An article at http://news.bbc.co.uk/1/hi/technology/3548035.stm, talks about chinese users bypassing firewalls.

How do they do it? Any one can throw some light on to it?
Is that methodology can be used in local network?

Your help...please