Supporters of Marcus Endicott’s Patreon can access weekly or monthly video consultations on this topic.
Every website, mobile application, and mini-program operating on servers within mainland China must first pass through a registration system that has no precise equivalent in Western regulatory frameworks. The Internet Content Provider system — universally known by its abbreviation ICP — functions as the foundational layer of China's internet governance architecture, a bureaucratic prerequisite without which no digital service may lawfully exist on Chinese soil. Established in 2000 by a pair of State Council decrees issued on the same day, the ICP regime has evolved over a quarter century from a simple website registration mechanism into a comprehensive digital services licensing framework that now encompasses mobile apps, mini-programs, and quick apps. It operates in parallel with, but is technically distinct from, the Great Firewall — the sprawling censorship infrastructure that filters traffic at China's international network borders. Together, these two systems create a layered architecture of control: the ICP regime governs what may exist inside China's internet, while the Great Firewall governs what may enter or leave it.
The legal foundation of the ICP system rests on two State Council administrative regulations promulgated on September 25, 2000. The Telecommunications Regulations of the People's Republic of China, issued as State Council Decree No. 291, established the overarching framework for telecommunications governance, dividing services into basic and value-added categories and creating a licensing regime for each. The Measures for the Administration of Internet Information Services, State Council Decree No. 292, built upon this foundation by establishing the specific regulatory architecture for internet content. Article 3 of the Measures draws the critical distinction between commercial internet information services, defined as providing information or webpage creation services to internet users for compensation, and non-commercial internet information services, defined as providing publicly available information to users free of charge. Article 4 then establishes the dual-track regulatory approach that persists to this day: a licensing system for commercial services and a filing system for non-commercial ones. No entity may engage in internet information services without either obtaining the appropriate license or completing the required filing.
The ministry responsible for administering this system is the Ministry of Industry and Information Technology, known by the acronym MIIT — not MIT. MIIT was established in March 2008 as the successor to the Ministry of Information Industry, and it ranks as the sixth executive department of the State Council. The Telecommunications Regulations, which predate MIIT's creation, still refer to the supervisory authority as the "State Council department in charge of the information industry," a term now understood to designate MIIT. The ministry operates through a two-tier administrative structure. At the national level, MIIT sets policy, issues cross-provincial value-added telecommunications service licenses, maintains the national ICP filing database at beian.miit.gov.cn, and provides overall regulatory guidance. At the local level, thirty-one provincial communications administrations carry out the hands-on work of reviewing applications, issuing filing numbers and licenses, and conducting enforcement within their respective jurisdictions. For a business operating within a single province, the provincial communications administration is the direct point of contact; for one operating across two or more provinces, MIIT itself handles the licensing.
The distinction between the two types of ICP authorization — filing and license — is more than semantic. The ICP filing, known in Chinese as ICP备案 or bei'an, is an administrative registration that all websites, apps, and mini-programs hosted in mainland China must complete, regardless of whether they generate revenue. It is free of charge, processed within twenty working days by the relevant provincial communications administration, and results in a filing number displayed in the format of a province abbreviation followed by "ICP备" and an eight-digit number. The process is conducted online through MIIT's filing management system, with applications typically submitted through the hosting provider, which acts as the access service provider and facilitates the submission. The ICP commercial license, formally known as a Category B25 Value-Added Telecommunications Business Operating License limited to internet information services, is an altogether more demanding authorization. It requires the applicant to demonstrate minimum registered capital of one million renminbi for provincial operations or ten million for cross-provincial operations, to employ at least three staff members enrolled in social insurance, to maintain a physical office, and to submit a detailed business plan along with security measures documentation. The provincial communications administration has sixty days to review a commercial license application. The license is valid for five years, subject to annual review, and its number appears in a different format: a province abbreviation followed by "ICP证" and a numerical identifier.
Three specific requirements shape who can enter this system and how. First, a Chinese business entity is mandatory. An applicant must hold a valid Chinese business license, which means foreign companies cannot obtain ICP authorization without first establishing a legal presence in China. Second, the domain name must be registered with a registrar approved by MIIT and must have completed real-name verification, with the registrant information matching the filing entity. The domain need not carry a .cn suffix; .com and other top-level domains on MIIT's approved list are acceptable, but domains registered through international registrars such as GoDaddy or Namecheap are not. Some top-level domains, such as .io, are rejected entirely because their registry operators have not registered with MIIT. Third, the servers hosting the website or application must be physically located within mainland China, operated by a hosting provider that holds an Internet Data Center business license. Servers in Hong Kong, which operates under a separate legal framework, do not qualify.
The question of whether foreign-invested enterprises can navigate this system has long been one of the most consequential practical issues in Chinese internet regulation. For the basic ICP filing, the barriers are relatively modest: wholly foreign-owned enterprises, known as WFOEs, can and routinely do complete the filing process. The commercial ICP license is another matter entirely. The Special Administrative Measures for Foreign Investment Access — commonly called the negative list — jointly issued by the National Development and Reform Commission and the Ministry of Commerce, has historically capped foreign ownership in value-added telecommunications services at fifty percent, effectively requiring foreign companies to form joint ventures with Chinese partners in order to obtain commercial ICP licenses. The 2024 edition of the negative list, published on September 8, 2024, and effective November 1, 2024, reduced the total number of restricted items from thirty-one to twenty-nine but left the fifty-percent cap on value-added telecommunications intact, with exceptions carved out for e-commerce, domestic multiparty communications, store-and-forward, and call center services.
A significant development arrived on April 8, 2024, when MIIT announced a pilot program to expand foreign investment access to value-added telecommunications services in four designated areas: Beijing, Shanghai's Pudong district, Hainan province, and Shenzhen. Under this pilot, WFOEs registered in these zones may apply directly for certain categories of value-added telecommunications licenses, including portions of the B25 internet information services category — specifically information publishing platforms and delivery services, as well as information protection and processing services. However, several significant B25 subcategories remain restricted even within the pilot zones, including information search services, community platform services, and instant messaging services, and internet content-related services such as news, publishing, audiovisual programming, and internet cultural operations remain broadly prohibited for foreign investment regardless of location. By February 28, 2025, MIIT announced that thirteen foreign-invested businesses had been granted value-added telecommunications licenses under the pilot — the first such approvals in the program's history. All thirteen were major, well-established multinational corporations, and observers noted that the practical approval threshold remains exceptionally high, making the pilot inaccessible to small and medium-sized foreign enterprises for the time being.
For decades before this pilot existed, foreign companies seeking to operate commercial internet services in China relied on a workaround known as the Variable Interest Entity structure, pioneered by Sina Corporation for its 2000 Nasdaq listing. Under a VIE arrangement, Chinese founders establish a domestic operating company that holds the ICP license and other restricted permits, while an offshore holding company — typically incorporated in the Cayman Islands — controls the domestic entity through a web of contractual arrangements rather than equity ownership, including exclusive service agreements, option agreements, equity pledges, and powers of attorney. Virtually every major Chinese internet company listed overseas has used this structure, including Alibaba, Baidu, Tencent, JD.com, and Pinduoduo. Chinese regulators have never explicitly endorsed or prohibited VIE structures, maintaining a posture of strategic ambiguity. The China Securities Regulatory Commission's 2021–2022 draft overseas listing rules effectively gave implicit recognition to VIE arrangements by requiring registration rather than prohibition. If the VATS pilot program eventually expands nationwide, some companies may restructure their operations to hold licenses directly through their WFOEs, potentially reducing reliance on VIE arrangements and the legal uncertainty they carry.
The Great Firewall — a term derived from a 1997 Wired magazine article and never used in official Chinese discourse — is the popular name for the censorship and surveillance infrastructure deployed at China's international network borders. It is technically and administratively distinct from the ICP system, though the two serve complementary purposes within the broader architecture of internet control. Where the ICP regime governs what digital services may lawfully operate inside China, the Great Firewall governs what information may cross the boundary between China's domestic internet and the global network. All international internet traffic enters and exits China through a limited number of state-controlled gateway points concentrated in Beijing, Shanghai, and Guangzhou, operated by the three state-owned telecommunications carriers: China Telecom, which controls approximately seventy-nine percent of filtering interfaces; China Unicom, which controls roughly seventeen percent; and China Mobile, which handles the remainder. The Great Firewall's middlebox devices are deployed at these gateways, where they examine, and when warranted, disrupt communications in real time.
The technical mechanisms through which the Great Firewall operates have been progressively documented by academic researchers, with the most prolific and rigorous work coming from the GFW Report project, the Citizen Lab at the University of Toronto, and researchers at the University of Massachusetts Amherst, the University of Colorado Boulder, Stanford University, and the University of Maryland. The oldest and most extensively studied mechanism is DNS poisoning. The Great Firewall's DNS injection subsystem consists of on-path middlebox devices that monitor DNS queries crossing the border. When a query for a blocked domain is detected, the device injects a forged DNS response containing a false IP address, spoofing the source as though it came from the intended resolver. Because the injectors sit on the path rather than directly in it, the legitimate query still reaches the real resolver, but the forged response typically arrives first and poisons the client's cache. The GFWatch project, a collaboration between Citizen Lab and researchers at Stony Brook and the University of Massachusetts, tested 534 million domains over an eight-month period in 2020 and identified more than 300,000 censored domains, finding that the system cycles through approximately 1,800 forged IPv4 addresses. A 2025 paper presented at the Network and Distributed System Security Symposium revealed a memory disclosure vulnerability dubbed Wallbleed in the Great Firewall's DNS injectors, which inadvertently exposed fragments of internal memory and provided unprecedented insight into the system's architecture, including confirmation that CERNET, China's education and research network, maintains its own subset of the national DNS injection infrastructure, suggesting unified management across networks.
Beyond DNS manipulation, the Great Firewall employs IP address blocking through BGP null routing, in which blacklisted destination IP addresses are injected into Border Gateway Protocol tables at gateway routers, causing all traffic to those addresses to be silently dropped. This method is lightweight and effective but can cause collateral damage when blocked addresses are shared by multiple websites through content delivery networks or shared hosting. Deep packet inspection engines, deployed at international gateways and believed to be manufactured by firms such as Huawei and ZTE, examine packet payloads and protocol headers in real time, searching for forbidden keywords, URL patterns, and protocol signatures. The system operates through traffic mirroring at the router level, forwarding copies of traffic to DPI clusters while maintaining line-rate performance on the primary data path. When the DPI system detects prohibited content, it injects forged TCP reset packets to both endpoints of the connection, causing each side to believe the other has terminated the session, and then maintains a blocking state for the affected source and destination addresses for a period typically lasting several hours.
The Great Firewall's capabilities have expanded substantially in the 2020s. In July 2020, the system began blocking all TLS connections containing the Encrypted Server Name Indication extension, a privacy feature designed to conceal the destination domain during the TLS handshake. Rather than injecting reset packets, ESNI blocking operates by dropping packets outright and triggering residual blocking of the affected connection tuple for 120 to 180 seconds. In November 2021, the Great Firewall deployed a system for detecting fully encrypted traffic — the kind generated by circumvention tools such as Shadowsocks, VMess, and obfs4 that are designed to be indistinguishable from random data. Rather than attempting to identify encrypted protocols directly, this system applies heuristic exemption rules based on entropy analysis, the fraction and position of printable ASCII characters, and protocol fingerprints for common legitimate protocols such as TLS and HTTP. Traffic that fails all exemption tests is presumed to be a circumvention tool and is blocked. This research, published at the USENIX Security Symposium in 2023, won the IETF Applied Networking Research Prize and documented a false positive rate of approximately 0.6 percent on normal traffic. In April 2024, on April 7 precisely, the Great Firewall began censoring QUIC, the UDP-based transport protocol underlying HTTP/3. Because QUIC encrypts all packets including the initial handshake, the Great Firewall must decrypt QUIC Initial packets at scale to extract the SNI field — a computationally expensive operation that researchers found reduces the system's effectiveness under moderate traffic loads, creating a diurnal pattern in which blocking is most reliable at night when overall traffic volumes are lowest. The system was found to block an average of approximately 43,800 fully qualified domain names weekly.
The Great Firewall also employs active probing, a technique first documented against SSH servers in 2011 and expanded significantly in subsequent years. When passive analysis suggests a connection to a circumvention server, the system triggers probe connections from Chinese IP addresses that attempt to communicate using the suspected protocol. If the server responds in a protocol-specific way, it is blocked, often within minutes. This technique targets Tor bridges, Shadowsocks servers, and other circumvention infrastructure. VPN detection combines protocol-specific DPI fingerprinting with TLS fingerprinting techniques and traffic entropy analysis to identify encrypted tunnels disguised as HTTPS, which produce different variance patterns compared to genuine browser traffic. In November 2025, the Ministry of State Security issued an explicit public warning about the illegality of using VPNs for circumvention, deploying an AI-generated police spokesperson to deliver the message.
A landmark event in understanding the Great Firewall occurred on September 11, 2025, when over 500 gigabytes of data were leaked from Geedge Networks, a company whose chief scientist is Fang Binxing, widely known as the "Father of the Great Firewall," and from the MESA Lab at the Institute of Information Engineering of the Chinese Academy of Sciences. The leak, which included source code, internal communications, work logs, and project documentation, confirmed that the Great Firewall uses machine learning algorithms that continuously update filtering rules. It also revealed the export of censorship and surveillance technology to Myanmar, Pakistan, Ethiopia, and Kazakhstan under the Belt and Road Initiative's digital component, with products marketed commercially under names such as Tiangou Secure Gateway. A consortium of organizations including InterSecLab, Amnesty International, Justice for Myanmar, and several international media outlets analyzed the data over a period of months, and analysis was still ongoing as of late 2025.
An emerging dimension of censorship revealed through recent research is the deployment of regional filtering systems within China's borders. Since at least August 2023, residents of Henan province have reported websites accessible elsewhere in China being blocked locally. A study published at the IEEE Symposium on Security and Privacy in 2025 documented what researchers termed the "Henan Firewall," a provincial censorship system that monitors traffic leaving the province and blocked a cumulative 4.2 million domains over the measurement period — roughly five to six times the number blocked by the national Great Firewall. The provincial system operates with a single blocklist applied across both HTTP and TLS censorship, unlike the national system which maintains separate lists per protocol, and it disproportionately targets economy, technology, and business content. Similar regional censorship systems reportedly exist in Hebei, Tibet, and Xinjiang.
The relationship between the ICP system and the Great Firewall is structural rather than directly technical. There is no publicly documented evidence of a real-time integration between the MIIT ICP database and the Great Firewall's filtering infrastructure. Instead, the two systems operate through different enforcement pathways. ICP compliance for websites and services hosted within China is enforced primarily by hosting providers — Alibaba Cloud, Tencent Cloud, Huawei Cloud, and their counterparts — which are legally required to verify ICP filing status before allowing a website to go live and to shut down services that lack valid filing numbers. MIIT and provincial communications administrations conduct regular audits to ensure compliance, and penalties for operating without filing range from ten thousand to one million renminbi, with potential criminal liability in severe cases. The Great Firewall, by contrast, filters cross-border traffic at international gateways using its own blocklists based on content analysis, domain matching, and IP address intelligence, without reference to the ICP database. A website hosted inside China that holds a valid ICP filing effectively bypasses the Great Firewall because its traffic remains domestic and never traverses international gateways. A website hosted outside China, conversely, is subject to Great Firewall filtering regardless of whether it holds any Chinese authorization, and it will experience degraded performance crossing international gateways even if its content does not trigger active blocking.
The ICP and Great Firewall systems exist within a broader regulatory ecosystem that has grown markedly more complex since 2017. The Cyberspace Administration of China, known as the CAC or 网信办, has emerged as what scholars at Stanford's DigiChina project have called a "supra-ministerial regulator," its jurisdiction expanding from content censorship to encompass cybersecurity, data governance, algorithmic regulation, and artificial intelligence oversight. The CAC answers to the Central Cyberspace Affairs Commission chaired by Xi Jinping and operates in parallel with MIIT, creating overlapping enforcement domains. MIIT retains primary jurisdiction over ICP licensing and telecommunications regulation, while the CAC exercises broader authority over content governance and data compliance. In practice, the two agencies coordinate: in the first quarter of 2023 alone, national and local CAC authorities interviewed operators of more than 2,200 websites, suspended 48, and worked with MIIT to cancel 4,208 ICP permits and filings.
Three major laws enacted between 2017 and 2021 have created additional compliance layers above the foundational ICP requirement. The Cybersecurity Law of 2017, the first of the trio, established the Multi-Level Protection Scheme for network security, data localization requirements for critical information infrastructure operators, and a cybersecurity review mechanism. The Data Security Law, effective September 2021, introduced a data classification system distinguishing ordinary, important, and core data, and imposed security assessment obligations for cross-border data transfers involving important data. The Personal Information Protection Law, effective November 2021, created a comprehensive privacy framework with extraterritorial reach, requiring lawful bases for processing personal information, informed consent for sensitive categories, and one of three approved mechanisms for cross-border data transfers: a CAC security assessment, standard contractual clauses, or personal information protection certification. Maximum penalties under the PIPL reach fifty million renminbi or five percent of the prior year's revenue. Failure to comply with any of these laws can result in ICP revocation, meaning the foundational permit upon which an entire digital business rests can be pulled for violations that have nothing to do with telecommunications licensing per se.
The Cybersecurity Law underwent its first major revision in October 2025, adopted by the Standing Committee of the National People's Congress on October 28 and effective January 1, 2026. The amendments raised maximum fines for violations by critical information infrastructure operators to ten million renminbi, harmonizing penalties with the Data Security Law and PIPL. They broadened extraterritorial enforcement to cover any overseas activity deemed to endanger China's cybersecurity, introduced parallel enforcement powers allowing regulators to impose warnings and fines simultaneously rather than sequentially, and added principle-based provisions for AI safety. The State Council separately issued the Network Data Security Management Regulations, effective January 1, 2025, as implementing rules for all three laws, providing detailed guidance on data classification, cross-border transfers, and a twenty-four-hour incident reporting requirement for significant data security risks.
The ICP system itself has continued to evolve. On August 4, 2023, MIIT issued a notice extending ICP filing requirements to mobile applications, mini-programs, and quick apps — a move that transformed what had been a website-era registration system into a comprehensive digital services framework. The legal basis was Article 23 of the Law of Combating Telecom and Online Fraud, enacted in December 2022, which expressly required apps to be filed with telecommunications authorities. New apps were required to complete filing before launch from September 1, 2023; existing apps had until March 31, 2024. Major app stores enforced aggressively: Apple's China App Store began rejecting new submissions without ICP filing numbers, and Vivo's app store alone removed over 700 non-compliant apps in early 2024. The Measures for the Administration of Internet Information Services, the foundational 2000 regulation, received a minor amendment effective January 20, 2025, when State Council Decree No. 797 simplified Article 5's list of categories requiring pre-approval. A comprehensive draft revision released for public comment in January 2021, which would have expanded the measures from twenty-seven to fifty-four articles and fundamentally restructured the commercial and non-commercial classification, was never formally enacted.
Enforcement has intensified across every dimension of internet regulation. The largest penalty in China's data protection history was imposed on Didi Global in July 2022, when the CAC levied a fine of 8.026 billion renminbi — approximately 1.2 billion dollars — for illegally collecting 64.7 billion pieces of personal information including facial recognition data and geolocation. The China National Knowledge Infrastructure, the country's dominant academic database, was fined fifty million renminbi in September 2023 for unauthorized personal information collection and subsequently suspended access for foreign universities over non-compliant cross-border data transfers. Micron Technology became the first foreign company subjected to a formal CAC cybersecurity review in March 2023, resulting in a finding that Micron products posed "serious network security risks" and a ban on their purchase by critical information infrastructure operators. The CAC's annual Qinglang, or "Clean Internet," campaigns have escalated in scope: in 2023, the agency shut down 14,624 websites, removed 259 apps, and closed more than 127,000 social media accounts. A September 2025 campaign targeted what authorities described as "hostile" and "gloomy" online content, imposing disciplinary measures on major platforms including Weibo, Kuaishou, and Xiaohongshu.
The intersection of artificial intelligence regulation with the ICP framework represents the newest frontier. The Interim Measures for Generative AI Services, effective August 15, 2023, require providers of public-facing generative AI services to conduct security assessments and file their large language models with the CAC — a separate registration from both ICP filing and the earlier algorithm filing requirement. By April 2025, 346 generative AI services had completed CAC filing. Measures for Labeling AI-Generated Content, issued March 14, 2025, and effective September 1, 2025, mandate both visible labels for users and embedded metadata in all AI-generated text, audio, images, video, and virtual scenes. These layered filing and compliance requirements — ICP filing, algorithm filing, LLM filing, AI content labeling — create a regulatory architecture in which each new category of digital service triggers its own registration obligation, supervised by its own combination of agencies.
What emerges from this landscape is a system of digital governance that operates through accumulation rather than replacement. The ICP filing remains the entry ticket — without it, no website, app, or mini-program may lawfully operate on Chinese servers, and no hosting provider may keep it online. Above this foundational layer, the commercial ICP license gates access to revenue-generating internet services, with foreign ownership restrictions that, despite the 2024 pilot program, continue to channel most foreign companies through joint ventures or the legally ambiguous VIE structure. Above these telecommunications-specific requirements, the trio of the Cybersecurity Law, Data Security Law, and Personal Information Protection Law impose substantive obligations around security, data handling, and privacy that carry their own severe penalties and their own enforcement apparatus in the CAC. And at the border, the Great Firewall enforces a separate logic entirely, filtering international traffic through technical mechanisms that have grown from simple DNS manipulation to encompass deep packet inspection, encrypted traffic analysis, QUIC decryption, active probing, and machine learning — mechanisms that operate independently of the ICP database and answer to a different institutional logic. The result is not a single wall but a series of concentric barriers, each with its own gatekeepers, its own rules, and its own evolving capabilities, through which any digital service seeking to operate in or communicate with the world's largest online population must find a way to pass.
[Apr 2026]