Tech News

The great leak indicates how Chinese company sends a largest firewall in the world

The leakage of more than 100,000 documents indicate that a Chinese-known Chinese company has been silent that the largest firewalls areolated to government.

GEEEDGE networks, a company established in 2018 in the largest “Father” of the Cyberer Infrastructure, Reaching the Correct Customers “In fact, researchers. examine some people.

The investigators who have reviewed mature items find that the company is able to pack up developmental skills in Great Firewall – a Perlovale solution in any data hardware and the software used by local government officials. Documents also discuss the desired functions that the company is working, such as Cyberattack employment.

According to mature writings, the geedge has already applied to Kazakhstan, Ethiopia, Pakistan and Myanmar, and one unknown country. Sending public work shows that the geadge also seeks to look at foreign engineers in engineering work, including a few countries uninvited with mature documents, receiving wires.

Files, including Jira entries and compiling entries, source code, and contacting internal technical center, operating logs, and communications to solve problems and add function. An unknown leaks are provided by the Consortium of human rights and media including Amnesty International, the insemeclab Media, Tor Project, the Austrian newspaper, follow the money.

“This is not the same as a formal explanation that all countries are, including Western Skills,” Marla Rinvies, Land Land Research Center. In addition to research, the program allows governments to aim for individuals according to their website activities, such as visiting a particular background.

The sale of sale of sale is “provides the great power in the absence of the unachous government,” Iriva said. “This is very prejudiced.”

Digital Authoritarianism as a service

The geedge spine is a tool called Tiangou Security Gateway (TSG), designed to live within the data institutions and can be measured to process the entire country traffic, documents. According to investigators, all Internet traffic packets run to it, where it can be looked, are sorted, or clearly. Without monitoring the entire traffic, the documents indicate that the system allows to set additional rules for individual users to see their network operations.

Internet traffic that is not written, the system is able to disconnect sensitive information such as website content, passwords, and e-mail attachments, according to mature documents. If the contents are applied to the Progrusion LaBer Security Protocol, the program uses the intense packet and the machine learning strategies to remove the metadata on the impaired traffic and predicted that it would be traveling with a blocked device as VPN. If it is unable to distinguish the contents of the impaled traffic, the system can choose to sing as a suspicion and prevent it for a while.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button