{"guid":"56721a59-30c0-4201-8744-5d2a9846ed28","title":"How the Great Firewall discovers hidden circumvention servers","subtitle":null,"slug":"32c3-7196-how_the_great_firewall_discovers_hidden_circumvention_servers","link":"https://events.ccc.de/congress/2015/Fahrplan/events/7196.html","description":"Several years ago, the Great Firewall of China was silently upgraded to find and block circumvention servers that employ encryption to defeat deep packet inspection. The system is now used to block protocols such as Tor, SoftEther, and SSH. In this talk, we will give an overview of how this system works, and how it can be circumvented.","original_language":"eng","persons":["Philipp Winter"],"view_count":25770,"promoted":false,"date":"2015-12-27T17:15:00.000+01:00","release_date":"2015-12-28T01:00:00.000+01:00","updated_at":"2026-04-20T07:00:03.459+02:00","tags":["Science"],"length":3563,"duration":3563,"thumb_url":"https://static.media.ccc.de/media/congress/2015/7196-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2015/7196-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2015/56721a59-30c0-4201-8744-5d2a9846ed28-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2015/56721a59-30c0-4201-8744-5d2a9846ed28-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/32c3-7196-how_the_great_firewall_discovers_hidden_circumvention_servers","url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_title":"32C3: gated communities","conference_url":"https://api.media.ccc.de/public/conferences/32c3","related":[{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":5},{"event_id":2817,"event_guid":"7430c969-7ccf-4d40-903a-d9b1ebb4fb15","weight":4},{"event_id":2820,"event_guid":"1d7d4787-c77a-4e6e-9398-f3b4dcaa3587","weight":16},{"event_id":2822,"event_guid":"4c070a2c-0558-48b8-b612-b8507a51154e","weight":5},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":3},{"event_id":2832,"event_guid":"489a414b-2d6b-4f20-8187-813169ca19c9","weight":5},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":3},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":4},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":3},{"event_id":2888,"event_guid":"018148c1-62c9-4796-8443-2a8c8b8e3a01","weight":4},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":3},{"event_id":2927,"event_guid":"f6149460-a278-4600-bf9d-61ea737c46de","weight":5},{"event_id":2940,"event_guid":"48219ef6-24b8-41ca-8cc0-ec309e4148e6","weight":8},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":4},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":3},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":7},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":10},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":14},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":3},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":9},{"event_id":3742,"event_guid":"7a5971c8-746b-4450-ba89-6569667f77c2","weight":3},{"event_id":3766,"event_guid":"2b9b6095-9dcd-49f3-9792-cf74aab88b16","weight":9},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":7},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":3}],"recordings":[{"size":41,"length":3554,"mime_type":"audio/opus","language":"deu","filename":"32c3-7196-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.opus","state":"downloaded","folder":"opus-translation","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T18:26:32.815+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus-translation/32c3-7196-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.opus","url":"https://api.media.ccc.de/public/recordings/8905","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":54,"length":3554,"mime_type":"audio/mpeg","language":"deu","filename":"32c3-7196-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp3","state":"downloaded","folder":"mp3-translated","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T05:19:31.362+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3-translated/32c3-7196-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp3","url":"https://api.media.ccc.de/public/recordings/8698","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T17:53:21.898+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/DRAFT_32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50755","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":233,"length":3563,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_webm-sd.webm","state":"downloaded","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:12:00.526+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-sd/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/8699","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":44,"length":3554,"mime_type":"audio/opus","language":"eng","filename":"32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.opus","state":"downloaded","folder":"opus","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T05:20:12.198+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus/32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.opus","url":"https://api.media.ccc.de/public/recordings/8701","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":54,"length":3554,"mime_type":"audio/mpeg","language":"eng","filename":"32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp3","state":"downloaded","folder":"mp3","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-29T05:20:42.993+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3/32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp3","url":"https://api.media.ccc.de/public/recordings/8702","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":501,"length":3563,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_hd.mp4","state":"downloaded","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:11:36.555+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_hd.mp4","url":"https://api.media.ccc.de/public/recordings/8576","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":465,"length":3563,"mime_type":"video/mp4","language":"deu","filename":"32c3-7196-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:11:36.235+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7196-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp4","url":"https://api.media.ccc.de/public/recordings/8575","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":574,"length":3563,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_webm-hd.webm","state":"downloaded","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T21:01:44.727+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-hd/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/8522","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":234,"length":3563,"mime_type":"video/mp4","language":"eng","filename":"32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_sd.mp4","state":"downloaded","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:11:24.212+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-sd/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_sd.mp4","url":"https://api.media.ccc.de/public/recordings/8445","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":464,"length":3563,"mime_type":"video/mp4","language":"eng","filename":"32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:11:35.986+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.mp4","url":"https://api.media.ccc.de/public/recordings/8574","event_url":"https://api.media.ccc.de/public/events/56721a59-30c0-4201-8744-5d2a9846ed28","conference_url":"https://api.media.ccc.de/public/conferences/32c3"}]}