Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
TM RedHotCyber 970x120 042543
The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Redazione RHC : 16 September 2025 07:21

Edited by Luca Stivali and Olivia Terragni.

On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massively, revealing without filters the technological infrastructure that fuels censorship and digital surveillance in China.

Over 600 gigabytes of internal material have been put online – via the Enlace Hacktivista group platform: code repositories, operational logs, technical documentation and correspondence between development teams. Material that offers a rare window into the inner workings of the world’s most sophisticated network control system.

Researchers  Journalists worked on these files for a year to analyze and verify the information before publishing it: the analyzed metadata in fact reports the year 2023. The accurate reconstruction of the leak was then published in 2025 and mainly concerns Geedge Networks, a company that has collaborated with the Chinese authorities for years (and which includes among its advisors the “father of GFW” Fang Binxing), and the MESA Lab (Massive Effective Stream Analysis) of the Institute of Information Engineering, part of the Chinese Academy of Sciences. These are two key pieces in that hybrid supply chain – academic, state and industrial – which has transformed censorship from a national project to a scalable technological product.

From prototype to “GFW in a box”

If the ideological veneer is removed, what emerges from the leak is not a simple collection of rules, but a complete product: an integrated modular system, designed to be operational within telco data centers and replicable abroad.

The heart is the Tiangou Secure Gateway (TSG), which is not a simple appliance, but a network traffic inspection and control platform, which performs Deep Packet Inspection (DPI), classifies protocols and applications in real time, blocks code, and manipulates traffic. We are not deducing this by clue: the documents “TSG Solution Review Description-20230208.docx” and “TSG-问题.docx” explicitly appear in the dump, along with the RPM packaging server archive (mirror/repo.tar, ~500 GB), a sign of an industrial build and release pipeline.

TSG (DPI and enforcement engine)

The TSG component is designed to operate on the network perimeter (or at ISP nodes), handling large volumes of traffic. The “product” perspective is confirmed by the vendor’s documentation and marketing materials: TSG is presented as a “full-featured” solution with deep packet inspection and content classification—exactly what the leak reports suggest.

Traffic manipulation (injection) and active measures

The platform does more than just “keep out.” Some reports, summarized in the Chinese-language technical dossier, explicitly mention code injection into HTTP, HTTPS, TLS, and QUIC sessions. There is even the ability to launch targeted DDoS as an extension of the censorship line. This establishes the convergence between censorship and offensive tools, with a single control room.

Telemetry, tracking and operational control

From the summaries of the documents, we can reconstruct the functions of real-time monitoring, location tracking (association with cells/network identifiers), access history, profiling and selective blackouts by area or by event. These are not just slides: they are consistently cited capabilities that emerge from the content analysis of the leak of the Jira/Confluence/GitLab platforms, used for support, documentation and development of the TGS.

Operator console and management layer

Above the network engine there is a “human” level: dashboard and network intelligence tools, which provide visibility to non-developer operators: these tools allow: search, drill-down by user/area/service, alerts, reporting and rule activation. Geedge itself advertises such a product as a unified interface for visibility and operational decision-making, consistent with what emerges in the leak on the control and orchestration part.

Packaging, CI/CD and release (the “in a box” part)

The fact that half a terabyte of the dump is a mirror of RPM packages says a lot: there is a build, versioning and rollout supply chain packaged for massive installations, both at the provincial level in China and via simple copies (copy-paste) abroad.

Exporting Censorship

The leak confirms what several researchers have long suspected: China is not limited to using the Great Firewall (GFW) for internal control, but is actively exporting it to other regimes. Internal documents and contracts show deployments in Myanmar, Pakistan, Ethiopia, Kazakhstan, and at least one other unidentified customer.

In the case of Myanmar, an internal report shows the simultaneous monitoring of over 80 million connections across 26 connected data centers, with functions aimed at blocking over 280 VPNs and 54 priority applications, including the messaging apps most used by local activists.

In Pakistan, the Geedge platform has even replaced the Western vendor Sandvine, reusing the same hardware but replacing the software stack with a Chinese one, alongside Niagara Networks components for tapping and Thales for licensing. This is an emblematic case of how Beijing manages to penetrate already saturated markets by exploiting the modularity of its solutions.

From censorship to cyber weapon

Another crucial aspect that emerged concerns the convergence between censorship and offensive capabilities. Some documents describe code injection functions over HTTP (and potentially HTTPS when man-in-the-middle is possible with trusted CAs) and the possibility of launching targeted DDoS attacks against specific targets.

“Kazakhstan (K18/K24) → First foreign client. Used it for nationwide TLS MITM attacks”.

This raises the bar beyond simple information repression: it means having a tool that can censor, surveil and attack, integrating functions that are usually separate into a single platform. This is a real  “censorship toolkit” that effectively becomes a cyber weapon at the disposal of authoritarian governments.

The war for algorithmic control

The leak of the Great Firewall of China was published by Enlace Hacktivista, a predominantly Latin American hacktivist group – which collaborates with DDoS Secrets – known for having already released other important data leaks such as those of Cellebrite, MSAB, military documents, religious organizations, corruption and sensitive data, and tens of terabytes of companies working in the mining and oil sectors in Latin America, thus exposing corruption and illicit environmentalism, corruption, as well as sensitive data. 

In the case of the Great Firewall of China Fierwall Leak the documents were uploaded to their platform – https://enlacehacktivista.org – hosted by an Icelandic provider, known for protecting privacy and free speech.

The first question we should ask ourselves is: why a majority group Should a Latin American company compromise China’s international reputation by publishing sensitive and critical information, likely from an internal source linked to Chinese digital censorship? Who would be behind it? Who benefits from all this? The leak is strategic and has moved simultaneously in multiple directions with targeted action on multiple sources with political impact.

The answer, in the context of an international fight against censorship and digital surveillance, would seem obvious. However, it must be considered that in addition to activists, political opponents, NGOs, and journalists who seek to denounce violations of freedoms and push for sanctions against companies that provide repressive technology, Western governments are trying to limit Chinese influence in the surveillance technology market while increasing geopolitical pressure on Beijing.

‘China views the management of the Internet as a matter of national sovereignty: with measures aimed at protecting citizens from risks such as fraud, hate speech, terrorism, and content that undermines national unity, in line with socialist values.’ However, the Great Firewall of China would not only control the Internet in the country, but its model – along with the technology – would have already been exported outside the country, “inspiring” authoritarian regimes and governments in various regions, including Asia, Africa and finally Latin America, where censorship, digital repression and information control are increasingly widespread:

  • it would have been used and installed in Pakistan to monitor and limit Internet traffic at a national level. Amnesty International’s report “Pakistan: Shadows of Control: Censorship and mass surveillance in Pakistan” documents, for example, how a number of private companies from several countries, including Canada, China, Germany, the United States and the United Arab Emirates, have supplied surveillance and censorship technologies to Pakistan, despite the country’s poor record on online rights.
  • The report “Silk Road of Surveillance” published by Justice For Myanmar on 9 September 2025, denounces the close collaboration between Myanmar’s illegal military junta and Geedge Networks and highlights that at least 13 telecommunications operators in Myanmar are involved in the repression against political opponents and activists, with serious human rights violations.
  • The leaked documents also indicate that Geedge Networks began piloting a provincial firewall project in Fujian, a province off the coast of Taiwan, in 2022. However, information about this project is limited compared to other implementations [“Fujian Project” (福建项目)]. Furthermore, one of the hardware devices created by Geedge Networks—Ether Fabric—  which allows for the efficient and precise distribution and monitoring of data traffic – essential for intelligence gathering and the control of communications in government – is not only connected to Chinese companies but also to Taiwanese ones (such as ADLINK Technology Inc), in a sensitive geopolitical context, considering the existing tensions in the region and the technological competition between China, Taiwan and Western democracies.

All this, however, is happening in a climate where the governments of various countries, from Nepal to Japan, passing through Indonesia, Bangladesh, Sri Lanka and Pakistan, are facing strong social tensions, which have led to instability triggered by measures such as restrictions on social networks or popular protests. An emblematic case is what happened in Nepal in recent days and a related case is that of Japan, where the change of leadership is moving towards a pro-US attitude.

The damage to soft power

The A leak of the Great Firewall — a symbol of state control and Chinese technological sovereignty —would go further, affecting the very core of the social contract between the CCP and Chinese citizens—with implications for privacy and national security— thus threatening China’s ambitious plans to make the country a global center of technological innovation. Huawei, Xiaomi, BYD, and NIO are just a few names spearheading this strategic goal, which effectively aims to export cutting-edge technologies in key sectors such as artificial intelligence, electric vehicles, renewable energy, semiconductors, 5G, aerospace, and biotechnology. Well, it’s not just about freedom of speech, because the Firewall protects the Chinese digital market from external competition. Furthermore, a leak would expose the system’s technological vulnerabilities, undermining its reputation or making it vulnerable. And in fact the leak would have been part of the work, not only desacralizing China’s technological invulnerability, but undermining internal trust.

On the other hand, today, September 15, even the announcement of the Chinese antitrust investigation on Nvidia – for alleged violations of the antimonopoly law in relation to the acquisition of the Israeli company Mellanox Technologies –  could represent damage to American soft power in the technology and artificial intelligence sector.

The alarm bell

The official and media reactions of China confirm the situation: communications are managed with the utmost confidentiality. Caution, with heavy social media censorship and generative AI to limit the spread of information with the help of OSINT specialists and networks like “Spamouflage.” The response was likely. The next step could be damage to international relations, potential sanctions, and increased scrutiny of Chinese tech. Furthermore, some telecom companies examined in the report, including Myanmar’s Frontiir, denied using Chinese surveillance technology or downplayed its use, claiming they were using it for ordinary, legitimate security purposes, with the support of their international investors.

A 2024 study published by USENIX – Measuring the Great Firewall’s Multi-layered Web Filtering Apparatus – has already examined how the Great Firewall of China (GFW) detects and blocks encrypted web traffic. The research was  conducted by an international group of university and independent researchers, including the two lead authors, Nguyen Phong Hoang, Nick Feamster, joined by researchers Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg. 

The goal was to understand the technical mechanisms by which the GFW manages, inspects, and filters HTTPS, DNS, and TLS traffic, especially to circumvent advanced encryption technologies such as Shadowsocks or VMess. The work relied on real-world measurements using VPS servers in China and the US and monitoring tools to study the censorship and blocking operated in real time by the GFW.

In short, the conclusions established that DNS, HTTP and HTTPS filtering devices together constitute the main pillars of the Great Firewall (GFW) web censorship: over the course of 20 months, GFWeb has tested over a billion qualified domains and detected 943,000 and 55,000 censored pay-level domains, respectively.

Research published in 2024 and reports on leaked documents offer an unprecedented amount of inside material, useful for understanding in detail the architecture, development processes and day-to-day operational use of the technology.

Replicability, global expansion and cybersecurity impacts

The leak exposes several key points: 

  1. Chinese censorship is no longer a monolithic national infrastructure, but a replicable product ready for export, with manuals and technical support.
  2. The supply chain is complex and global, with hardware and software components also coming from from the West, in some cases reused without the original vendors being fully aware of it.
  3. The international spread of the Chinese model risks consolidating a global censorship market, accessible to regimes that have financial capacity but no internal know-how.

For those studying security and evasion techniques, this leak represents a goldmine of information. Analysis of the sources could reveal vulnerabilities in deep packet inspection (DPI) algorithms and fingerprinting modules, opening up avenues for developing more effective bypass tools. But it is clear that the challenge is becoming increasingly asymmetric: the counterpart is no longer improvised, but a technology industry with roadmaps, patches and customer support.

Conclusion

The implications The implications of the Great Firewall Leak are enormous, both technically and politically. For the CTI community and those working on digital rights defense, this could be an opportunity to better understand the architecture of next-generation censorship and surveillance and anticipate its future. But above all, it confirms that the battle for digital freedom is no longer played out solely on the terrain of technology, but rather on the even more complex terrain of geopolitics.

Digital censorship is at the heart of power relations between states, and the fight for free access to information is a global and multi-level issue.

Sources

Immagine del sitoRedazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli