Censorship Roundup W15: Russia Blocks Telegram, GFW Anti-Fraud Upgrade, DLSite Launches an 'Accelerator

Hello fellow firewall-jumpers, and welcome to the very first issue of the Censorship Roundup.

I've always felt that censorship news is scattered across too many places — Reddit, Telegram groups, Twitter, V2EX, various forums — and figuring out "what actually happened this week" takes half a day. So I decided to put together a weekly Friday roundup with just the highlights.

Let's get straight to this week's Top 3.

⏰ This week's coverage: April 7–11, 2026


This Week's Top 3

🔴 Russia's Telegram Block Escalates — Roskomnadzor ramps up pressure, VPN demand surges 800%, AI traffic identification budget revealed. Russia is speedrunning what took China over a decade.

🟡 China's Anti-Fraud Apps Upgraded to Circumvention Surveillance — Log into a foreign app and receive a verification code, and the police call the next day. Anti-fraud infrastructure has officially been repurposed as a circumvention detection system.

🟢 DLSite Officially Launches an "Accelerator" — Japanese adult content platform DLSite actually built its own circumvention tool to help Chinese users bypass the firewall. The most surreal news of 2026, bar none.


Russia Updates

Telegram Crackdown Heats Up

Telegram was the last safe haven for Russians — Instagram blocked, WhatsApp blocked, YouTube throttled beyond usability — and now even Telegram is being squeezed.

Roskomnadzor (Russia's Federal Communications Oversight Agency, abbreviated RKN) began escalating Telegram restrictions in February. Voice calls went first, then media file transfers slowed down, and this week reports emerged of text message delays in some regions. The approach mirrors China's playbook of "throttle rather than cut."

For the full timeline, see 👉 Russia's Internet Censorship in 2026: Complete Block List

VPN Demand Surges 800%

That number isn't hyperbole — it's publicly reported data from multiple VPN providers. Russians went from "occasionally turning on a VPN to watch YouTube" to "can't even chat without a VPN." Market research shows 30-40% of Russian internet users are currently using some form of circumvention tool, and that number is still climbing fast.

For context: China's VPN usage rate is estimated at 10-15%. Russia's explosive demand has led many people to hastily install sketchy free VPNs, where the security risks are arguably worse than not being able to get past the wall.

AI Traffic Identification Budget Revealed

This is the most significant technical development of the week. The Russian government revealed a $780 million budget specifically for building an AI-driven traffic analysis system. The goal is clear: use machine learning to identify VPN traffic patterns — even if traffic is encrypted and disguised, AI can spot anomalies in flow patterns.

Sound familiar? That's because China's GFW already uses similar technology. Russia putting these budget figures in the open is essentially an official admission: "We're building a wall just like China's."

For more China-Russia comparison analysis, see 👉 China vs Russia Firewall: Which Is Harder to Bypass?


China Updates

Anti-Fraud Apps Officially Repurposed for Circumvention Surveillance

The most unsettling news of the week. According to Radio Free Asia's April 7 report, a user simply logged into Microsoft Teams and received a verification code — the next day, they got a call from the local police station requesting they come in for investigation. At the station, all apps on their phone and bank card numbers were fully documented.

Bottom line: the "National Anti-Fraud Center" app on your phone isn't just preventing scams anymore — it's monitoring whether you use overseas services. This is no longer speculation; it's a systemic pattern backed by actual cases.

For a detailed analysis, see 👉 GFW Q2 2026 Update: Anti-Fraud Upgrade & New Blocking Methods

Data Center Crackdown on Cross-Border Access

The April 1 policy continued to ripple through this week. Data centers across the country received orders to strictly investigate "unauthorized cross-border access," with non-compliant facilities facing permanent shutdown.

The hardest hit are technically-inclined users who self-host circumvention tools — your domestic relay server could have its connection pulled by the data center itself. Legitimate enterprise cross-border needs are also affected; IT departments at many foreign companies had a rough week.

VPN Detection Patent Enters Substantive Examination

Patent No. CN121691088A, designed to automatically detect whether a device is running a VPN. Filed October 2025, this week confirmed it has entered substantive examination.

