18 years have passed since the birth of filtering content on the Internet in China. Now, this technology is known around the world under the name “Great Chinese firewall.” The basis of the Firewall is a combination of several content filtering systems that have been implemented in stages.
At the first stage (the 2000s), the filter was able only to block domain names and IP addresses. This was enough to block access to any site and redirect traffic to the so-called “blackhole route”.
At the second stage of development (turn of decade), the firewall was taught to filter content by keywords. The system analyzes the content of sites for compliance with the “national blacklist” of keywords. If prohibited information is found, the connection will be reset.
Soon, of course, users learned to access forbidden resources bypassing the filtering system with the help of VPN and Shadowsocks. Therefore, at the third stage of the firewall development (in 2011–2012), its programmers were mobilized to research the features of the VPN protocols used, such as IPSec, L2TP / TPSec and PPTP. Since then, the firewall has been able to reset VPN connections.
At the fourth stage (the 2010s), the filtration system continued to develop with the support of the legislation. VPN services began to disappear from the App Store. China Sinnet Technology, the company managing the Amazon cloud business in China, demanded that its customers stop using VPNs. On March 31, 2018, a complete ban on VPN came into force in the country.
In addition to the features described above, the Great Firewall is capable of:
Social networks: Twitter, Facebook, Instagram, Youtube, Vimeo, Google Hangouts, WordPress, TalkBox, SoundСloud
Messengers: Whatsapp, Telegram, Viber, Line, KakaoTalk
Media: New York Times, Bloomberg, BBC, WSJ, Flipboard, Google News, Vimeo, Wikipedia, Wikileaks articles
Search engines: Google, DuckDuckGo, Baidu Japan, Yahoo Hong Kong, Yahoo Taiwan
Cloud services: Microsoft OneDrive, Dropbox, Slideshare, iStockPhoto, Google Drive, Google Docs, Gmail, Google Translate, Google Calendar, Google Groups, Google Keep
Other online services: Flickr, Google Play, Google Picasa, Bit.ly, Archive.org, Change.org, 4Shared, OpenVPN
But even non-prohibited Internet-services are subject to strict censorship in China. For example, Chinese laws forbade the registration of new accounts without identification. Thus, it is impossible to create an anonymous or fictitious account in social networks & forums or to open an anonymous channel in messengers. And this leads to the arrest of users. For example, blogger Wang Jiang Feng was arrested simply because he joked about President Xi Jinping in the WeChat group.
As we have already said, Ignite is a nonprofit decentralized microblogging service. It is built on Prometeus Network and powered by Bittorrent. Technically, Ignite represents a set of independent and equitable nodes. Its mission is to fight with censorship and stand for freedom of speech. Core functions of Ignite are similar to Twitter: it allows to post small messages (up to 240 characters) and attach media files to them.
Due to its architecture, Ignite won’t be governed by anyone and could not be blocked by any form of barrier or firewall.
Let us explain how Ignite works on the example of the Chinese blogger Wang Jiang Feng, that we’ve mentioned before.
Wang Jiang Feng authenticates in Ignite through blockchain via his ERC20 wallet and the private key. Another word, Ignite allows signing in it without a centralized user database or any kind of social networking protocols. Then you choose how to blog: openly or completely anonymously without the risk of impersonation. In the case of Wang Jiang Feng, it is an anonymous blog. Then Chinese blogger publishes any content, including joke “Xi the Bun” on Ignite. When Jiang Feng is pushing the “Post” button, the post is being encrypted and inserted to a special block. Every 5 minutes Ignite nodes download this block to a distributed data storage called Bittorrent File System (BTFS) via Soter gateway. The block is stored forever and can’t be deleted even by the Chinese Great Firewall. Also, each generated block gets an encrypted address (called Hashtag), which is written in Ethereum blockchain by Ignite node. When someone wants to watch Jiang Feng’s post, another Ignite node uses Hashtag to find the address of the post in BTFS and show it to the user.
As we see, if a Chinese blogger used our Ignite platform to publish his posts, he would never have been found and sent to prison, and his jokes could never have been removed.
Let’s summarize Ignite’s core features:
Be with us. Read more about Ignite in our next articles. Soon we tell you about other use-cases (to publish unremovable dirt on corrupters or to express even the most unpopular, forbidden opinion) and about Ignite integration with token Prom.
Breaking the Chinese Firewall. Use-Cases of Decentralized Microblogging Service “Ignite” was originally published in Prometeus Network on Medium, where people are continuing the conversation by highlighting and responding to this story.
Write a post
Are you sure you want to delete this post?
Are you sure you want to delete this comment?
Purchase has been completed.
닉네임을 설정 후 작성해주세요.