GFW’s analysis of this incident is that “blocking is done by blocking the specific port that the circumvention services listen on. When the user changes the blocked port to a non-blocked port and keep using the circumvention tools, the entire IP addresses may get blocked.” Interestingly, domain names used with these tools are not added to the Great Firewall’s DNS or SNI blacklists, and blocking seems to be automatic and dynamic. “Based on the information collected above, we suspect, without empirical measurement yet, that the blocking is possibly related to the TLS fingerprints of those circumvention tools,” the organization asserts. An alternative circumvention tool, naiveproxy, appears not to be impacted by these changes. “It’s not hard to guess why China might have chosen this moment to upgrade the Great Firewall: the 20th National Congress of the Chinese Communist Party kicks off next week,” notes the Register. “The event is a five-yearly set piece at which Xi Jinping is set to be granted an unprecedented third five-year term as president of China.”
Read more of this story at Slashdot.