Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    OpenAI’s big Codex update is a direct shot at Claude Code

    OpenAI’s big Codex update is a direct shot at Claude Code

    April 16, 2026
    Casely has reannounced a power bank recall from 2025 following a fatality

    Casely has reannounced a power bank recall from 2025 following a fatality

    April 16, 2026
    The only way to fight deepfakes is by making deepfakes

    The only way to fight deepfakes is by making deepfakes

    April 16, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World
    Security

    Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

    News RoomBy News RoomSeptember 10, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

    A leak of more than 100,000 documents shows that a little-known Chinese company has been quietly selling censorship systems seemingly modeled on the Great Firewall to governments around the world.

    Geedge Networks, a company founded in 2018 that counts the “father” of China’s massive censorship infrastructure as one of its investors, styles itself as a network-monitoring provider, offering business-grade cybersecurity tools to “gain comprehensive visibility and minimize security risks” for its customers, the documents show. In fact, researchers found that it has been operating a sophisticated system that allows users to monitor online information, block certain websites and VPN tools, and spy on specific individuals.

    Researchers who reviewed the leaked material found that the company is able to package advanced surveillance capabilities into what amounts to a commercialized version of the Great Firewall—a wholesale solution with both hardware that can be installed in any telecom data center and software operated by local government officers. The documents also discuss desired functions that the company is working on, such as cyberattack-for-hire and geofencing certain users.

    According to the leaked documents, Geedge has already entered operation in Kazakhstan, Ethiopia, Pakistan, and Myanmar, as well as another unidentified country. A public job posting shows that Geedge is also looking for engineers who can travel to other countries for engineering work, including to several countries not named in the leaked documents, WIRED has found.

    The files, including Jira and Confluence entries, source code, and correspondence with a Chinese academic institution, mostly involve internal technical documentation, operation logs, and communications to solve issues and add functionalities. Provided through an anonymous leak, the files were studied by a consortium of human rights and media organizations including Amnesty International, InterSecLab, Justice For Myanmar, Paper Trail Media, The Globe and Mail, the Tor Project, the Austrian newspaper Der Standard, and Follow The Money.

    “This is not like lawful interception that every country does, including Western democracies,” says Marla Rivera, a technical researcher at InterSecLab, a global digital forensics research institution. In addition to mass censorship, the system allows governments to target specific individuals based on their website activities, like having visited a certain domain.

    The surveillance system that Geedge is selling “gives so much power to the government that really nobody should have,” Rivera says. “This is very frightening.”

    Digital Authoritarianism as a Service

    At the core of Geedge’s offering is a gateway tool called Tiangou Secure Gateway (TSG), designed to sit inside data centers and could be scaled to process the internet traffic of an entire country, documents reveal. According to researchers, every packet of internet traffic runs through it, where it can be scanned, filtered, or stopped outright. Besides monitoring the entire traffic, documents show that the system also allows setting up additional rules for specific users that it deems suspicious and collecting their network activities.

    For unencrypted internet traffic, the system is able to intercept sensitive information such as website content, passwords, and email attachments, according to the leaked documents. If the content is properly encrypted through the Transport Layer Security protocol, the system uses deep packet inspection and machine learning techniques to extract metadata from the encrypted traffic and predict whether it’s going through a censorship circumvention tool like a VPN. If it can’t distinguish the content of the encrypted traffic, the system can also opt to flag it as suspicious and block it for a period of time.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe United Arab Emirates Releases a Tiny But Powerful AI Model
    Next Article How the new AirPods Pro compare to the rest of Apple’s AirPods lineup

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Casely has reannounced a power bank recall from 2025 following a fatality

    Casely has reannounced a power bank recall from 2025 following a fatality

    April 16, 2026
    The only way to fight deepfakes is by making deepfakes

    The only way to fight deepfakes is by making deepfakes

    April 16, 2026
    Teenage Engineering might be getting into instrument amps next

    Teenage Engineering might be getting into instrument amps next

    April 16, 2026
    Netflix embraces vertical video with major mobile app update

    Netflix embraces vertical video with major mobile app update

    April 16, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gucci-branded Google smart glasses are coming next year News

    Gucci-branded Google smart glasses are coming next year

    By News RoomApril 16, 2026

    Google is reportedly partnering with Gucci to make a pair of AI smart glasses stylish…

    Ozlo’s comfy Sleepbuds are nearly 30 percent off in the run-up to Mother’s Day

    Ozlo’s comfy Sleepbuds are nearly 30 percent off in the run-up to Mother’s Day

    April 16, 2026
    Google’s AI Mode update lets you open links without leaving the page

    Google’s AI Mode update lets you open links without leaving the page

    April 16, 2026
    The nine best ways to protect, customize, and accessorize your MacBook Neo

    The nine best ways to protect, customize, and accessorize your MacBook Neo

    April 16, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.