Feeds

China challenged to take down ALL of AWS and Google

Greatfire.org leaps great firewall by mirroring Reuters in AWS and Google

Securing Web Applications Made Simple and Scalable

Non-profit anti-censorship body GreatFire.org has created a mirrored site that allows users in China to view the recently blocked Reuters site, in a move which could take down thousands of websites in the PRC if the authorities decide to play hardball.

Reuters China and the local language version of the Wall Street Journal were blocked by the Great Firewall last week in another sign of the Communist Party’s increasingly tough stance on censorship.

However, perpetual thorn-in-the-side of Beijing, GreatFire.org, has now mirrored the Reuters site using Amazon Web Services, therefore allowing users to view it without the need for circumvention tools like VPNs which it said can require “technical savvy” to set up.

It used the same technique to mirror its FreeWeibo.com site which helps micro-bloggers recover censored weibo posts, co-founder Charlie Smith wrote in a blog post.

That mirrored site, for the record, uses both AWS and Google.

Blocking the relevant domains, Smith continued, would create a significant backlash of the kind seen when the authorities blocked Github:

With our new mirror sites, the GFW cannot block FreeWeibo.com any longer without causing significant collateral damage which would also cause significant economic fallout in China.

Our mirror sites are unique because rather than using our own domains, we use a subpath of Amazon and Google’s domains which support HTTPS access. This means that GFW cannot block our mirror websites without blocking the domain of Amazon or Google entirely, namely “s3.amazonaws.com” and “commondatastorage.googleapis.com”.

The idea here, as Open Internet Tools Project concluded in a recent report, to make “crucial business activity inseparable from internet freedom”.

In this way, China faces a choice: take down Amazon and Google domains and the thousands of Chinese sites that rely on them, put pressure on the web giants to block GreatFire.org’s mirrored sites willingly, or do nothing.

As long as we’re just talking about a handful of mirrored sites here it’s unlikely that Beijing will go for the nuclear option, but as always it’s a numbers game. If site mirroring becomes a popular method of bypassing the Great Firewall, and if netizens in greater numbers flock to such sites, AWS and Google may find themselves both on the wrong side of an uncompromising line in the sand. ®

Application security programs and practises

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK.gov's Open Source switch WON'T get rid of Microsoft, y'know
What do you mean, we've ditched Redmond in favour of IBM?!
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.