In the previous post, we examined how platforms like Baidu operate within China’s broader information governance system. But that system does not begin with Baidu.
It begins at the network layer.
The so-called “Great Firewall” is not a single wall, nor a single program. It is a distributed, multi-layered technical architecture embedded into the routing infrastructure of China’s internet. It combines legal authority, telecom-level control, deep packet inspection, DNS manipulation, and real-time traffic interference.
Let’s unpack how it works.
1. The Structural Advantage: Centralized Gateways
One reason China can operate such a system is structural: most international internet traffic flows through a limited number of state-controlled backbone providers.
Key operators include:
China Telecom
China Unicom
China Mobile
Because these firms control international gateways, authorities can monitor and filter cross-border traffic at chokepoints rather than at millions of individual endpoints.
This centralized architecture makes national-level filtering technically feasible.
2. DNS Manipulation: Poisoning at the First Step
When you type a domain name (e.g., example.com), your device queries a DNS server to translate it into an IP address.
The Great Firewall frequently interferes at this stage through:
DNS Poisoning
If a user inside China tries to access a blocked site, the DNS response may:
Return a fake IP address
Return a non-routable IP
Return no response
This is often called DNS “spoofing” or “poisoning.”
The key insight: the user never reaches the real server. The failure happens before a connection is established.
3. IP Address Blocking
Authorities maintain lists of IP addresses associated with prohibited services (e.g., certain foreign news sites or platforms).
Traffic to those IP ranges can be:
Silently dropped
Reset
Blackholed at routers
This method is blunt but effective.
The limitation? Large cloud providers host many unrelated services on shared IPs. Blocking one may disrupt others. This has led to increasingly sophisticated filtering methods.
4. Deep Packet Inspection (DPI)
This is where things become more advanced.
Deep Packet Inspection (DPI) examines not just destination addresses, but the contents of data packets.
With DPI, the system can:
Detect specific keywords
Identify protocol signatures (e.g., VPN traffic)
Recognize encrypted handshake patterns
Monitor suspicious traffic behavior
When a sensitive keyword is detected in an unencrypted HTTP request, the system may inject a TCP reset packet — forcibly terminating the connection.
This technique is subtle and dynamic.
5. TCP Reset Injection
Instead of permanently blocking a connection, the firewall may:
Detect a flagged keyword in transit.
Send forged TCP reset (RST) packets to both sides.
Immediately terminate the session.
This creates the appearance of a random network failure.
Importantly, the reset packets are spoofed — they appear to come from the intended destination server.
This method allows granular, session-level disruption.
6. SNI Filtering and HTTPS Control
As more of the internet shifted to HTTPS encryption, keyword filtering became harder.
However, during the TLS handshake, a field called Server Name Indication (SNI) reveals the intended domain name — even before encryption fully activates.
China began filtering based on SNI:
If the SNI matches a blocked domain, the connection is cut.
More recently, encrypted SNI (ESNI) and newer protocols complicate filtering. This has led to adaptive countermeasures, including:
Blocking entire VPN provider IP ranges
Throttling encrypted traffic
Actively probing suspicious servers
7. Active Probing of VPNs
When the firewall detects potential VPN traffic patterns, it may:
Initiate active scanning of the suspected server
Attempt to complete VPN handshakes
Identify protocol signatures
If confirmed, the IP can be temporarily or permanently blocked.
This turns the firewall from passive filter into active participant.
8. Platform-Level Compliance
Infrastructure filtering is only one layer.
Platforms operating inside China — such as:
Tencent
Alibaba Group
Baidu
— are legally obligated to implement:
Content moderation systems
Real-name registration
Keyword filtering
AI-driven monitoring
This creates layered control:
Infrastructure layer blocks foreign content.
Platform layer shapes domestic discourse.
9. Is It One System?
No.
The “Great Firewall” is shorthand. In reality, it is:
A regulatory framework
A telecom routing architecture
A real-time traffic analysis system
A corporate compliance regime
A social monitoring ecosystem
It evolves constantly. When users adopt new circumvention tools, filtering methods adapt.
It is less a wall than a living organism.
10. Technical Sophistication vs. Political Design
Technically, many of these methods are not unique to China:
Enterprises use DPI for security.
Countries block malicious IP ranges.
ISPs globally filter illegal content.
The distinction lies in scale and purpose.
In China, the system is national, integrated, and politically oriented. It is designed not merely to prevent cybercrime — but to shape the informational boundary of a civilization-scale population.
11. The Arms Race Dynamic
There is a continual cat-and-mouse cycle between:
VPN developers
Encryption protocol designers
Decentralized network advocates
State filtering authorities
Technologies such as:
Domain fronting
Tor bridges
Encrypted DNS (DoH/DoT)
have periodically gained traction — and then faced countermeasures.
This dynamic ensures the system never becomes static.
12. What the Great Firewall Is — and Isn’t
It is not:
A single server
A visible physical barrier
A universal block on all foreign information
It is:
Selective
Adaptive
Layered
Politically guided
Many foreign academic journals, business services, and research resources remain accessible. The filtering is targeted, not indiscriminate.
Final Reflection: Engineering Sovereignty
The Great Firewall represents one of the most ambitious experiments in digital sovereignty ever attempted.
Technically, it demonstrates:
Large-scale network traffic control
Real-time adaptive filtering
Integration of AI moderation systems
National-scale gateway monitoring
Philosophically, it raises deeper questions:
Can a nation fully participate in global digital networks while controlling its informational borders?
Or does control inevitably reshape the nature of participation itself?