<s>
Freegate	B-Application
is	O
a	O
software	O
application	O
developed	O
by	O
Dynamic	O
Internet	O
Technology	O
(	O
DIT	O
)	O
that	O
enables	O
internet	O
users	O
from	O
mainland	O
China	O
,	O
South	O
Korea	O
,	O
North	O
Korea	O
,	O
Syria	O
,	O
Vietnam	O
,	O
Iran	O
,	O
United	O
Arab	O
Emirates	O
,	O
Germany	O
,	O
New	O
Zealand	O
,	O
Australia	O
,	O
and	O
the	O
United	O
Kingdom	O
among	O
others	O
,	O
to	O
view	O
websites	O
blocked	O
by	O
their	O
governments	O
.	O
</s>
<s>
The	O
program	O
takes	O
advantage	O
of	O
a	O
range	O
of	O
proxy	B-Application
servers	I-Application
called	O
Dynaweb	O
.	O
</s>
<s>
This	O
allows	O
users	O
to	O
bypass	O
Internet	O
firewalls	B-Application
that	O
block	O
web	O
sites	O
by	O
using	O
DIT	O
's	O
Peer-to-peer	O
(	O
P2P	O
)	O
-like	O
proxy	O
network	O
system	O
.	O
</s>
<s>
FreeGate	B-Application
's	O
anti-censorship	O
capability	O
is	O
further	O
enhanced	O
by	O
a	O
new	O
,	O
unique	O
encryption	O
and	O
compression	O
algorithm	O
in	O
the	O
versions	O
of	O
6.33	O
and	O
above	O
.	O
</s>
<s>
Dynamic	O
Internet	O
Technology	O
estimates	O
Freegate	B-Application
had	O
200,000	O
users	O
in	O
2004	O
.	O
</s>
<s>
Once	O
users	O
point	O
their	O
web	B-Application
browser	I-Application
at	O
one	O
of	O
the	O
DynaWeb	O
URLs	O
,	O
a	O
web	O
page	O
will	O
be	O
presented	O
similar	O
to	O
the	O
original	O
,	O
with	O
most	O
blocked	O
websites	O
as	O
links	O
.	O
</s>
<s>
It	O
has	O
hundreds	O
of	O
mirror	O
sites	O
at	O
any	O
time	O
,	O
and	O
each	O
with	O
a	O
varying	O
IP	O
and	O
DNS	O
domain	O
names	O
to	O
defeat	O
IP	O
blocking	O
and	O
DNS	B-Protocol
hijacking	I-Protocol
.	O
</s>
<s>
Automatic	O
blocking	O
detection	O
combined	O
with	O
quick	O
reaction	O
apparently	O
frustrates	O
the	O
blocking	O
efforts	O
on	O
the	O
China	O
side	O
of	O
the	B-Application
Great	I-Application
Firewall	I-Application
of	I-Application
China	I-Application
(	O
GFW	O
)	O
.	O
</s>
<s>
DIT	O
also	O
releases	O
a	O
tiny	O
piece	O
of	O
software	O
,	O
FreeGate	B-Application
,	O
which	O
directly	O
taps	O
into	O
DynaWeb	O
's	O
backbone	O
and	O
keeps	O
a	O
user	O
connected	O
to	O
the	O
dynamic	O
channels	O
automatically	O
.	O
</s>
<s>
There	O
are	O
indications	O
that	O
FreeGate	B-Application
has	O
some	O
capabilities	O
built-in	O
to	O
exploit	O
some	O
zero-day	O
vulnerabilities	O
of	O
the	O
GFW	O
.	O
</s>
<s>
In	O
2002	O
,	O
DIT	O
started	O
to	O
provide	O
anti-censorship	O
services	O
under	O
the	O
framework	O
of	O
DynaWeb	O
,	O
and	O
like	O
UltraSurf	B-Application
,	O
DynaWeb	O
became	O
a	O
top	O
contender	O
of	O
the	O
GFW-penetration	O
effort	O
.	O
</s>
<s>
Freegate	B-Application
was	O
created	O
by	O
Falun	O
Gong	O
practitioners	O
and	O
has	O
been	O
financed	O
by	O
the	O
Broadcasting	O
Board	O
of	O
Governors	O
,	O
a	O
US	O
governmental	O
agency	O
.	O
</s>
<s>
Freegate	B-Application
also	O
receives	O
funding	O
from	O
Human	O
Rights	O
in	O
China	O
,	O
which	O
is	O
also	O
one	O
of	O
its	O
clients	O
and	O
which	O
receives	O
some	O
funding	O
from	O
the	O
American	O
non-profit	O
organization	O
the	O
National	O
Endowment	O
for	O
Democracy	O
.	O
</s>
<s>
According	O
to	O
a	O
CRS	O
report	O
,	O
the	O
US	O
government	O
gave	O
funding	O
of	O
$	O
685,000	O
to	O
Freegate	B-Application
in	O
2005	O
.	O
</s>
<s>
In	O
2004	O
,	O
the	O
Financial	O
Times	O
,	O
citing	O
a	O
member	O
of	O
staff	O
at	O
Symantec	O
in	O
mainland	O
China	O
,	O
reported	O
that	O
Norton	B-Application
AntiVirus	I-Application
identified	O
Freegate	B-Application
as	O
a	O
Trojan	O
horse	O
.	O
</s>
<s>
Symantec	O
explained	O
that	O
its	O
detection	O
was	O
based	O
on	O
the	O
software	O
operating	O
similarly	O
to	O
various	O
Trojan	O
horses	O
,	O
based	O
on	O
the	O
use	O
of	O
proxies	O
to	O
penetrate	O
firewalls	B-Application
used	O
to	O
block	O
web	O
sites	O
,	O
but	O
that	O
it	O
had	O
modified	O
its	O
detection	O
to	O
exclude	O
Freegate	B-Application
.	O
</s>
<s>
In	O
2013	O
,	O
it	O
was	O
reported	O
that	O
"	O
pro-government	O
electronic	O
actors	O
"	O
in	O
Syria	O
sent	O
electronic	O
messages	O
to	O
rebels	O
encouraging	O
them	O
to	O
download	O
a	O
file	O
named	O
Freegate	B-Application
which	O
was	O
claimed	O
to	O
be	O
designed	O
to	O
help	O
dissidents	O
circumvent	O
state	O
surveillance	O
agencies	O
,	O
but	O
actually	O
it	O
was	O
a	O
malware	O
and	O
the	O
intruder	O
was	O
able	O
to	O
monitor	O
what	O
the	O
victims	O
were	O
typing	O
on	O
their	O
computers	O
and	O
read	O
or	O
remove	O
the	O
files	O
.	O
</s>
<s>
In	O
August	O
2013	O
while	O
Freegate	B-Application
was	O
testing	O
a	O
new	O
proxy	O
program	O
,	O
some	O
people	O
thought	O
it	O
was	O
a	O
phishing	O
attack	O
.	O
</s>
<s>
Reports	O
from	O
Iran	O
said	O
the	O
users	O
who	O
used	O
Freegate	B-Application
to	O
pass	O
Internet	B-Application
censorship	I-Application
in	O
Iran	O
,	O
were	O
led	O
to	O
a	O
fake	O
page	O
instead	O
of	O
Facebook	B-Application
's	O
main	O
website	O
.	O
</s>
<s>
Freegate	B-Application
published	O
a	O
note	O
saying	O
they	O
were	O
testing	O
a	O
new	O
proxy	O
program	O
,	O
and	O
the	O
fake	O
Facebook	B-Application
page	O
was	O
a	O
tunnel	O
.	O
</s>
<s>
Although	O
IT	O
experts	O
warned	O
users	O
to	O
be	O
careful	O
with	O
the	O
tunnel	O
link	O
because	O
it	O
does	O
n't	O
use	O
SSL	B-Protocol
security	O
so	O
users	O
 '	O
information	O
is	O
not	O
encrypted	O
.	O
</s>
