arrived in 1994,[17] as the inevitable consequence of and supporting tool for the "socialist market economy". Gradually, while Internet availability has been increasing, the Internet has become a common communication platform and tool for trading information.
The Ministry of Public Security took initial steps to control Internet use in 1997, when it issued comprehensive regulations governing its use. The key sections, Articles 4–6, are:
Individuals are prohibited from using the Internet to: harm national security; disclose state secrets; or injure the interests of the state or society. Users are prohibited from using the Internet to create, replicate, retrieve, or transmit information that incites resistance to the PRC Constitution, laws, or administrative regulations; promoting the overthrow of the government or socialist system; undermining national unification; distorting the truth, spreading rumors, or destroying social order; or providing sexually suggestive material or encouraging gambling, violence, or murder. Users are prohibited from engaging in activities that harm the security of computer information networks and from using networks or changing network resources without prior approval.[18]
In 1998, the Communist Party of China feared that the China Democracy Party (CDP) would breed a powerful new network that the party elites might not be able to control.[19] The CDP was immediately banned, followed by arrests and imprisonment.[20] That same year, the GFW project was started. The first part of the project lasted eight years and was completed in 2006. The second part began in 2006 and ended in 2008.
On 6 December 2002, 300 people in charge of the GFW project from 31 provinces and cities throughout China participated in a four-day inaugural "Comprehensive Exhibition on Chinese Information System".[21] At the exhibition, many western high-tech products, including Internet security, video monitoring and human face recognition were purchased. It is estimated that around 30,000–50,000 police were employed in this gigantic project.[citation needed]
China's view of the internet is as "Internet sovereignty": the notion that the Internet inside the country is part of the country's sovereignty and should be governed by the country.[7][25]
While the United States and several other western countries passed laws creating computer crimes beginning in the 1970s, China had no such legislation until 1997. That year, China's sole legislative body, the National People's Congress (NPC) passed CL97, a law that criminalizes "cyber crimes", which it divided into two broad categories: crimes that target computer networks and crimes carried out over computer networks. Behavior illegal under the latter category includes among many things the dissemination of pornographic material and the usurping of "state secrets."[citation needed]
Some Chinese judges were critical of CL97, calling it ineffective and unenforceable. However, the NPC claimed it intentionally left the law "flexible" so that it could be open to future interpretation and development. Given the gaps in the law, the central government of China relies heavily on its administrative body, the State Council, to determine what falls under the definitions, and their determinations are not required to go through the NPC legislative process. As a result, the CPC has ended up relying heavily on state regulation to carry out CL97.[26]
The latter definition of online activities punishable under CL97, or "crimes carried out over computer networks" is used as justification for the Great Firewall and can be cited when the government blocks any ISP, gateway connections, or any access to anything on the internet. The definition also includes using the internet to distribute information considered "harmful to national security," and using the internet to distribute information considered "harmful to public order, social stability, and Chinese morality." The central government relies heavily on its State Council regulators to determine what specific online behavior and speech fall under these definitions.[citation needed]
The reasons behind the Internet censorship in China include:
Social Control: The Internet is a means for freedom of speech, and dissemination of campaigns could lead to protests against the government.
Sensitive Content: To control information about the government in China.
Economic Protectionism: China prefers the use of local companies that are regulated by Chinese regulations, since they have more power over them. E.g. Baidu over Google.[citation needed]
As part of the Great Firewall, beginning in 2003 China started the Golden Shield Project , a massive surveillance and censoring system, the hardware for which was provided by mostly U.S. companies, including Cisco Systems. The project was completed in 2006 and is now carried out in buildings with machines manned by civilians and supervised by China's national police force, the Public Security Bureau (PSB). The main operating activities of the gatekeepers at the Golden Shield Project include monitoring domestic websites and email and searching for politically sensitive language and calls to protest. When damaging content is found, local PSB officials can be dispatched to investigate or make arrests. However, by late 2007 the Golden Shield Project proved to operate sporadically at best, as users had long adapted to internet blocking by using proxy servers, among other strategies, to make communications and circumnavigate to blocked content.[27]
In February 2008, the Chinese government announced "Operation Tomorrow," an effort to crack down on youth usage of internet cafés to play online games and view content declared illegal.[28][failed verification] Internet cafés, an extremely popular way of getting online in developing countries where fewer people can afford a personal computer, are regulated by the Chinese government and by local Chinese government officials. Minors (in China, those under the age of 18) are not allowed into Internet cafés, although this law is widely ignored and when enforced, has spurred the creation of underground "Black Web Bars" visited by those underage. As of 2008 internet cafés were required to register every customer in a log when they used the internet there; these records may be confiscated by local government officials and the PSB. To illustrate local regulation of internet cafés, in one instance, a government official in the town of Gedong lawfully banned internet cafés from operating in the town because he believed them to be harmful to minors, who frequented them to play online games (including those considered violent) and surf the internet. However, internet cafés in this town simply went underground and most minors were not deterred from visiting them.[29]
In May 2015, China indefinitely blocked access to the Chinese-language Wikipedia.[30] In contrast (as of 2018), the English-language Wikipedia was blocked only rarely and intermittently.[31] China in 2017 discussed plans for its own version of Wikipedia.[32][33] As of May 2019, all language versions of Wikipedia have been blocked by the Chinese government.[34]
The Chinese firewall works by selectively preventing content from being accessed. It is mostly made of Cisco, Huawei and Semptian hardware[35][36] that provides censorship services within key networking components such as IPS, PE routers, or DNS servers. Researchers at the University of California, Davis, and at the University of New Mexico said that the censorship system is not a true firewall since banned material is sometimes able to pass through several routers or through the entire system without being blocked.[37]
The filtering mechanism may differ from one Chinese ISP to another, but tend to be as common as possible :
The network location of routers effectively performing the drop seems to vary between Chinese internet providers,[38] but the general consensus is that packets are dropped when crossing an MPLS node, which are intensively used in the Chinese backbone internet. This would suggest that the list of dropped networks is likely maintained using LDP.
Because of the complexity to maintain a big, up-to-date banned network list, and because this method has proven not to be compatible with services using Content delivery networks, it is usually used as last resort and other blocking methods are preferred (such as filtering based on QoS).
One part of the Chinese firewall is made of liar DNS servers and DNS hijackers returning incorrect IP addresses.[39] Studies seems to point out that this censorship is keyword-based.[40] Censors are likely maintaining two lists : a list of banned domain names, and a list of whitelisted domain names. Both lists very likely employ wildcard characters. Examples of banned websites include "*greatfire.org" or "*falungong*", examples of whitelisted websites include "developer.android.google.cn".
The list of banned/allowed keywords seems to be shared between multiple Chinese Internet providers, suggesting central management.[40] The exact DNS software and configuration seems local to each Chinese ISP however.[41]
Contrary to popular belief,[42] foreign DNS resolvers such as Google Public DNS IP address 8.8.8.8 are reported to work correctly inside the country;[43] however, these DNS servers are also subject to hijacking: DNS queries do reach the DNS server, but if the request matches a banned keyword, the firewall will inject a fake DNS reply before the legitimate DNS reply arrives.
The Chinese firewall is made of transparent proxies filtering web traffic. These proxies scan the requested URI, the "Host" Header and the content of the web page (for HTTP requests) or the Server Name Indication (for HTTPS requests) for target keywords.[45] If the firewall believe that the page should be blocked, a 403 error page may displayed instead, or the page may not load at all.
Studies have found multiple limitations to these proxies, such as the inability to inspect POST data in HTTP requests, to filter malformed HTTP requests,[46] or to inspect new protocols like webSocket.
Like for DNS filtering, this method is keyword based. Encrypting the Server Name Indication can be used to bypass this method of filtering and is currently in development by the IETF.[47]
Since 2012, the GFW is able to "learn, filter and block" users based on traffic behavior, using Machine learning.[48] This method was originally developed for blocking VPNs and has been extended to become part of the standard filtering system of the GFW. The method works by mirroring all traffic (using a network tap) to a dedicated analytics unit, that will then deliver a score for each destination IP based on how suspicious the connection is. This score is then used to determine a packet loss rate to be implemented by routers of the Chinese firewall, resulting in a slowed connection on the client side. The method aims to slow down traffic to such an extent that the request times out on the client side, thus effectively having succeeded in blocking the service altogether.
It is believed that the analytics system is using Side-channel (such as the number of recently contacted IP addresses) to estimate how suspicious is a connection.[49] It is able to detect traffic patterns (such as SSH tunneling, VPN or Tor protocols), and can measure packets Entropy to detect encrypted-over-encrypted traffic (such as HTTPS over an SSL tunnel).
The Chinese firewall may arbitrary terminate TCP transmissions, using packet forging. The blocking is performed using a TCP reset attack. This attack does not block TCP requests nor TCP replies, but send a malicious TCP RST packet to the sender, simulating an end-of-connection.
Side channel analysis seems to indicate that TCP Reset are coming from an infrastructure collocated or shared with QoS filtering routers.[50] This infrastructure seems to update the scoring system : if a previous TCP connection is blocked by the filter, future connection attempts from both sides may also be blocked for short period of times (up to few hours).
