Part 6, free speech and the internet Flashcards

1
Q

what is

deep packet inspection

A

this is the process of examining the header and/or the content of a packet. This may be carried out for various reasons such as security, censorship or to identify malware or spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is

prefix hijacking

and how does golden shield use it

A

this is at a high level the process of inserting fake routes into a routers routing table. Golden shield uses this technique to either send traffic to fake ip addresses or to have traffic analysed by other parts of the golden shield network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. golden shield will use deep packet inspection and examine the packet for 15,000 keywords and phrases deemed objectionable by the chinses government
  2. if any keyword or phrase is found then golden shield will send reset connection packets to the client. in turn dropping the connection

note

the reset connection packet sent by golden shield to the client will also be impersonating the original servers ip address so that it does not look like the connection was tampered with but instead came fom the server making it seem like a bad connection

A

in two steps explain how golden shield might decide to

reset a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this includes:

  1. ip blocking
  2. DNS injection
  3. resetting connections
  4. prefix hijacking
A

what are 4 methods that golden shield employs in order to survey and censor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is the process of examining the header and/or the content of a packet. This may be carried out for various reasons such as security, censorship or to identify malware or spam

A

what is

deep packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is

golden shield

and what dates was it first implemented and then rolled out across the country

A

this is a surveillance and censorship system for internet requests in china. It was first implemented in china in 1998 and became universal throughout china in 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this is at a high level the process of inserting fake routes into a routers routing table. Golden shield uses this technique to either send traffic to fake ip addresses or to have traffic analysed by other parts of the golden shield network

A

what is

prefix hijacking

and how does golden shield use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

in 3 steps how does golden shield carry out

DNS injection

A

it carrys this out in the following steps:

  1. if the DNS request is outside china the packet is duplicated. with the original then being sent to its original destination while the other is routed to a chinese DNS server
  2. the chinese DNS server uses deep packet inspection to see if the packet contains a blacklisted URL
  3. if the URL requested is blacklisted the chinses DNS server sends a fake ip address back to the client

note

because the DNS server is located in china it nearly always completes the DNS request before the DNS server outside china

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

in two steps explain how golden shield might decide to

reset a connection

A
  1. golden shield will use deep packet inspection and examine the packet for 15,000 keywords and phrases deemed objectionable by the chinses government
  2. if any keyword or phrase is found then golden shield will send reset connection packets to the client. in turn dropping the connection

note

the reset connection packet sent by golden shield to the client will also be impersonating the original servers ip address so that it does not look like the connection was tampered with but instead came fom the server making it seem like a bad connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

it carrys this out in the following steps:

  1. if the DNS request is outside china the packet is duplicated. with the original then being sent to its original destination while the other is routed to a chinese DNS server
  2. the chinese DNS server uses deep packet inspection to see if the packet contains a blacklisted URL
  3. if the URL requested is blacklisted the chinses DNS server sends a fake ip address back to the client

note

because the DNS server is located in china it nearly always completes the DNS request before the DNS server outside china

A

in 3 steps how does golden shield carry out

DNS injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how is golden shield intergrated into chinas infrastructure

A

the system is connected to the routers of all the Internet Service Providers (ISPs) in china meaning that all traffic can be seen by the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is a surveillance and censorship system for internet requests in china. It was first implemented in china in 1998 and became universal throughout china in 2008

A

what is

golden shield

and what dates was it first implemented and then rolled out across the country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are 4 methods that golden shield employs in order to survey and censor

A

this includes:

  1. ip blocking
  2. DNS injection
  3. resetting connections
  4. prefix hijacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the system is connected to the routers of all the Internet Service Providers (ISPs) in china meaning that all traffic can be seen by the system

A

how is golden shield intergrated into chinas infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly