Великий китайский файрвол - Джеймс Гриффитс
Шрифт:
Интервал:
Закладка:
Tufekci, Z. (2017) Twitter and Tear Gas: the power and fragility of networked protest, New Haven CT: Yale University Press.
Walton, G. (2001) China’s Golden Shield: corporations and the development of surveillance technology in the People’s Republic of China, Montreal: International Centre for Human Rights and Democratic Development.
Walton, G. et al. (2009) ‘Tracking Ghostnet: investigating a cyber espionage network’, Information Warfare Monitor, 29 March.
Wu, X. (2005) Chinese Cyber Nationalism: evolution, characteristics and implications, Lanham MD: Lexington Books.
Xin, X. (2012) How the Market Is Changing China’s News: the case of Xinhua news agency, Lanham MD: Lexington Books.
Yang, G. (2009) The Power of the Internet in China: citizen activism online, New York NY: Columbia University Press.
Zetter, J. (2014) Countdown to Zero Day: Stuxnet and the launch of the world’s first digital weapon, New York NY: Crown/Archetype.
Zhu, Y. (2012) Two Billion Eyes: the story of China Central Television, New York NY: The New Press.
Zittrain, J. and B. Edelman (2003) ‘Empirical analysis of internet filtering in China’, Cambridge MA: Berkman Klein Center for Internet and Society, https://cyber.harvard.edu/filtering/china/.
Примечания
При написании этой книги я старался как можно больше опираться на первоисточники как на китайском, так и на английском языке, а также на интервью с участниками событий и их собственные записи. Цитируя чужие сообщения и исследования, я старался быть предельно внимательным. Любые допущенные ошибки прошу считать моими.
Примечания
Введение
1
‘Github status report’, Github, 29 March 2015, https://status.github.com/messages/2015-03-29.
2
‘Google’s Eiffel doodle bug’, The Connexion, 31 March 2015, https://www.connexionfrance.com/French-news/UPDATE-Google-s-Eiffel-doodle-bug
3
J. Newland, ‘Large scale DDoS attack on github.com’, The Github Blog, 27 March 2015, https://blog.github.com/2015-03-27-large-scale-ddos-attack-on-github-com/
4
‘Github status report’, 5 April 2015, https://status.github.com/messages/2015-04-05.
5
‘Baidu’s traffic hijacked to DDoS Github.com’, Insight-labs, 27 March 2015, http://web.archive.org/web/20160304020144/http://insight-labs.org/?p=1682; E. Hjelmvik, ‘China’s man-on-the-side attack on GitHub’, Netresec, 31 March 2015, http://www.netresec.com/?page=Blog&month=2015-03&post=China%27s-Man-on-the-Side-Attack-on-GitHub
6
国家网信办发言人:“Outlook受中国攻击”的说法纯属污蔑 Office of the Central Cyberspace Affairs Commission, 22 January 2015, http://www.cac.gov.cn/2015-01/22/c_1114097853.htm
7
C. Smith, ‘We are under attack’, GreatFire.org, 19 March 2015, https://en.greatfire.org/blog/2015/mar/we-are-under-attack
8
Разработчик дал мне интервью только на условии изменения имени в тексте материала.
9
D. O’Brien, ‘Speech that enables speech: China takes aim at its coders’, Electronic Frontier Foundation, 28 August 2015, https://www.eff.org/deeplinks/2015/08/speech-enables-speech-china-takes-aim-its-coders
10
Текст эссе цитируется по публикации на официальном сайте А. И. Солженицына solzhenitsyn.ru.
11
B. Schneier, ‘Someone is learning how to take down the internet’, Schneier on Security, 13 September 2016, https://www.schneier.com/blog/archives/2016/09/someone_is_lear.html
Часть I
12
‘How Civic Square has become less than friendly’, The Standard, 29 September 2014, http://www.thestandard.com.hk/section-news.php?id=149919&story_id=43069145&d_str=20140929&sid=11
13
‘Google’s Eiffel doodle bug’, The Connexion, 31 марта 2015 г., https://www.connexionfrance.com/French-news/UPDATE-Google-s-Eiffel-doodle-bug
14
Кантонский диалект китайского очень хорошо для этого подходит: – нет таких цифр, из которых уважающий себя житель Гонконга не сделал бы неприличную надпись.
15
J. Griffiths and V. Kam, ‘Hong Kongers “thumb their noses at Beijing” with pro-independence votes)’, CNN, 6 September 2016, https://edition.cnn.com/2016/09/04/asia/hong-kong-legco-election/index.html
16
J. Griffiths, ‘Hong Kong protesters pop champagne after leader says he’ll step down’, CNN, 10 December 2016, https://edition.cnn.com/2016/12/10/asia/hong-kong-cy-leung-regina-ip/index.html
17
P. Boehler ‘Voices from Tiananmen’), South China Morning Post, 2014, http://multimedia.scmp.com/tiananmen/
18
F. Dikotter, The Cultural Revolution: a people’s history, 1962–1976, London: Bloomsbury, 2016.
19
M. Hassan, ‘Beijing 1987: China’s coming-out party’, Nature 455 (2008), pp. 598–599.
20
P. Greenberg, вЂBeijing from ground level, The Washington Post, 11 October 1987, https://www.washingtonpost.com/archive/lifestyle/travel/1987/10/11/beijing-from-ground-levelinto-the-bicycle-fray/5259f362-cd7e-487e-9018-4c1b90527a9/
21
A. Faruqui and M. Hassan, The Future of Science in China and the Third World: proceedings of the Second General Conference, Beijing, PR China, 14–18 September 1987, Singapore: World Scientific, 1989, р. 4.
22
W. Zorn, J. Hauben and A. Plubell, How the Lost E-mail Message ‘Across the Great Wall…’ Brought People Together, Karlsruhe: Karlsruhe Institute of Technology, 2014, https://www.informatik.kit.edu/downloads/HQarticle-08Feb2014-final-version-engl.pdf
23
World Bank, China: University Development Project, Washington DC: World Bank, 1981, http://documents.worldbank.org/curated/en/669881468240345194/China-University-Development-Project
24
°Committee to Protect Journalists, ‘Blogger’s website deleted by Microsoft following government’s request’, IFEX, 9 January 2006, https://ifex.org/china/2006/01/09/blogger_s_website_deleted_by_microsoft/
25
W. Zorn, China’s CSNET Connection 1987: origin of the China Academic Network CANET, speech to the Hasso-Plattner-Institute at Potsdam University, 2012.
26
中国互联网:从第一封邮件走向世界, ScienceNet.cn, 22 August 2014, http://news.sciencenet.cn/htmlnews/2014/8/301669.shtm
27
X. Wu, Chinese Cyber Nationalism: evolution, characteristics and implications, Lanham MD: Lexington Books, 2005, p. 17.
28
‘Wolf smoke signals war’, China Heritage Quarterly, June 2006, http://web.archive.org/web/20120318174504/http://www.chinaheritagequarterly.org/articles.php?searchterm=006_wolf.inc&issue=006
29
Wu, Chinese Cyber Nationalism, p. 18.
30
E. Harwit and D. Clark, ‘Shaping the internet in China: evolution of political control over network infrastructure and content’, Asian Survey 41, № 3 (2001), pp. 377–408.
31
M. Farley, ‘“Cyberdissident” in China on trial for subversion’, Los Angeles Times, 5 December 1998, http://articles.latimes.com/1998/dec/05/news/mn-50740
32
G. Barme and S. Ye, ‘The Great Firewall of China’, Wired, 1 June 1997, https://www.wired.com/1997/06/china-3/
33
Computer Information Network and Internet Security, Protection and Management Regulations, State Council, 1997.
34
J. Griffiths, ‘VPN down: China goes after Astrill, other anti-censorship apps in run up to WW2 anniversary parade’, South China Morning Post, 26 August 2015, http://www.scmp.com/tech/apps-gaming/article/1852658/vpn-down-china-goes-after-astrill-other-anti-censorship-apps-run
35
‘How censorship works in