V. The Locknet Leaks Out

Jessica Batke
Senior Editor for Investigations at ChinaFile
Laura Edelson
Assistant Professor of Computer Science at Northeastern University

In general, the Locknet only targets communications taking place within or crossing over the country’s borders, removing “bad” or “dangerous” content from circulation. (This contrasts with Beijing’s propaganda efforts, which aim to inject content into both domestic and international discussions.) Even so, the effects of the censorship regime can and do ripple outwards into the broader world, because the Locknet was designed to be compatible with the global internet. Just as information from the outside can flow into China, systems built to control information can, and occasionally do, flow outwards. Often, this occurs when users outside China want to interact with services, users, or infrastructure inside China, forcing them to rely on the Locknet for tasks they would otherwise do on the internet.

Service-Level Censorship, Worldwide

Among the most obvious examples of this spillover effect involve international users experiencing content censorship on China-based or -designed platforms—essentially, externalized service-level censorship . The online video game Marvel Rivals, for instance, doesn’t allow players to type phrases like “free Tibet,” “free Xinjiang,” “Uyghur camps,” or “Taiwan is a country” in the in-game chat, no matter where in the world the players log on from.

To avoid this problem, some companies offer separate versions of their apps for Chinese and international audiences, like ByteDance does with Douyin (the Chinese version) and TikTok (the international version). Theoretically, this means that CCP-imposed censorship stays on the Chinese version of the platform—but reality isn’t always that tidy. In 2019, an American teenager posted a video on TikTok, the “foreign” version of the Chinese app Douyin. Made to look like a milquetoast makeup tutorial, the video quickly shifts tone as the teenager decries the Chinese government’s treatment of Uyghur Muslims. TikTok removed the video and subsequently banned her from posting new content. Despite TikTok’s later claims that the video had been taken down in error, many observers concluded this was an attempt to silence international discussion of ethnic repression in China.

International users can also receive censored internet search results. Microsoft’s Bing has repeatedly declined to show certain search results and has also censored the autosuggestions it offers when users begin typing in the search bar. Though it’s unclear whether this behavior is intentional or simply the accidental result of China-tailored software exceeding its boundaries, even properly-functioning search queries can turn up censored results anywhere in the world. One academic study found that when users outside of China searched Google for images with Chinese-language terms, they ended up with censored results. “Google largely directs its Chinese language searches to mainland Chinese IP addresses ,” if the user conducts a query in Chinese, so the image results Google offers the user “have mostly already been censored and therefore Google indirectly subjects its Chinese-language users to mainland censorship.”

AI chatbots developed in China also limit their responses to align with Party-state red lines, even if the user isn’t physically in the country. Several researchers have shown that such chatbots either provide standard CCP talking points or refuse to answer certain questions altogether. Even if users download and run chatbot software outside of China, where they are less likely to receive blatantly censored answers, the software might still default to the CCP’s standard propaganda playbook when formulating responses, like presenting the Party as the best source for accurate information, or treating any negative information about the Party as biased. And many users—including corporate ones, who incorporate Chinese chatbots into their own technology—don’t seem to care whether the chatbots are pro-CCP or not. In a recent test of Nvidia software that had integrated a version of Deepseek’s chatbot, the software produced answers that parroted “Chinese state framing just as it would appear in the country’s controlled media, particularly on sensitive topics like Taiwan … insist[ing] that the island’s ‘reunification’ with the PRC ‘is an unstoppable trend no force can prevent.’”

China’s service-level censorship doesn’t just affect the world’s digital products. The Locknet, like the internet, supports a great deal of meatspace activity, like retail shopping. Many products that Americans sell to one another actually originate in China, from where they are drop-shipped after someone in Arizona or Iowa clicks “purchase.” In some cases, this means that the products sold through these storefronts must abide by China’s censorship rules in order to actually get physically produced.

China-based services do more than simply censor; they gather data about their users. Some of this data-gathering exactly mirrors what all modern social media platforms do, collecting information about users’ interests, emotional state, relationships, and patterns of behavior. The question for users is whether they want to provide that kind of personal information to companies in China, which must provide data to the Party-state upon request. (This concern informed part of the recent debate about banning TikTok in the U.S.) Other data-gathering directly serves to strengthen censorship back in the mainland. The University of Toronto’s CitizenLab, conducting research on WeChat, found in 2020 that “[d]ocuments and images transmitted entirely among non-China-registered accounts undergo content surveillance wherein these files are analyzed for content that is politically sensitive in China. Upon analysis, files deemed politically sensitive are used to invisibly train and build up WeChat’s Chinese political censorship system.”

Apps such as WeChat also function to keep Chinese citizens within the censorship bubble even when physically abroad, a “Chinese-language information silo” that many Chinese expats rely on for news even when other information is available to them. Essentially, they carry the censorship system with them in their pockets. The Party’s propaganda department did not create WeChat, but its widespread use among Chinese citizens living abroad must count among the department’s luckiest breaks.

Adapted from the testimony of Nat Kretchun, of the Open Technology Fund, in his testimony to the U.S. Congress Select Committee on the Strategic Competition between the United States and the Chinese Communist Party, July 23, 2024.

Adapted from the testimony of Nat Kretchun, of the Open Technology Fund, in his testimony to the U.S. Congress Select Committee on the Strategic Competition between the United States and the Chinese Communist Party, July 23, 2024.

Just as they help keep Chinese citizens digitally inside China, Chinese apps can also help keep non-citizens out. As described by researchers at the Berlin-based think tank MERICS, real-name registration requirements for social media platforms—ranging from account verification from a Chinese phone number, government ID verification, to face-scans, to verification by other platform users—”have led to effective access barriers for foreign users” on some apps. Some Chinese apps are not even available for download abroad.

Network-Level Censorship, Outside China’s Networks

It’s not just apps spreading censorship abroad. The Locknet’s network-level censorship sometimes accidentally prevents international users from accessing sites and services that they would otherwise be able to reach. This can happen when international internet traffic transits China, even if the traffic’s final destination is somewhere else. Let’s say an internet user in Malaysia is trying to connect to a South Korean website that is blocked by DNS (domain name system) in China. If the user’s DNS query just so happens to run over a route that crosses into China, even briefly, China’s DNS middleboxes will kick into action, injecting a false DNS response just as though the user were inside China. The user won’t be able to connect to the South Korean website, and that false information may even be cached on a DNS resolver in Malaysia, ready to be offered up to anyone else trying to visit the site.

The same DNS mechanism has other, more intentional, effects on international users. Even though the government originally deployed DNS blocking to keep people inside China from visiting websites outside China, officials now also use it to keep users outside China from accessing sites and services hosted inside China. Instead of including only “dangerous” foreign websites on the blocklist they upload to DNS middleboxes, authorities also include domestic websites that they’d like to prevent foreigners from visiting. For example, officials have added the Chinese government’s own platform for licensing websites to the DNS blocklist. Someone in France trying to visit the licensing website will send out a DNS query that necessarily has to enter China, and will receive a fake DNS response as a result, preventing them from ever reaching the site. Someone trying to visit the website from inside China won’t have the same problem, as their DNS query will stay within China and therefore never trigger any DNS middleboxes, which are only positioned along the national border.

International Self-Censorship

These examples all involve the Locknet’s leaking out into the wider world. But people fully outside of the Locknet can also make their own decisions that help spread the reach of China’s censorship.

For example, over the last dozen years or so, Google has chosen to comply with about half of China’s takedown requests for YouTube content. The Ministry of Public Security requested the removal of 412 videos, often about government corruption or top officials in China; Google removed more than 200 of them. Remember, the Locknet ensures that YouTube is not accessible in China, so all of these removals by definition affect content that is only available outside of China.