A patent isn't a product, but the direction is clear: future surveillance won't be limited to the network layer (GFW blocking IPs and protocols) — it could extend to your phone and computer. Endpoint detection plus network blocking — a two-pronged approach worth watching closely.


The Weird Stuff

DLSite Officially Launches an "Accelerator" — 2026's Most Surreal News

I read this one three times to make sure it wasn't fake.

DLSite — Japan's largest platform for indie games and adult content — has officially released a tool called "DLBooster," which is essentially a circumvention tool to help Chinese users access their website. Yes, a content platform built its own wall-bypassing tool, and gave it a perfectly euphemistic name: "accelerator."

This reflects a fascinating trend: "accelerator" has become the legally-safe euphemism for VPN in the Chinese-speaking world. Tell a friend "I'm using a VPN" and it sounds vaguely illegal; say "I installed a gaming accelerator" and it instantly becomes a normal consumer activity.

From NetEase's UU Accelerator to various "network optimization" services to now a Japanese platform adopting the same terminology — the power of language sometimes exceeds that of technology.

For friends looking to play overseas game servers from China, see 👉 Complete Gaming VPN Guide


Tech Scene Observations

Traditional Protocols: Dead Across the Board

The consensus growing across tech communities this week is crystal clear: OpenVPN and WireGuard are essentially unusable in both China and Russia.

The reason is simple — these protocols' traffic signatures are too distinctive. DPI systems from the GFW and RKN can identify them in milliseconds and immediately terminate the connection. Users report that WireGuard in China now survives less than 30 seconds.

Traffic Disguise: The Only Survival Strategy

The circumvention tools that are still alive all share one trait: they make traffic look nothing like a VPN. Specifically, they disguise circumvention connections as normal HTTPS web browsing traffic, so DPI systems can't distinguish between circumvention and regular news browsing.

This isn't a new concept, but in 2026 it has gone from "advanced technique" to "bare minimum for survival." If your circumvention tool still runs traditional VPN protocols, it's time to switch.

(Quick plug time) Sunset Browser uses exactly this kind of next-gen encrypted disguise technology — connections look identical to ordinary web traffic, which is why it remains stable in both China and Russia. Alright, plug over — back to business.


Worth Watching Next Week

📌 Russia may expand Telegram blocking nationwide — Currently being piloted in select regions. If "results are satisfactory," it could roll out nationally next week or the week after. Monitoring closely.

📌 China's mid-April GFW upgrade window — Historical data shows that mid-April (after tax filing season ends) is when the GFW commonly gets an upgrade. If your circumvention tool suddenly slows down or drops, don't panic — wait a day or two and see.

📌 DLBooster ripple effects — If DLSite's approach succeeds, more overseas platforms may follow suit with their own "accelerators." Commercial forces driving circumvention adoption is a trend worth watching.


FAQ

Q: How often is the Censorship Roundup updated?

Every Friday, covering important news from Monday through Friday. If there's a major breaking event (like a large-scale GFW upgrade), we'll publish an urgent bulletin separately.

Q: How does Russia's Telegram block differ from China's?

China has been gradually restricting Telegram since 2015, and it's now almost completely unusable. Russia only started in late 2025 and is still in the "gradual tightening" phase. But Russia's hallmark is acting hastily, often blocking so aggressively that legitimate services get caught in the crossfire. For a detailed comparison, see China vs Russia Firewall.

Q: I'm in China — does the anti-fraud app really monitor circumvention?

Based on current cases, the anti-fraud system can indeed detect when you're using overseas services. It may not directly monitor "circumvention" per se, but rather tracks behaviors like "accessing overseas IPs" or "receiving overseas verification codes," then triggers manual follow-up. We recommend using circumvention tools with strong traffic disguise capabilities to reduce the risk of detection.

Q: Are traditional VPNs (OpenVPN/WireGuard) really completely done?

In mainland China and major Russian cities, they're extremely difficult to use. You might connect for a few minutes, but detection and disconnection follow quickly. If you're in either country, use tools with traffic disguise technology. That said, in countries with lighter censorship (Iran, Turkey, etc.), traditional VPNs may still have some viability.


This is the first issue of the Censorship Roundup. If you found it useful, share it with anyone who needs it. See you next Friday.

Have a topic you want covered or a news tip? Drop us a line through our community channels.