Welcome back, fellow firewall-hoppers, to the third issue of the Weekly Censorship Digest.
Last week we covered the GFW blocking QUIC, Russia's AI-powered censorship going live, and the second reading of the Cybercrime Prevention Law. This week's events are even more surreal — on one side, China produces a provincial-level internet cutoff order; on the other, Russia's VPN crackdown takes down its own banks.
No preamble. Straight to this week's Top 3.
⏰ This week's coverage: April 13–18, 2026
This Week's Top 3
🔴 Shaanxi Telecom fully bans overseas traffic — China Telecom in Shaanxi Province has notified enterprise and residential users that starting April 15, "all international internet access services will be fully terminated." This is the first provincial-level outbound traffic ban in China.
🟡 Russia's VPN crackdown crashes bank payment systems — Bloomberg reports that multiple Russian banks lost cross-border payment functionality after VPN connections were blocked. As of April 15, foreign currency transactions at some banks are in a state of partial paralysis. The cost of censorship has finally hit the economic lifeline.
🟢 Bitchat delisted from the App Store — Bitchat, an end-to-end encrypted messaging app, disappeared from Apple's App Store this week. The reason for the delisting remains unclear. The survival space for encrypted communication tools continues to shrink.
China Updates
This is the most shocking news of the week.
Starting April 14, multiple China Telecom users in Shaanxi Province received official notices stating approximately: "In accordance with relevant laws, regulations, and directives from higher authorities, starting April 15, 2026, all international internet access services will be fully terminated. You will no longer be able to access overseas websites and applications."
The notice covers both enterprise broadband and residential broadband, with no distinction by service type. In other words, this isn't about "blocking VPN tools" — it's shutting down the outbound traffic route entirely.
What does this mean? Shaanxi Telecom users can't access Google, GitHub, or even Apple's official website — not because they need to bypass the firewall, but because there's simply no outbound path anymore.
Current confirmed status:
- Received notices: China Telecom enterprise and residential users in Shaanxi Province
- Haven't received notices: China Unicom and China Mobile users (though follow-up cannot be ruled out)
- Other provinces: No similar notices yet, but multiple communities are already worrying about the "Shaanxi model" spreading
Why start with Shaanxi? There's no official explanation, but a reasonable guess is: as an inland province, Shaanxi has relatively low dependence on international business, making the "pilot cost" minimal. If the pilot doesn't trigger significant economic backlash, the next step could be expansion to other inland provinces.
Impact on the censorship-bypass community: This isn't a GFW upgrade — this is pulling the plug. No matter how sophisticated your tools are, they're useless when there's zero outbound traffic. Unless you go satellite or use non-carrier networks — but that's completely impractical for ordinary users.
Pre-May Day Tightening Warning
We flagged last week that "the routine tightening ahead of the May Day holiday" was coming. This week the signals got clearer.
Beyond Shaanxi Telecom's extreme case, nationwide observations include:
- GFW blocking intensity noticeably increased across multiple provinces; some previously functional TLS-disguised nodes experiencing intermittent outages
- Censorship-bypass discussions on social platforms being deleted faster
- Several proxy services proactively issuing "may be unstable during May Day" warnings
Seasoned firewall-hoppers know: the 1–2 weeks before major holidays are when the GFW is most active. This year's May Day (May 1–5) also carries the "demonstration effect" of the Shaanxi ban. It's advisable to prepare backup plans now.
More GFW updates 👉 GFW 2026 Q2 Update: QUIC Blocking and New Detection Methods
Russia Updates
VPN Crackdown Crashes the Banks
This might be the most ironic internet censorship story of 2026 so far.
Bloomberg reported on April 16 that multiple Russian banks experienced massive failures in their cross-border payment systems around April 15. The cause? These banks' international payment channels rely on VPN connections for encrypted communication with foreign financial institutions — and those VPN connections were intercepted by RKN's (Roskomnadzor, Russia's Federal Communications Oversight Agency) blocking system.
Yes, you read that right. Russia's government blocked VPNs so aggressively that it accidentally killed its own banking infrastructure.
According to Bloomberg:
- At least 5 major Russian banks were affected
- Foreign currency exchange and cross-border remittances were in partial or complete disruption
- Banks applied to RKN for "VPN whitelist exemptions," but the approval process is painfully slow
- Some banks were forced to temporarily revert to older (and less secure) communication methods
The deeper significance: this proves that the "collateral damage" from large-scale VPN blocking is far worse than censorship agencies imagine. VPNs aren't just firewall-bypass tools — they're part of modern internet infrastructure. Enterprise remote work, cross-border banking communications, cloud service connectivity — all depend on VPNs. A blanket VPN ban is effectively shooting your own digital economy in the foot.
Durov Calls for Digital Resistance
Telegram founder Pavel Durov posted on his Telegram channel this week, responding to Russia's blocking campaign in an unusually forceful tone.
Durov's core argument: "When a government blocks encrypted communication tools, it's not us who get hurt — it's every citizen of that country." He called on Russian users to "not compromise, and use every technical means to protect your communication freedom," while hinting that Telegram is developing new anti-censorship technology.
April 15 was the "final compliance deadline" that RKN had previously set for Telegram. The deadline has passed, and Telegram clearly chose non-compliance. How RKN escalates next is a key point to watch in the coming week.
More Russia blocking analysis 👉 Russia VPN Censorship 2026: Complete Blocking List
Something Lighter
Moscow Metro Was Free This Week (Because the Card Readers Broke)
This is the week's most darkly humorous story.
