China Cracks Down on Tor Anonymity Network

A leading anonymity technology is targeted by the Chinese government for the first time.

For the first time, the Chinese government has attacked one of the best, most secure tools for surfing the Internet anonymously. The clampdown against the tool, called Tor, came in the days leading up to the 60th anniversary of China’s “national day” on October 1. It is part of a growing trend in which repressive nations orchestrate massive clampdowns during politically sensitive periods, in addition to trying to maintain Internet firewalls year-round.

“It was the first time the Chinese government has ever even included Tor in any sort of censorship circumvention effort,” says Andrew Lewman, the executive director of Tor Project, the nonprofit that maintains the Tor software and network. “They were so worried about October 1, they went to anything that could possibly circumvent their firewall and blocked it.”

Tor is one of several systems that route data through intermediate computers called proxies, thereby circumventing government filters. To anyone watching Internet connections, the traffic then seems to be coming from the proxies. Tor provides stronger anonymity protection than most others, because it uses several such proxies and encrypts the Internet protocol (IP) addresses at each step. The downside is that Tor slows down Internet access considerably.

The potential for Tor’s IP address to be blocked has always existed, especially since Tor Project publishes them openly in an online directory. Until late September, however, China never bothered to block it. Then, on September 25, Tor usage by Chinese citizens plunged from thousands of users (between 8,000 and 10,000 Tor requests from China were active at any given moment in the preceding days) to near zero. “Based on what we tested, it appears that they pulled the list on September 18, and it took until September 25 to get that into their firewall apparatus,” says Lewman. On Tuesday, Tor Project published an analysis of China’s effort.

The analysis found some good news. The use of workarounds called “bridges”–IP addresses of volunteer computers who have agreed to connect users to the otherwise-blocked Tor network–soared during the period, helping many Tor users back online. The distribution of these bridge addresses was coordinated through various instant-messaging services in China. While hard numbers were not available, Lewman says bridge use increased 70-fold.

Routed out: China’s efforts to block access to Tor, a tool for anonymous Web surfing, kicked in on September 25. This graphic shows the number of real-time requests from within China for Tor’s directory–an indicator of Tor usage.

The events of late September showed that China is stepping up its blocking efforts, said Wendy Seltzer, a law professor and research fellow at the University of Colorado who founded and developed the Chilling Effects Clearinghouse, a project to fight unjustified legal threats to the Internet. “Watching China step up blocking around nationally significant events shows the degree of control they are trying to exercise,” added Seltzer, who is also an uncompensated member of Tor’s board. “The experience helped to validate Tor’s strategy of having lots of defenses in queue.”

Tor is now working out ways to more efficiently and rapidly disseminate bridge addresses in the future, including via Twitter. “The issue is, obviously, that the Chinese government could also use Twitter to receive the bridges, and block those, too,” adds Lewman. He is working on ways to time responses to such requests to make things more difficult for the government to block. “Writing the code is the easy part. The logic behind it–that’s the hard part.”

In 2006, the OpenNet Initiative–a research collaboration among several universities–reported filtering in 25 of 46 nations tested. In another forthcoming study, the OpenNet Initiative will report that these efforts are expanding, says Ronald Deibert, a political scientist and director of the Citizen Lab at the University of Toronto, one of the participating universities.

The trend of time-sensitive national crackdowns has increased in the past four years, Deibert says. “Often governments block access to information not as static or passive filtering walls, but rather at key moments in time when the information has most value, such as during public demonstrations, key historical events, or election periods,” notably including, in recent months, the disputed Iranian election, he adds.

Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.
Subscribe today

Uh oh–you've read all five of your free articles for this month.

Insider Premium

$179.95/yr US PRICE

More from undefined

Want more award-winning journalism? Subscribe and become an Insider.

  • Insider Premium {! insider.prices.premium !}*

    {! insider.display.menuOptionsLabel !}

    Our award winning magazine, unlimited access to our story archive, special discounts to MIT Technology Review Events, and exclusive content.

    See details+

    What's Included

    Bimonthly home delivery and unlimited 24/7 access to MIT Technology Review’s website.

    The Download. Our daily newsletter of what's important in technology and innovation.

    Access to the Magazine archive. Over 24,000 articles going back to 1899 at your fingertips.

    Special Discounts to select partner offerings

    Discount to MIT Technology Review events

    Ad-free web experience

    First Look. Exclusive early access to stories.

    Insider Conversations. Join in and ask questions as our editors talk to innovators from around the world.

  • Insider Plus {! insider.prices.plus !}* Best Value

    {! insider.display.menuOptionsLabel !}

    Everything included in Insider Basic, plus ad-free web experience, select discounts to partner offerings and MIT Technology Review events

    See details+

    What's Included

    Bimonthly home delivery and unlimited 24/7 access to MIT Technology Review’s website.

    The Download. Our daily newsletter of what's important in technology and innovation.

    Access to the Magazine archive. Over 24,000 articles going back to 1899 at your fingertips.

    Special Discounts to select partner offerings

    Discount to MIT Technology Review events

    Ad-free web experience

  • Insider Basic {! insider.prices.basic !}*

    {! insider.display.menuOptionsLabel !}

    Six issues of our award winning magazine and daily delivery of The Download, our newsletter of what’s important in technology and innovation.

    See details+

    What's Included

    Bimonthly home delivery and unlimited 24/7 access to MIT Technology Review’s website.

    The Download. Our daily newsletter of what's important in technology and innovation.

You've read of free articles this month.