An efficient circumvention method is to ignore the reset packet sent by the firewall.[51] a patch for FreeBSD has been developed for this purpose.[52]
Since March 2019, the GFW seems to be able to also interfere with some UDP protocols QUIC and HTTP/3[53]. It is currently unclear how does this filtering operate. UDP filtering seems inconsistent across China[citation needed], suggesting that this blocking is currently being tested.
The Chinese National Intelligence Law theoretically allows the Chinese government to request and use the root certificate from any Chinese certificate authority,[54] such as CNNIC, to make MITM attacks with valid certificates. No MITM attack using a valid certificate has yet been formally detected, but this is largely due to the fact that entities having both will and sufficient capabilities to detect such attack (eg: Google, Mozilla, Opera, and other web-browsers makers) have little or no adoption in China.
Multiple TLS incidents also happened in the last decade, before the creation of the law:
On 26 January 2013, the GitHub SSL certificate was replaced with a self-signed certificate in China by the GFW.[55]
On 20 October 2014, iCloud SSL certificate was replaced with a self-signed certificate in China.[56] It is believed that the Chinese government discovered a vulnerability on Apple devices and was exploiting it[57]
On 20 March 2015, Google detected valid certificates for Google signed by CNNIC in Egypt. In response of this event, and after a deeper investigation, CNNIC certificate has been removed by some browsers.[58] Because of the removal being based on proofs and not suspicion, no other Chinese certificate authority has been removed from web browsers, and some have been added since then.[59]
This type of attack can be circumvented by websites implementing Certificate Transparency, or by using browser extensions.[60]
SMTP, IMAP4 and POP3
Filtering
The great chinese firewall has been reported to inspect and censor emails using SMTP, POP3 and IMAP4 transparent proxies[citation needed].
The system would be working using keyword filtering[citation needed].
In addition to the performed filtering, the CAC is also using Active Probing in order to identify and block network services that would help escaping the Firewall. Multiple services such as Tor or VPN providers reported receiving unsolicited TCP/IP connections for the purported purpose of network enumeration of services, in particular TLS/SSL and Tor (anonymity network) services, with the aim of facilitating IP blocking.[61][62].
This active probing system seems to be using unused IP addresses within China Telecom and China Unicom IPs pools dedicated to Residential gateways[63], making the probes hard to block without affecting Chinese users.
The Great Firewall in China had direct influence on population's belief and way of thinking. It is mainly used by the Chinese government to perform brain washing and encourage "right thinking" by censoring dissident ideas. One of the main goals of the Great Chinese firewall is to create an environment where people have the same values and are having the same opinion. Therefore, the GFW is a political tool using Chinese citizens to promote Chinese Communist Party ideas.
The impact of this tool is difficult to evaluate, but It is estimated that its consequences are very strong and worldwide : instead of directly using force to control the population, the GFW quietly sets up an environment in which people share the same values and have same ideas, which are directly controlled by the CAC. Some example of ideas are :
Pornography, obscenity and eroticism are shabby activities.
Democracy is not the best system for governing a country. As such Pro-democracy groups should be considered as terrorists and Hong Kong protests are definitely organized by foreign entities.
Falun Gong and other anti CCP groups, are "outlawed".
etc..
The role of the firewall is to play with the social aspects of Chinese citizens, by blocking access to websites discouraging or criticizing these ideas. Other tools and means (50 Cent party, forcing companies in China to promote these ideas using loans as threat, pressuring citizens not complying with these ideas) are used to fill the space left with a "right thinking" voice.
Because the social environment of an individual doesn't necessarily change when moving country, there is multiple reports of Chinese users still promoting these ideas even when they are going abroad and are not under direct influence of the GFW[64][65]. It is largely admitted that the GFW, as well as other means, is playing a non-negligible role in keeping stable, patriotic and CAC-compliant values.
