ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Max Steel 2016 HC HDCAM UnKnOwN
View Torrent Info: Allied 2016 HDCAM x264 AC3 HQMic-CPG
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
Hot torrents
XVID DIVX
View Torrent Info: The Fight Within.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Spectral.2016.HDRip.XviD.AC3-EVO
View Torrent Info: The.Disappointments.Room.2016.DVDRip.XviD.AC3-EVO
View Torrent Info: All.We.Had.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: David.Brent.Life.on.the.Road.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Blood.Father.2016.1080p.BluRay.DTS.x264-ETRG
View Torrent Info: Imperium.2016.1080p.BluRay.DTS.x264-ETRG
View Torrent Info: Suicide.Squad.2016.EXTENDED.1080p.BluRay.DTS.x264-ETRG
Hot torrents
Television
View Torrent Info: Ash.vs.Evil.Dead.S02E10.WEBRip.X264-DEFLATE[ettv]
View Torrent Info: UFC 206 PPV Holloway vs Pettis HDTV x264-Ebi [TJET]
View Torrent Info: Saturday.Night.Live.S42E09.John.Cena.Maren.Morris.WEBRip.x264-FUM[ettv]
View Torrent Info: Ghost.Adventures.S13E11.Zalud.House.HDTV.x264-SPASM
View Torrent Info: Rustom (2016) HQ 1080p Blu-ray x264 Atmos 7.1 ESub -DDR
View Torrent Info: BEFIKRE (2016) x264 DesiSCR Rip AAC 2.0 -DDR
View Torrent Info: Beiimaan.Love.2016.720p.WEB-DL.H264.ESub.AAC2.0-DDR
View Torrent Info: Mohenjo Daro (2016) HQ 1080p Blu-Ray x264 ATMOS 7.1 ESub -DDR
30s
Chat
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is 54.147.238.62.   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > China Exploits Internet Users as Weapon in Cyberwar

China Exploits Internet Users as Weapon in Cyberwar

China Exploits Internet Users as Weapon in Cyberwar

Added: Wednesday, April 22nd, 2015
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2015
The “Great Cannon of China” is now a widespread term online, which has entered the lexicon of many people after the industry experts gave such a name to a new tool for Chinese censorship.

baidu.th.jpg

This tool was first noticed in use a couple weeks ago, when the coding site GitHub was flooded by traffic and as a result went offline for several days. This attack used a method known as “distributed denial of service” or DDoS and targeted Chinese anti-censorship outfits.

The researchers who noticed the attack came to a conclusion that it provided evidence of a new censorship tool used by Chinese government. They suggested that the cyber attack infrastructure was co-located with the “Great Firewall of China”, but carried out by a separate offensive system, so they decided to call it the “Great Cannon”. This instrument hijacks traffic to or from specific IP addresses, and is able to arbitrarily replace unencrypted content as a man-in-the-middle.

If used offensively, this new tool could turn ordinary and unsuspecting Internet users into a vector of attack. In that particular case, the Great Cannon of China appeared to intercept traffic sent to Baidu (largest search engine in the country) infrastructure servers. It turned out that in 1.75% cases it took that traffic and returned a malicious script, thus unwittingly enlisting the Internet user in the hacking campaign. Even this 1.75% of users managed to take GitHub down.

The researchers believe that the Chinese authorities operate the Great Cannon, as well as the Great Firewall, because both systems seem to be hosted on the same servers and share source code to intercept communications. This new weapon of cyberwar proved “exceptionally costly” to its targets, but can potentially be able to make even more damage. The researchers explained that technically simple change in its configuration could let it target specific individuals even if they didn’t reside in the country, as well as intercept their communications.

However, it is unclear why the Great Cannon of China was first deployed in such a publicly visible fashion, because this could set a dangerous precedent – this move was contrary to international norms and violated widespread domestic laws that prohibit the unauthorized use of computing and networked systems.

Posted by:  SuperAdmin
Date:  Wednesday, April 22nd, 2015



Comments (3) (please add your comment »)

1
posted by Site FriendET loverSuperman (2015-04-23 16:33:17)
Embolism avatarSo what is different from a 14 year old doing it to Steve Gibson many years ago and where lies the proof that it was not the work of an adolescent copying the exploit why must such be the work of the Chinese government,it seems quite arbitrary that anything done from within China is automatically blamed on the powers that be and seen as an act of aggression whereas it is much more likely to be someone clever with an axe to grind or even a foreign power who`s own designs for the Internet and its control are less than friendly.

2
posted by (2015-04-24 10:22:28)
No avatarIn order to speak of why china would do that first you need to ask. why would they not do it. as i have lived in china for the past 2 years i have seen things that the Chinese people have done and i just have to say to myself "welcome to china" i cant understand it nor do i want to at times. China is great place to live/visit but to a "LAOWI" (foreigner) we will never understand some of the things they do here in china. not saying they did it or didn't do it. but they 100% do have the power to do something like this if they wanted to in my eyes.

3
posted by Site FriendET loverSuperman (2015-04-26 01:35:28)
Embolism avatarexactly the point @2 they have the ability to do it and so much more but they would not do so quite so publicly and from one of their own servers,much more likely it is something thought up by dissidents or even foreign powers as we all are aware a 14 year old can steal an earthlink from a public library and DDOS steve [email protected] it would be a simple matter for such to be done in China or from anywhere in the world since most use windows and we all know they are open to Microsoft whether you want them in your box or not.I don`t dispute they may have been naughty in the past and they have certainly been accused of much and generally by the Americans ,but not everything is always as it seems and if we have learned anything in the past 12 or so years it`s that America has raised more red flags than China in relation to other countries mostly to cover their own naughtiness on the Internet or to make people fearful and use that fear to take control by use of laws (Patriot act,etc)and in giving further excuses to make incursions into countries they have no say in controlling,such as WMD`s in Iraq or to take metadata from foriegn nationals and to spy on their own countrymen as well as others in their global partnerships with paid off or controlled politicians like Tony Blair and David Cameron.



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc5