Popular Science describes how Sebastian Wolfgarten attempted to get around the Great Firewall of China. "Wolfgarten simply bought a server at a Chinese ISP by phone. Once the server was set up, he could log into it from Germany. And all the data that went through the server would be subject to the same digital censorship that Chinese citizens experience every day." Then Wolfgarten observed how the firewall worked and then he simply went around and over it. Here's what he did:
What he discovered was that there are three fairly simple ways to trick the automatic Chinese censorship system.
The first, and easiest, is to use the anonymous network Tor. Though there has been some debate as to whether Tor would work in China, it seems to be successful for now. Another method, which had been previously identified by researchers with the OpenNet Initiative a couple of years ago, involves essentially ignoring censorship commands sent by Chinese servers. Apparently the Great Firewall censors data by responding to forbidden key words with a network command called a "reset." The reset instructs the Chinese computer to drop its connection. The hitch is that the data is still coming in, but injected with the "reset" command. Program your own firewall to ignore "reset" commands and you've got uncensored data. Crafty anti-censorship types in China can also get uncensored data by doing something called "tunnelling," which seems particularly appropros when dealing with a Great Firewall. Wolfgarten tested what happened when he hid requests for "Falun Gong" inside seemingly-innocuous requests for e-mail or basic network information. A computer outside the Wall unwraps the requests, gets the data, rewraps them and returns them to China uncensored.
Here's an amusing link to how you can travel in your own ECM bubble to keep RFID-tagged items, including credit cards from being read.