The GFW is also putting foreign website, applications, and software owners under fear to get banned in China for having an user using their technology to express a non-CAC compliant opinion. This pressure is leading to chilled speech and self-censorship on all internet related services, from websites to mobile applications and video-games software. This self-censorship is encouraged by the Chinese government[66], and is currently more effective at blocking internet content than the Great Firewall has been.[67]
Aside from the population-control aspect, the Great Firewall also act as a form of trade protectionism that has allowed China to grow its own internet giants, such as Tencent, Alibaba, and Baidu.[6][68] China has its own version of many foreign web properties, for example: Tencent Video (YouTube), Tencent Weibo (Twitter), Qzone (Facebook), WeChat (WhatsApp), Ctrip (Orbitz and others), Zhihu (Quora).[69] With nearly one quarter of the global internet population (700 million users), the internet behind the GFW can be considered a "parallel universe" to the Internet that exists outside.[7]
Website owners can set up regional Web sites within China. However, it requires companies and users to apply for local Internet Content Provider (ICP) licenses for each Chinese province where the website should be allowed. ICP licences come with a lot of restrictions, such as the mandatory use of a national domain name extension or the impossibility to set up community related websites.[70][71]
Chinese and Foreign companies willing to perform site-to-site VPN, can set up a private MPLS link connection between China and the rest of the world using pre-approved network operators [72][73]. This option is expensive, but is the most reliable way to go through the firewall for a company. Some network companies have also been granted to distribute SD-WAN connections, using IPsec as site-to-site connection method[74].
Because the Great Firewall blocks destination IP addresses and domain names and inspects the data being sent or received, a basic censorship circumvention strategy is to use proxy nodes and encrypt the data. Most circumvention tools combine these two mechanisms.[75]
Proxy servers outside China can be used, although using just a simple open proxy (HTTP or SOCKS) without also using an encrypted tunnel (such as HTTPS) does little to circumvent the sophisticated censors.[75]
VPNs (virtual private network) is one of the most popular tools for bypassing censorship technologies. They use the same basic approaches, proxies and encrypted channels, used by other circumvention tools, but depend on a private host, a virtual host, or an account outside of China, rather than open, free proxies.[75]
Reconfiguration at the end points of communication, encryption, discarding reset packets according to the TTL value (time to live) by distinguishing those resets generated by the Firewall and those made by end user, not routing any further packets to sites that have triggered blocking behavior.[76]
Tor partially can be used in China.[75][77] China invested a lot of efforts to specifically detect and block entry nodes and bridges. Almost all built-in bridges (with the exception of meek bridges, which are detected by the QoS filtering system) are detected by imposing as users requesting bridge IPs and then blocked. Tor still functions in China using Obfs4 proxies distributed through social networks or self-published and meek.[78]
OpenVPN protocol is detected and blocked. Connections not using symmetric keys or using "tls-auth" are blocked at handshake, and connections using the new "tls-crypt" option are detected and slowed down (under 56Kbps) by the QoS filtering system.
GRE tunnels and protocols that use GRE (eg, PPTP) are blocked.[79]
IPSec tunnels and protocols that use it (L2TP) are detected and slowed down (under 56Kbps) by the QoS filtering system and are sometimes blocked at handshake[80].
Reporters Without Borders suspects that countries such as Cuba, Vietnam, Zimbabwe and Belarus have obtained surveillance technology from China, although the censorship in these countries is less stringent than in China.[81]
Even so, one can see the booming sector as well as one of the most dynamic. China is the second largest information and communication technology market, according to the International Data Corporation this market should reach US$844 billion by 2020. The market for big data is expected to become part of the industrial world of China by 2025. Regardless of the strictness the industrial internet architecture is already in place.[82]
Despite strict government regulations, the Chinese people continue to protest against their government's attempt to censor the Internet. The more covert protesters set up secure SSH and VPN connections using tools such as UltraSurf. They can also utilize the widely available proxies and virtual private networks to fanqiang (翻墙, "climb over the wall"), or bypass the GFW. Active protest is not absent. Chinese people post their grievances online, and on some occasions, have been successful. In 2003, the death of Sun Zhigang, a young migrant worker, sparked an intense, widespread online response from the Chinese public, despite the risk of the government's punishment. A few months later, Premier Wen Jiabao abolished the Chinese law that led to the death of Sun. Ever since, dissent has regularly created turmoil on the Internet in China.[27] Also in January 2010, when Google announced that it will no longer censor its Web search results in China, even if this means it might have to shut down its Chinese operations altogether, many Chinese people went to the company's Chinese offices to display their grievances and offer gifts, such as flowers, fruits and cigarettes.[83]
Critics argue that the GFW is a consequence of China's paranoia of the potential that the Internet has of spreading opposition to their one-party rule. Other arguments given against China are that their method of having a limited Internet impedes freedom of speech and that it holds them down, economically speaking, by discouraging innovation, disapproving communication of important ideas and prohibiting firms the use of certain services that they use. It is also thought to be a detrimental approach for students and professors since they do not have access to resources which promote the sharing of work and ideas for a more comprehensive learning.[citation needed]
Another important argument against the GFW and fear that the critics have is that if other big countries begin following China's approach, the whole purpose of the creation of the Internet could be put in jeopardy. If like-minded countries are successful in imposing the same restrictions on their inhabitants and globalized online companies, then the free global exchange of information could cease to exist.[84]
The United States Trade Representative's (USTR) "National Trade Estimate Report" in 2016 referred the China's digital Great Firewall: "China's filtering of cross-border Internet traffic has posed a significant burden to foreign suppliers."[85] Claude Barfield, the American Enterprise Institute's expert of International trade, suggested that the U.S. government should bring a case against the Firewall, a huge trade barrier, in the World Trade Organization in January 2017.[86] 8 of the 24 more trafficked websites in China have been blocked by The Great Firewall. This has created a burden to foreign suppliers who rely on these websites to sell their products or services.The lobby's 2016 business climate survey showed 79 percent of its members reported a negative impact on business due to internet censorship.[87]
According to Stephen Rosen, the GFW is reflective of the Chinese government's fear of civil disobedience or rebellion among the Chinese population against the Chinese Communist Party's rule:
If you want to know what people are worried about look at what they spend their money on. If you’re afraid of burglars you buy a burglar alarm. What are the Chinese spending their money on? We’re told from Chinese figures they’re spending on the People's Armed Police, the internal security force is about as big as they’re spending on the regular military. This whole great firewall of Chinese, this whole massive effort to control the internet, this effort to use modern information technology not to disseminate information, empowering individuals, but to make people think what you want them to think and to monitor their behavior so that you can isolate and suppress them. That’s because this is a regime which is fundamentally afraid of its own people. And it’s fundamentally hostile to them.[88]
^Chinese: 打开窗户,新鲜空气和苍蝇就会一起进来。; pinyin: Dǎkāi chuānghù, xīnxiān kōngqì hé cāngying jiù huì yìqǐ jìnlái. There are several variants of this saying in Chinese, including "如果你打开窗户换新鲜空气,就得想到苍蝇也会飞进来。" and "打开窗户,新鲜空气进来了,苍蝇也飞进来了。". Their meanings are the same.
^DNS Servers of china unicom have a very recognizable signature ("Why query me?Your IP had been logged!"), indicating a common source code or configuration within this ISP.
Nilekani, Nandan, "Data to the People: India's Inclusive Internet", Foreign Affairs, vol. 97, no. 5 (September / October 2018), pp. 19–26.
Segal, Adam, "When China Rules the Web: Technology in Service of the State", Foreign Affairs, vol. 97, no. 5 (September / October 2018), pp. 10–14, 16–18.
In computer networks, a proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems.
Internet in China
China has been on the internet intermittently since May 1989 and on a permanent basis since 20 April 1994. In 2008 China became the country with the largest population on the Internet and has remained so since. As of July 2016, 730,723,960 people were internet users.
Freegate
Freegate is a software application developed by Dynamic Internet Technology (DIT) that enables internet users from mainland China, North Korea, Syria, Vietnam, Iran, United Arab Emirates, among others, to view websites blocked by their governments. The program takes advantage of a range of proxy servers called Dynaweb. This allows users to bypass Internet firewalls that block web sites by using DIT's Peer-to-peer (P2P)-like proxy network system. FreeGate's anti-censorship capability is further enhanced by a new, unique encryption and compression algorithm in the versions of 6.33 and above. Dynamic Internet Technology estimates Freegate had 200,000 users in 2004. The maintainer and CEO of DIT is Bill Xia.
Censorship in China
Censorship in the People's Republic of China (PRC) is implemented or mandated by the PRC's ruling party, the Communist Party of China (CPC). The government censors content for mainly political reasons, but also to maintain its control over the populace. The Chinese government asserts that it has the legal right to control the Internet's content within their territory and that their censorship rules do not infringe on the citizen's right to free speech. Since Xi Jinping became the General Secretary of the Communist Party of China in 2012, censorship has been "significantly stepped up".
Internet censorship
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences.
VPN blocking
VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems. Often used by large organizations such as national governments or corporations, it can act as a tool for computer security or Internet censorship by preventing the use of VPNs to bypass network firewall systems.
Lantern (software)
Lantern is a free and open-source peer-to-peer internet censorship circumvention tool, used for casual web browsing. It provides a way to bypass state-sanctioned filtration through a network of trusted users, but it's not an anonymity tool like Tor. Using Lantern, users in countries having free internet access can share their bandwidth with those who are in countries where the network is partly blocked. Network connections will be dispersed between multiple computers running Lantern so it will not put undue stress on a single connection or computer.
Domain fronting
Domain fronting is a technique that circumvents internet censorship by obfuscating the domain of a HTTPS connection. Working in the application layer, domain fronting allows a user to connect to a service that may otherwise be blocked by DNS, IP or deep packet inspection.