But decisions to self-censor don’t only affect large, influential corporations. In December 2024, a university in Tokyo discovered that someone had secretly embedded Tiananmen-related content on its website, meaning that anyone trying to access the site from China would get stopped by network-level censorship . The school responded by preventing such content from appearing on its site—surely a reasonable decision from an admissions perspective, which wants foreign students to apply. But it also tacitly extends the reach of China’s blocklists beyond its borders.

International Internet Standards: Efficiency at the Expense of Privacy

Despite all of the headaches that the uncensored global internet causes for China’s leaders, it still behooves Beijing to keep the Locknet connected to, and compatible with, the internet. To this end, it’s helpful if Chinese companies actively participate in international internet standards-setting bodies, which have been a guiding force in the internet’s evolution in the decades since their founding. “Internet standard-setting” isn’t a mere regulatory process, it can also be lucrative for companies whose standards are adopted as a global norm, giving commercial entities a financial interest in participating.)Yet standards developed in China may reflect the same values and norms that underpin the Locknet—for one, that users have no expectation of privacy from their government—and adoption of such standards could alter the global internet in ways that make it less free or that threaten users’ privacy.

Historically, the internet has had to manage a trade-off between efficiency on one side and privacy and security on the other. In its earliest days, the internet had virtually no privacy or security safeguards at all. Only after a number of large-scale internet outages in the early 2000s were such safeguards built in. Since then, networks have struggled with the tension between efficiency and privacy—with efficiency concerns usually winning out and privacy safeguards tacked on as possible. But for a government like China’s, which seeks to reduce the amount of information a citizen can conceal from the state, such a tension doesn’t exist at all. Engineers can dream up all the fantastically efficient mechanisms they want, without privacy concerns gumming up the works.

New IP

A case in point: an internet standards proposal for something called “New IP,” or, as a later iteration became known, “IPv6+.” The Chinese technology company Huawei first introduced New IP in an international internet standard-setting body in 2018. The proponents of New IP presented it as a means to address problems they foresaw for the internet in the coming years, mainly involving speed and dependability. As humans’ uses for the internet expanded and the need for near-instantaneous information transmission increased, they argued, citing “remote surgerymultiple times as a model use case, the internet’s existing mechanisms for routing traffic would simply not be adequately efficient or reliable. “Huawei framed it as a program for exploration,” says Antonia Hmaidi, Senior Analyst at MERICS, but in its essence New IP assumed that “the future of the internet should be based on a new type of infrastructure.”

Huawei was indeed correct that a proposal like New IP would improve efficiency and performance. Imagine, for example, that a major sporting event is being streamed online and everyone in a neighborhood full of super-fans is trying to watch it. Each fan’s phone, laptop, or TV individually sends requests to the broadcaster’s server , and in response the server sends packets to each one of those devices. It would be far more efficient for the server instead to send out the packets just one time, say, to a cell tower in the fans’ neighborhood, which could then send out copies to all the nearby devices asking for them. However, this is only possible if the internet network itself knows what type of content it’s transmitting and where that content is headed—something that current internet protocols don’t allow. What Huawei proposed was essentially giving the network more insight into the traffic it carries so that traffic could flow more efficiently. It would do so by writing some content or routing information on the outside of data packets, making that information visible to routers or other machines throughout the system.

Beyond streaming a big sporting event, there are lots of reasons a country or a company might wish to know more about the information its networks are transmitting. As Hmaidi explains, developing countries just building out their fledgling networks may wish to use a system like this to prioritize critical government services, like payments, over bandwidth-hogging services like Netflix. Or, an ISP might hope to charge big tech companies extra money for carrying all their traffic.

Of course, a New IP-type network would also help censors avoid the time and expense of performing deep packet inspection —no need to waste resources prying open a data packet if you can just get information about its contents from what’s written on the outside.

Specifically, New IP proposed fundamental changes to the “network stack,” or the way in which different layers of internet architecture interact with each other. The current network stack is based on the notion of “layer independence,” which holds that each mechanism, or layer, of the internet should perform its function independently, without knowledge of what happens at other layers. Layer independence has critical implications for privacy and anonymity online. Each layer contains some bit of information about the traffic passing through it: the network layer notes which physical device, such as a computer or phone, sent the traffic; the internet layer checks where the traffic is headed; and the application layer contains the actual content of the traffic. Keeping such information disaggregated makes surveillance, and therefore censorship, more difficult (it also makes the network better able to withstand various kinds of failure or error). New IP proposed doing away with layer independence, collapsing the network and internet layers and thereby tying information about a particular device together with the websites it visited. Other features of New IP had similar implications for surveillance, such as allowing routers to see some information about the content of the traffic they were transmitting, or using blockchain to create a more permanent record of an individual’s online activity.

New IP was never a fully-fleshed out protocol, but the proposal contained enough detail that it stirred up debate in the internet standards community. On one side, people raised concerns about surveillance, censorship, and whether or not New IP meant that China was now “openly advocating for others to follow its lead.” On the other, observers pointed out that New IP wasn’t fully baked and could still be altered; and that the existing U.S.-led internet order had failed on multiple fronts to protect users’ privacy, meaning that Western accusations of a Chinese plot to upend the internet were hypocritical, alarmist, and “borderline imperialist-racist.”

However, one does not need to divine the underlying motivation for New IP—nor believe the U.S. and other Western countries always act with blameless intent in the international sphere—to evaluate New IP at a technical level and assess its purported benefits and risks. A 2020 report by the internet Corporation for Assigned Names and Numbers (an international nonprofit that helps coordinate naming and address conventions across the internet) did just that, judging that New IP could threaten users’ privacy. The report questioned the need for New IP as a protocol, citing other protocols already in development throughout the standards community. It also cast doubt on the ultimate efficiency gains New IP would provide, given that the speed of light would continue to act as a brake on information transmission.

New New IP

As a brand name, “New IP” has died an unceremonious death. But aspects of the proposal are still floating around in standards bodies, often under the moniker “IPv6+.” (The plus symbol at the end of “IPv6+” is doing a lot of work here. IPv6, without the “+”, simply refers to an updated format for IP addresses , which has been slowly rolling out worldwide over the last few decades, replacing older IPv4-formatted addresses. The difference between v4 and v6 addresses aren’t relevant for our discussion here, and indeed, most internet users are not even aware this is happening, as computers handle IP addresses behind the scenes. IPv6+, on the other hand, aims to alter some of the fundamental processes of internet networks. The tiny little plus symbol causes confusion in two ways: it makes IPv6+ seem like a mere add-on to IPv6, rather than a wholesale re-imaging of how the internet functions. And, at least for these authors, it frequently results in our saying one thing when we mean the other.)

Though not exactly the same as New IP, IPv6+ also discards layer independence and collapses the network stack . IPv6+ did not attract the immediate ire that New IP did, but the international community appears to have noticed the similarities between the two protocols; in 2022, the European Telecommunications Standards Institute decided to halt its work on IPv6+.

Regardless of uptake in international standards bodies, Huawei has already begun using IPv6+ in its own networks. This means that Huawei-built networks around the world, such as those in Uganda, Rwanda, and South Africa, where the company has provided infrastructure at a low cost, will be employing IPv6+. As long as data stays wholly within those networks, it will be transmitted in IPv6+’s easier-to-surveil format.

No matter its branding, aim, or provenance, any technical specification that eliminates layer independence for the sake of efficiency has the same problem: it leaves internet communications more vulnerable to surveillance and censorship. This may not actually present a problem in some cases, like in a medical intranet that wants to support services like remote surgery but remains separate from the internet as a whole. And for nation-states like China, being able to more easily surveil its citizens’ communications is a feature, not a bug. For the rest of us, though, swiping right on our dating apps or texting memes mocking our government, we may not really want anyone else listening in. As the internet continues to evolve, we must ask: what is the ideal balance between privacy and efficiency, and what safeguards need to be in place to ensure that balance is maintained?