Close Menu
geekfence.comgeekfence.com
    What's Hot

    ZTE outlines 6G strategy and unveils GigaMIMO, leading AI-native wireless for 6G evolution

    March 1, 2026

    KV Caching in LLMs: A Guide for Developers

    March 1, 2026

    Perplexity Computer is Here to Change the Way we Use AI

    March 1, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Software Engineering»Inside China’s Great Firewall with Jackson Sippe
    Software Engineering

    Inside China’s Great Firewall with Jackson Sippe

    AdminBy AdminFebruary 22, 2026No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Inside China’s Great Firewall with Jackson Sippe
    Share
    Facebook Twitter LinkedIn Pinterest Email


    China’s Great Firewall is often spoken about but is rarely understood. It is one of the most sophisticated and opaque censorship systems on the planet, and it shapes how over a billion people interact with the global internet, influences the design of privacy and proxy tools worldwide, and continues to evolve in ways that challenge researchers, developers, and policymakers alike.

    Jackson Sippe is a PhD researcher at the University of Colorado Boulder whose work focuses on uncovering how national-scale censorship systems operate. Jackson recently helped lead a groundbreaking study analyzing a previously undocumented GFW technique that quietly broke fully encrypted proxy protocols across China for more than a year.

    In this episode, Jackson joins Gregor Vand to discuss how the Great Firewall works at a technical level, the 2021–2023 blocking event, the popcount-based detection algorithm his team reverse-engineered, the cat-and-mouse ecosystem of censorship circumvention, and what these findings mean for the future of the open internet.

    Gregor Vand is a security-focused technologist, having previously been a CTO across cybersecurity, cyber insurance and general software engineering companies. He is based in Singapore and can be found via his profile at vand.hk or on LinkedIn.

     

    Please click here to see the transcript of this episode.

    Sponsors

    Why is there always a meeting bot in your Zoom call?

    Blame Recall.ai.

    Recall.ai powers the meeting bots and desktop recording apps behind products like Cluely, HubSpot, and ClickUp. They handle the hard infrastructure work—capturing clean recordings, transcripts, and metadata across Zoom, Google Meet, Microsoft Teams, in-person meetings, and more—so developers don’t have to build it themselves.

    If you’re building a meeting notetaker or anything involving conversation data, Recall.ai is the API for meeting recording.

    Get started today with $100 in free credits at recall.ai/software

    In mobile application security, ‘good enough’ is a risk.

    Guardsquare uses advanced, multi-layered code hardening techniques and automated runtime application self-protection and mobile application security testing, combined with real-time threat monitoring, to deliver the highest level of mobile app security.

    Discover how Guardsquare brings all these together to provide mobile app security for your Android and iOS apps without compromise at www dot Guardsquare dot com.

    If you’re an engineering leader, you know this cycle.

    Your team is focused on building product, but someone in ops needs a dashboard. Marketing needs an admin panel. Finance needs a custom workflow. The requests pile up, and you cannot get to them all.

    So people start building their own solutions. Shadow IT spreads. And eventually, you are the one stuck cleaning up tools that were built with duct tape and good intentions.

    Retool breaks that cycle.

    Their AI AppGen platform gives teams a governed place to build the tools they need, so everything stays secure and under your control. Someone could type, “build me a customer admin panel that manages accounts from Postgres,” and they would get a real, production ready app with proper permissions built in.

    Your teams get unblocked, and you do not inherit a pile of technical debt down the road.

    So if you are tired of being the cleanup crew for shadow IT, head to retool.com slash se daily and see how other engineering teams are democratizing building without creating chaos.

    Because honestly, we could all use a better way to handle internal tools.

    Sometimes you just need Retool.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Amazon’s IDE for Spec-Driven Development with David Yanacek

    February 26, 2026

    Optimizing Agent Behavior in Production with Gideon Mendels

    February 18, 2026

    An Approach to Accelerate Verification and Software Standards Testing with LLMs

    February 14, 2026

    Gas Town, Beads, and the Rise of Agentic Development with Steve Yegge

    February 13, 2026

    Artificial Intelligence in National Security: Acquisition and Integration

    February 9, 2026

    Airbnb’s Open-Source GraphQL Framework with Adam Miskiewicz

    February 8, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202619 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202518 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    ZTE outlines 6G strategy and unveils GigaMIMO, leading AI-native wireless for 6G evolution

    March 1, 2026

    The Report Minimum Technical Performance Requirements for IMT-2030 (6G) was formally finalized at the 51st…

    KV Caching in LLMs: A Guide for Developers

    March 1, 2026

    Perplexity Computer is Here to Change the Way we Use AI

    March 1, 2026

    Microsoft Sovereign Cloud adds governance, productivity and support for large AI models securely running even when completely disconnected 

    March 1, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    ZTE outlines 6G strategy and unveils GigaMIMO, leading AI-native wireless for 6G evolution

    March 1, 2026

    KV Caching in LLMs: A Guide for Developers

    March 1, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.