As a chain reaction from the banking payment system collapse, electronic payment gates at some Moscow Metro stations malfunctioned on April 16, unable to process bank cards or mobile payments. To avoid massive commuter chaos, Moscow's transportation authority temporarily opened the gates, allowing passengers to ride for free.
Russian social media erupted in mockery: "Thanks, RKN, for the free metro ride."
It wasn't just the metro. Moscow Zoo also experienced electronic payment failures and temporarily switched to cash-only admission. Someone photographed the handwritten sign at the zoo entrance, captioned: "Welcome back to 1995."
These small incidents seem funny, but they reflect a serious reality: in a highly digitalized modern society, the chain reactions from internet censorship are unpredictable. The people who decided to block VPNs probably never imagined their decision would let Muscovites ride the metro for free.
Tech Corner
VPN Detection Patent Enters Substantive Review
A development worth noting for the tech community this week: China's National Intellectual Property Administration announced that a patent application titled "Deep Learning-Based VPN Encrypted Traffic Identification Method" has entered substantive examination.
The applicant is a cybersecurity company with ties to the Ministry of Public Security. The patent describes a method using deep neural networks to identify VPN traffic within TLS tunnels. Key technical points include:
- Analyzing traffic fingerprints during TLS handshake (packet sizes, timing intervals, etc.)
- Using adversarial training to identify VPN traffic "disguised as normal HTTPS"
- Claiming over 90% identification rate for newer protocols like VLESS and Trojan
This needs to be viewed calmly: entering substantive examination doesn't mean the technology is mature or about to be deployed. There's a long road from examination to approval, and the theoretical metrics described in patents often differ dramatically from real-world deployment performance. But the signal is clear: the GFW's R&D direction is shifting from "rule matching" to "AI identification" — a trajectory that happens to align with Russia's approach.
Bypass tool developers need to start seriously considering: once AI enters traffic censorship, will current traffic disguise strategies still hold up?
This week's survival tracker (mainland China environment):
| Tool/Protocol Type |
Status |
Notes |
| TLS disguise (TCP 443) |
🟢 Normal |
Still the most stable approach; watch for May Day fluctuations |
| CDN relay solutions |
🟢 Normal |
Higher latency but stable |
| Hysteria / TUIC (QUIC) |
🔴 Unusable |
GFW blocked outbound QUIC last week; no improvement this week |
| WireGuard |
🔴 Unusable |
Fingerprint too obvious |
| OpenVPN |
🔴 Unusable |
Same |
| Commercial VPNs (ExpressVPN, etc.) |
🟡 Barely usable |
Requires frequent server switching |
| Cloudflare WARP |
🟡 Occasionally works |
Depends on region and luck |
| Shaanxi Telecom users |
⚫ Fully unusable |
Outbound traffic cut at the source |
(Quick plug time) Sunset Browser uses a TLS disguise + CDN dual-channel architecture, so even if one route gets blocked, it automatically switches. The extreme scenario of Shaanxi Telecom literally cutting the line is admittedly beyond any tool's reach, but users in the rest of the country are completely unaffected. Alright, plug over.
Worth Watching Next Week
📌 Whether the Shaanxi Telecom ban spreads to other provinces — This is the most critical indicator. If no second province follows within two weeks, it's likely just a local pilot. If one does, it's a signal of national policy.
📌 Progress on Russian bank VPN whitelist — Whether banks can quickly get VPN exemptions or get stuck in bureaucratic limbo will directly influence Russia's subsequent VPN blocking strategy.
📌 Telegram's new anti-censorship mechanism — If the new technology Durov hinted at goes live, its effectiveness will be worth watching closely.
📌 May Day tightening countdown — Less than two weeks until the May Day holiday. GFW blocking intensity is expected to continue ramping up. Prepare your backup bypass plans now.
📌 Bitchat delisting aftermath — Watch for whether more encrypted messaging apps are affected, and whether Bitchat migrates to alternative distribution channels.
Monthly Censorship Report
For more comprehensive data and analysis, check out our monthly report 👉 April 2026 Censorship Monthly Report
FAQ
Honestly, if outbound traffic has been cut entirely, traditional bypass tools are essentially useless. Options to try: switch carriers (see if China Unicom or China Mobile still has outbound access); use mobile data (if your mobile carrier hasn't blocked it yet); or wait and see — extreme measures like this may ease due to economic pressure.
Q: Will the Russian bank collapse make them ease VPN blocking?
Unlikely to fully relax in the short term, but a "tiered management" approach is probable: VPN whitelist exemptions for enterprises and financial institutions, continued blocking for individual users. This is actually the model the GFW already uses — companies with legitimate business needs can apply for cross-border access, while individuals are left to figure it out themselves.
Q: Is the VPN detection patent's 90% identification rate credible?
Data in patent filings is typically derived from ideal laboratory conditions and differs significantly from real-world deployment. In a lab with clean traffic samples, 90% isn't hard to achieve. But in real-world network environments, facing massive volumes of legitimate HTTPS traffic and constantly evolving disguise techniques, false positive rates climb dramatically. So don't panic, but keep an eye on the technology's development.
Q: Will firewall-hopping be harder during the May Day holiday?
Historical experience says yes. Every year in the 1–2 weeks before May Day and National Day, the GFW increases blocking intensity, and some edge nodes may temporarily go offline. Test your backup plans now and make sure you have at least two different bypass methods ready to go.
This is the third issue of the Weekly Censorship Digest. If you found it useful, please share it with friends who need it. See you next Friday.
Have a topic you'd like us to cover or a news tip? We'd love to hear from you in our community.
Previous issue 👉 Weekly Censorship Digest W16