On August 20, 2025, China experienced an abrupt, hour-plus disruption in external internet connectivity when its notorious Great Firewall (GFW) injected forged TCP RST+ACK packets, entirely halting HTTPS traffic on port 443 for about 74 minutes—while leaving ports 22, 80, and 8443 untouched. Analysts observed that the device responsible did not match known GFW configurations, raising speculation that it might have been a newly deployed censorship gadget, a misconfiguration, or even a testing exercise, rather than a politically timed measure. No prominent political or social events were linked to the timing, further clouding the motive. Intriguingly, Pakistan experienced a similar downturn in traffic shortly before, suggesting a possible shared infrastructure anomaly. The incident underscores the delicate balancing act Beijing performs between suppressing outside information and preserving its economy—and leaves open whether this was purposeful or simply an unfortunate glitch.
Sources: TechRadar Pro, Tom’s Hardware, SDxCentral
Key Takeaways
– The GFW’s injection of TCP RST+ACK packets on port 443 effectively severed secure external web access, while other ports remained operational.
– The device causing the outage didn’t match known Great Firewall hardware, suggesting either new censorship tech, misconfiguration, or testing.
– No major political events coincided with the outage, though a similar disruption in Pakistan hints at possible shared equipment or coordination.
In-Depth
China’s brief internet blackout on August 20, stretching just over an hour, serves as a revealing snapshot of the country’s finely calibrated censorship machinery—and the risks that come with its complexity. By focusing solely on port 443, the standard channel for secure HTTPS traffic, the system managed to block access to most foreign websites without crashing other services essential to commerce or domestic operations. That alone shows intention: rather than a blunt shutdown, it was targeted interference, aggressive enough to sideline platforms like Apple or Tesla, yet careful enough to minimize collateral damage.
What’s especially intriguing is that the blinking culprit didn’t match the usual Great Firewall signature. This anomaly hints at a possible addition to the censorship arsenal—a new device perhaps, or a misconfigured switch in an existing system. Add in the absence of any political triggering event, and you’re left with more questions than answers. Was this a clandestine test of new capabilities? A technical experiment gone awry? Or simply human shuffling behind the scenes that spiraled unexpectedly?
Some experts noted Pakistan’s internet also sagged just prior, suggesting a cross-border tech quirk—or shared vendor—might be at play. At the end of the day, the episode illustrates how Beijing walks a razor’s edge: trying to clip foreign information while avoiding economic fallout. When that clippers misfire—or perhaps even fire—every glitch becomes a window into the mechanics of digital control.

