Massive leak shows as a Chinese company is exporting the great firewall in the world

A fugue of more than 100,000 documents shows a small-known Chinese company was quiet the systems of censorship censorship apparently to the Great firewall to governments in the world.

The geedge network, 2018 contained the “father” of China’s ceiling for “Prince Processing of the network and minimizes security” for their customers showing. In fact, researchers find that was epeding a sophisticated system allowing users of monitoring, clear utensils and vpn not.

Researchers who revised the filt material found that society is able to poachance the trade version of the large fireture and software operated by local government officers. The documents also discuss for dissiring features that the company was working, as the cybarack-to utilizes some users.

According to the scores matches, geedge has already been entered Kazakhstan, Ethiopia, Pakistan, and myanmar, as well as another unique country. A public public shows that geedge is also waiting for other countries for work-called non-called in the cuttied documents, breached.

Files, including jira attention and confluence, and matching the chinese occurrences, show inner technical logs, and communication. Adjust through anonymous escape, files were studying by a human rights and middle and organization, intersect, the portait, the austrian pile, and follow the money.

“This is not as a Latk interception that every western country, a gelorial technician. In addition to a technical cense. In addition to a technician individuals based in his website, as you have visited a certain domain.

The surveillance system that geedge is selling “give so much power to the government that no one should have” shores. “This is very scare.”

Digitally Authoritism as a service

At the heart of geedge bid is a gateway tower called Tiangou’s door (TSG), conceived dates of a healthy sex country, the two-sided. According to the researchers, each attractive traffic pack, where it can be scanned, wild, or if you stopped welcome. Besides to monitor the traffic, papers show that the system allows further rules for the specific users that suspicious their network activities.

For the uniencen internet traffic, the system is able to intercept you to interact (site content, they have a password, and attach the email, as the film documents. If the content is carefully the security protocol, the system uses deep profound techniques to lie down is surrounding the eastward census with a vpn. If you cannot distinguish the encrypted traffic content, the system may also opt for refreshable as suspicion and block for a period of time.

Source link