-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kuniao browser (酷鸟浏览器, Cool Bird browser), seemingly state-authorized circumvention browser #17
Comments
Checking some random Twitter threads, it seems there's an ss-local.exe in the installation, which suggests Shadowsocks. Testers say that the browser somehow filters searches on sites like Google, Wikipedia, and YouTube, even apparently replacing Google search results with Baidu search results.
|
The offcial website of Kuniao browser has been blocked by GFW, which may also suggest it is not state-authorized. Greatfire tested gfw.report has been testing GFW's censorship on
|
On November 20, 2019, Twitter user MrdoorVPN posted (archived) a photo of an incomplete table that lists "the pilot cross-border VPN applications that have implemented security obligations". This post (archived) contains a photo of the complete table. For documentation purposes, below is a transcription of the table: 试点中已落实安全义务的跨境VPN应用 (The pilot cross-border VPN applications that have implemented security obligations)
The only vendor for which we can find an official English name is: 任子行武汉分公司 (Surfilter Network Tech Wuhan Branch). |
In this Chinese blog post (archived), Yves X tested Kuniao browser and found:
|
In Oct 2020, Qihoo 360 published multiple commercial censorship-circumvention apps under different names (绿光/SGreen, Tuber, etc.) shadowed by shell companies in several major Android app markets in China featuring direct access to Facebook, Youtube, Instagram and etc. These apps work like typical mobile browsers with proxies (or other circumvention protocols) built-in. Users can try them for free after registering by phone number. I tested a few of them at that time, to find that the egress or ingress (not sure which since it was long ago) IP addresses are just of the CDN of Qihoo 360. They appear to use similar keyword-based censorship tricks on a webpage basis. Since it is a browser instead of a generic proxy tool, the censorship can bypass protocol-layer security like HTTPS. There were unverified rumors claiming that these apps were endorsed by the government. Due to the close tie between Qihoo 360 and the authority, I suppose it is not absolute nonsense. But just one or two weeks after the public exposure, they (were) shut down. Before that, they seem to be (relatively) widely known/used by some young netizens to access Instagram and other lifestyle/fashion SNS. Media or SNS coverage: |
Via V2EX (Chinese, registration required) and China Digital Times (Chinese), news of a Chinese web browser called Kuniao browser (酷鸟浏览器 or Cool Bird browser) that advertises the ability to access sites that are blocked by the GFW.
The strange thing about this is that normally, Chinese circumvention products cannot advertise themselves so overtly. I gather that there is suspicion that this browser may be more like a monitoring tool to see what circumventing users are doing. I have not tried running it myself, but the China Digital Times article says that it asks for a mobile phone number, and an invitation code that you have to get from someone else. I heard a report that while the browser does in fact grant access to certain blocked sites such as Google and Twitter, but more sensitive sites like those related to Falun Gong are still blocked.
It would be interesting to know how it works technically—is it actually using circumvention tech, or does it just have a few IP addresses excepted from the GFW? Does it show the correct TLS certificate when you access a web site, or is there evidence of MITM?
I've downloaded and archived the binary (version 10.8.1000.11 dated 2019-10-28) just in case it disappears:
https://archive.org/details/kuniao-browser-10.8.1000.11
Archive of the home page:
https://web.archive.org/web/20191114233309/https://ie.kuniao.com/
I haven't tried running it, but here is some metadata about the installer executable. 福建紫讯信息科技有限公司 is "Fujian Zixun Information Technology Co., Ltd." 酷鸟浏览器 is "Cool Bird browser".
The text was updated successfully, but these errors were encountered: