Friday, April 11, 2025
HomeCyber AttackThe Great Firewall: China Censorship and Recent Hong Kong Protests

The Great Firewall: China Censorship and Recent Hong Kong Protests

Published on

SIEM as a Service

Follow Us on Google News

It seems as if the situation in Hong Kong isn’t going to die down anytime soon with protests entering their tenth week and financial markets slowly feeling the pressure.

Social media is rife with updates, but one question that begs answering is, how are people in the mainland finding out about the situation in Hong Kong?

Are people on the mainland trying to leap the Great Firewall to find out what’s going on?

- Advertisement - Google News

What is the Great Firewall?

The term is an obvious play on “The Great Wall” and “firewall,” and it was believed to have been coined by Geremie Barmé, an Australian sinologist.

It refers to the massive censorship of the internet by the Chinese government.

It’s a combination of different technologies and legislation that’s meant to enforce restrictions on what the average Chinese citizen can view in mainland China.

This censorship will either block or limit regular internet users’ access to particular foreign language sites and tools. This censorship extends to mobile applications as well.

If the Chinese government deems content as harmful to national security, it may impose immediate actions such as the blocking of the website in the mainland. Facebook, Wikipedia, Twitter, and Google search, are amongst the list of external sites that can’t be viewed using a standard connection in China. Other foreign companies have had to submit to regulations to continue the operation of websites in China.

This has resulted in many users who want “regular” access to the internet to look for the best VPN for China. It’s one of the few ways of bypassing the censorship that has been imposed by the government.

The Hong Kong Protests and The Great Firewall

The Hong Kong protests are the result of a controversial law that aims to allow the extradition of people in Hong Kong to the Chinese mainland.

This move has angered many in Hong Kong to take to the streets to protest a move that’s said to potentially erode the “one country, two systems” policy.

Everyone’s hearing about it and social media are abuzz with it, and there are indicators that people in the mainland are interested in what’s going on.

According to a report by Reuters in June, Wechat has said that searches for the term “Hong Kong” have peaked at more than 32 million.

There’s ample evidence to believe that people in mainland China want to know what’s going on.

The only way for them to do this is to use virtual private networks (VPNs) to bypass the government’s censorship by masking their location and internet traffic.

The fact of the matter is, there are a lot of people who are trying to “leap” the wall to get the information that they need. It’s been a real struggle for them to access information that has not been censored by the government.

There’s been numerous reports as well of mainland Chinese trying to repost content of the Hong Kong protest only to have them taken down by government censors.

However, the bubble is not as tight as they would have hoped with some content being able to last for a couple of minutes before being flagged and taken down.

The only content that’s allowed to pass are ones that are either critical of the protests or are pro-mainland.

The censors look like they are trying their best to make sure that there’s no spillover of the unrest. Also, it looks as if they will do everything in their power to keep the information in a vacuum.

Mainland Internet versus Hong Kong Internet

The Chinese government’s view is that if the internet is inside the country, then it’s a part of the nation’s sovereignty, meaning that they have the right to govern and decide its proper usage depending on their guidelines.

However, it also operates on the principle of “one country, two systems,” meaning that it allows Hong Kong and Macau to have uncensored internet. There have been reports that regardless of this principle, the Chinese mainland has still kept a close eye on internet usage in both areas.

The only hope for both people in mainland China and foreigners visiting the region to be allowed real access to the internet is to use VPNs or proxy serverS to mask their connections.

The Chinese government will still attempt to do their best to impose the restrictions that they believe are necessary to promote their version of stability in their state.

Latest articles

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further...

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms

Sapphire Werewolf has introduced a potent new weapon into its cyber arsenal, unveiling the...