In February 2022, American-born skier Eileen Gu became an internet sensation in China when she competed at the Beijing Winter Olympics as part of the People’s Republic of China (PRC) national team. During her time in China, Gu made multiple posts about her Olympic experiences on Instagram, a platform banned in the mainland. Just before Gu’s freeski big air event, an irked Instagram user asked Gu: “Why can you use Instagram and millions of Chinese people from mainland cannot, why you got such special treatment as a Chinese citizen. That’s not fair, can you speak up for those millions of Chinese who don’t have internet freedom.” Gu’s response betrayed how little she understood of the Locknet: “anyone can download a vpn its literally free on the App Store 👍.”
VPNs
Most people can’t just take a quick flight abroad to install their preferred circumvention app, and in some cases, as for many Uyghurs and other Turkic peoples in northwest China, even having such apps on one’s phone can be cause for detention. This means that individuals who want to evade
network-level censorship
Who Uses Circumvention Tools?
The Chinese government, unsurprisingly, doesn’t provide statistics about citizens who try to circumvent the Locknet. Outside estimates of circumvention tool usage often rely on small sample sizes, online surveys, or don’t explain their methodology at all, but they are still the best information we have. According to estimates from 2015 and 2018, about 30 percent of China’s internet users avail themselves of circumvention tools. Beijing, however, launched a crackdown on both domestic and foreign
VPNs
The apparent drop-off in circumvention tool usage likely stems from Beijing’s crackdown. But successful platform substitution—whereby easily-available, domestically-censored apps replace harder-to-reach foreign ones—has no doubt also stifled demand. “There is a massive population who are blissfully unaware that [the] outside internet exists,” a circumvention tool provider told scholars as part of a recent study about censorship circumvention included at the USENIX Security Symposium. “There’s a complete domestic ecosystem [such] that people almost never accidentally stumble upon a website that’s censored.” A separate survey of Chinese internet users from 2015 showed that about a fifth of respondents weren’t even aware “that foreign websites such as Google were not accessible.” Even for people who would otherwise seek to avoid censorship, platform substitution has made circumvention less attractive. A circumvention tool user told the researchers,
I tried to persuade my parents to use [a circumvention tool] but it was not as appealing to them. We set up a family chat on Signal, but it was hard to switch just for [the] three of us while everything else is happening on WeChat. My mom thinks censorship is not good, but she simply doesn’t have [the] motivation to circumvent.
Those individuals who do choose to circumvent the system are not necessarily hard-core political dissidents. Lots of them just want to watch foreign TV. In 2018, one industry analysis stated that 54 percent of Chinese VPN users were hoping to “access better entertainment content.” This tracks with what Patrick Boehler, a media researcher studying circumvention in China, who has received Open Technology Fund support for other work, has observed: “You’ll typically see international content streaming services, and access to international gaming platforms, are highly popular.”
A History of Circumvention in China
As long as the Chinese government has been censoring the internet, Chinese citizens have tried to find ways to bypass that censorship. In the 2000s, censorship circumvention did require some technical know-how, but the relative simplicity of the government’s blocking mechanisms meant that effective circumvention tools could be similarly rudimentary. Diaspora websites hoping to beam their messages into China, for example, might frequently change their IP addresses or domain names to foil the government’s
IP
These comparatively simple techniques no longer work against China’s beefed-up
network-level censorship
Even though the vast majority of its citizens won’t ever learn about them, the Chinese government also seeks to neutralize any emerging circumvention techniques. A significant portion of the Chinese government’s network-level censorship is designed to detect the use of circumvention tools. This means that even if someone were to download a
VPN
Many of these mechanisms rely on a simple premise: showing a false destination to the censor. The censor sees the false destination, thinks it’s ok, and lets the traffic through to the false destination. The false destination then forwards on the internet traffic to the real destination. China’s censors, therefore, have focused on identifying and obstructing these false destinations.
Many of the most popular mechanisms to evade censorship in China rely on proxy servers. Proxy servers, or proxies, are simply machines that serve as middlemen—they accept and forward on traffic that is ultimately meant for another
server
Someone in China hoping to read The New York Times (which is banned in China) might try to use a proxy server to connect. Using the proxy software of their choice, they would type in “www.nytimes.com.” Instead of doing a
DNS lookup
This system works as long as the Chinese authorities do not realize that the proxy server is, in fact, a proxy server. Once they recognize the proxy server for what it is, they can easily add the proxy server’s IP address to a blocklist.
For a while, authorities didn’t have to look far. To counteract Tor, a popular free service that depends on volunteers to run its proxy servers, in 2009 China’s censors simply read Tor’s publicly-available list of proxy servers and blocked all of their IP addresses. Tor then attempted to better hide their proxies’ IP addresses, but by 2016, the censors were downloading the source code for every new release of Tor software and blocking the proxy IP addresses they found within it—all before anyone in China had a chance to use them.
The PRC’s censorship system also works to detect proxy servers that aren’t so obviously enumerated. Since at least 2011, the PRC’s censors have employed several automated mechanisms to detect and confirm the identity of previously unknown proxy servers. These mechanisms are on the lookout for multiple different circumvention protocols. First, a
middlebox
For a few years in the 2010s, a practice called “domain fronting” offered a censorship workaround to websites and apps (like Telegram and Signal) otherwise banned in China. Similar to using proxy servers, domain fronting tweaks the standard settings for
HTTPS
For example, someone in China using a
domain fronting
The vulnerability in this technique, however, lies with the companies themselves. The companies don’t have to forward on traffic not actually directed to them—they can choose to stop serving as “fronts.” Over the past decade, that is exactly what has happened. Some observers credit Russia (another major nation-state censor) with applying enough pressure to Google and Amazon specifically that they reconfigured their systems to disallow
domain fronting
And it’s possible China’s government will take even more invasive steps towards rooting out inveterate circumvention tool users. According to anecdotal reporting on an online tech forum, in 2023 one user found that their newly-installed, telecom-provided modem suddenly prevented them from accessing their circumvention tool—and that the police called them shortly after they tried to access it, mentioning the specific website by name. Academic research confirms that this kind of in-home surveillance via home internet equipment is indeed possible.
China’s continued efforts to hunt down and block new circumvention tools show just how threatening the censors believe unfettered internet access can be.
Circumvention Goes Further Underground
China’s aggressive stance towards circumvention tools has left many providers, particularly those that offer their services for free, on the back foot. The international circumvention tool provider Lantern, which had served more than 4 million users each month in China at the beginning of 2023, had less than half a million users by the beginning of 2025. In some cases, providers may have been the victims of their own success: “The problem with [circumvention tools] in China,” one interviewee told the authors of the USENIX Security Symposium study on censorship circumvention, “is that once the service scales up to a level where it becomes widely known, it attracts the censor’s attention for blocking.” Finally, censorship watchdog GreatFire recently found that even
VPNs
This has led to a burgeoning underground market of tools to access blocked websites and services, with information being passed around by word of mouth or on “Telegram groups dedicated to things like sharing
proxy
These black-market circumvention services are euphemistically known as “airports” in China, because they connect users to a foreign internet. Such black-market services “always exist when there are barriers to and obstacles to what people want to do, and there’s an opportunity to arbitrage against that with a superior product,” notes Boehler, the media researcher. It’s hard to get a precise fix on how many such “airport” providers are out there—dozens? hundreds?—but the advertisements they post offer some insights into the scale of the market. For one, the advertised prices are quite low, with monthly fees ranging from 15 to 188 renminbi (approximately U.S.$2 to U.S.$26). “If you’re doing something that’s illegal, and the pricing is really low, that is an indication it’s so widespread you can monetize it at that level.” For another, the variety of offerings suggests a highly sophisticated, diversified, and “kind of pervasive” market. “There’s a lot of pricing competition, competition around features, countries you can tunnel into, the amount of servers they have, the throughput in terms of traffic,” Boehler explains.
Individual airports can serve thousands or even tens of thousands of customers, according to local governments that have prosecuted sellers. They can also provide the technical know-how to less tech-savvy users in order to successfully set up their services. “That’s exactly why [airports] exist,” says Boehler. “They don’t require any technical knowledge or paperwork or anything. You just go to Taobao or wherever, you buy a box and connect the box to your WiFi, and you have streaming services on your TV.” In fact, the relative ease of using these services “means that people might not be aware that they’re using airports. They might think they just bought a box. [They’re not thinking] ‘I’m subverting the Communist Party,’ but ‘I just want to watch Netflix.’ [The providers] don’t have to put a warning label, like ‘You’re committing a crime!’” (The unofficial nature of the airport market also gives scammers ample opportunity to bilk money from would-be users.)
Circumvention Is Dead, Long Live Circumvention
The continued functioning of some commercial
VPNs
But evading the Locknet doesn’t just mean trying to access foreign websites. After all, the Locknet aims to control both foreign and domestic content. Users hoping to avoid censorship on domestic platforms have their own tricks—ones that are far less technical than trying to install a black-market VPN.
By definition, users who want to post content on a domestic platform hope to actively use the platform, not circumvent it.
Service-level censorship
In meatspace, however, knowing how to safely defy the authorities can be tricky. The vast majority of people who circumvent censorship, either at the service or network level, will never suffer any serious harm because of it. The Party-state metes out its punishments somewhat arbitrarily, and the most serious repercussions, like paying a million renminbi or going to jail for using a VPN, are extremely rare. But it’s the arbitrariness that makes real risk assessment so challenging—not to mention the fact that anyone facing such punishment has no effective means of legal recourse. Very few people who use a VPN will be sent to jail, but anyone could be.