TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
Great firewall source code leaks, exposing Tiangou platform

Great firewall source code leaks, exposing Tiangou platform

Aytun ÇelebibyAytun Çelebi
15 September 2025
in Security
Reading Time: 2 mins read
Share on FacebookShare on Twitter

A substantial leak of over 500GB of internal documents, source code, work logs, and communications related to China’s Great Firewall has been confirmed by researchers. The data dump, which surfaced online on September 11, exposes the inner workings of China’s national traffic filtering system.

The leaked files are believed to originate from Geedge Networks, a company with ties to Fang Binxing, often referred to as the “father” of the Great Firewall, and the MESA lab at the Institute of Information Engineering, a research division of the Chinese Academy of Sciences. The leak reveals what appears to be complete build systems for deep packet inspection (DPI) platforms, as well as code modules designed to identify and throttle specific circumvention tools. According to researchers at the Great Firewall Report, a significant portion of the technology focuses on DPI-based VPN detection, SSL fingerprinting, and full-session logging.

The documents detail the internal architecture of a commercial platform called “Tiangou,” marketed as a turnkey “Great Firewall in a box” for Internet Service Providers (ISPs) and border gateways. Early deployments of Tiangou reportedly utilized HP and Dell servers before transitioning to Chinese-sourced hardware due to sanctions. A leaked deployment sheet indicates that the system was implemented across 26 data centers in Myanmar, with live dashboards monitoring 81 million simultaneous TCP connections. The system was operated by Myanmar’s state-run telecoms company and integrated into core Internet exchange points, enabling mass blocking and selective filtering.

The implications of this leak extend beyond China’s borders. Reports from WIRED and Amnesty International suggest that Geedge’s DPI infrastructure has been exported to other countries, including Pakistan, Ethiopia, and Kazakhstan, often used in conjunction with lawful intercept platforms. In Pakistan, Geedge’s equipment is allegedly part of a larger system known as WMS 2.0, which is capable of blanket surveillance on mobile networks in real-time.

The leak provides a rare glimpse into the engineering and commercialization of China’s censorship apparatus. The leaked documents also reveal that Geedge’s system can intercept unencrypted HTTP sessions. Researchers are now analyzing the source-code archive, with the presence of build logs and developer notes potentially revealing protocol-level weaknesses or operational missteps that censorship circumvention tools could exploit.

The entire archive is currently mirrored by Enlace Hacktivista and others. Downloading or examining the archive should only be done in air-gapped VMs or other sandboxed environments due to potential security risks.

The exposure of this information could have significant ramifications for internet censorship and surveillance practices globally.

Tags: featuredTiangou leak
ShareTweet
Aytun Çelebi

Aytun Çelebi

Starting with coding on Commodore 64 in elementary school moving to web programming in his teenage years, Aytun has been around technology for over 30 years, and he has been a tech journalist for over 20 years now. He worked in many major Turkish outlets (newspapers, magazines, TV channels and websites) and managed some. Besides journalism, he worked as a copywriter and PR manager (for Lenovo, HP and many international brands ) in agencies. He founded his agency, Linkmedya in 2019 to execute his way of producing content. He is recently interested in AI, automation and MarTech.

Related Posts

Anna’s Archive leaks 300TB of Spotify’s music catalog

Anna’s Archive leaks 300TB of Spotify’s music catalog

22 December 2025
EU regulators accuse TikTok of ongoing data transfers to China

EU regulators accuse TikTok of ongoing data transfers to China

22 December 2025
Cisco announces hackers exploiting AsyncOS zero-day

Cisco announces hackers exploiting AsyncOS zero-day

19 December 2025
Koi uncovers data harvesting in Urban VPN Proxy

Koi uncovers data harvesting in Urban VPN Proxy

19 December 2025

LATEST

New Punkt MC03 features split OS for better privacy control

Samsung reveals brighter Freestyle+ projector ahead of CES 2026

OpenAI explores prioritized ads for ChatGPT responses

Apple teases something big for Fitness+ in 2026

Samsung SDI rumored to test massive 20000mAh battery

Honor sells over 71 million smartphones in 2025

New WhatsApp update brings 2026 stickers and video call effects

Leaker reveals Xiaomi plans for high end eSIM device in 2026

HP prepares OMEN OLED monitor reveal for CES 2026

High RAM costs from AI boom could delay next Xbox and PlayStation

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska