← Back to Library

How to buy cheap Claude tokens in China

Jordan Schneider exposes a startling reality: the most sophisticated AI safety barriers erected by American firms are being dismantled not by state-sponsored hackers, but by a sprawling, low-cost grey market operating in plain sight. While Washington fixates on "industrial-scale" espionage, the actual mechanism is a decentralized economy of "transfer stations" selling access to frontier models for a fraction of the price, turning AI governance into a game of whack-a-mole that the defenders are losing.

The Illusion of the Border

Schneider's central thesis dismantles the official narrative that access controls are working. He points out that despite the White House and Anthropic claiming to have closed the door, Chinese developers are not just sneaking in; they are thriving on a parallel infrastructure. "Regardless of whether Chinese labs rely on distillation to 'catch up', both documents misread the proxy economy they're describing," Schneider writes. This reframing is crucial. It shifts the focus from a geopolitical cat-and-mouse game to a fundamental market failure where demand for advanced intelligence simply bypasses regulatory friction.

How to buy cheap Claude tokens in China

The author illustrates the absurdity of the current situation by noting that Singapore, a city-state smaller than New York, has become the global per capita leader in Claude usage. "We are all Singaporean from time to time," he quotes the Chinese developer community, highlighting how users are self-assigning nationalities to game the system. This isn't a stealth operation; it's a public joke. The argument lands because it exposes the hollowness of geoblocking when the economic incentive to bypass it is so high. Critics might argue that this is merely a temporary workaround, but Schneider correctly identifies that the infrastructure is too modular and resilient to be easily killed.

The transfer station economy exposes blind spots in AI safety frameworks designed to prevent harms that extend beyond the US-China rivalry.

The Mechanics of Evasion

The piece shines when it details the "supply chain" of evasion, revealing a complex ecosystem that mirrors legitimate business structures but operates in the shadows. Schneider describes these "transfer stations" (or zhuanzhuanzhan) as servers that sit between the user and the provider, accepting requests in Chinese currency and forwarding them as if they originated from a legitimate overseas account. "The magic lies in 'transfer stations'," he notes, explaining how they bypass the need for foreign credit cards or VPNs.

This section draws a parallel to the historical context of the "Scapa Flow" deep dive, where naval blockades were circumvented by neutral ports; here, the "neutral ports" are the proxy servers and the "ships" are data packets. The author details how upstream providers use everything from bulk-registered accounts to "deepfake tools" that create digital clones to pass biometric checks. "Even if the defender can successfully detect AI faking humans, a more labour-intensive method exists to find real humans," Schneider observes, describing agents recruiting individuals in lower-income countries to complete verifications. This human element adds a layer of grim reality to the technical discussion, showing that AI safety is now inextricably linked to global labor markets and human trafficking risks.

The Three Meals: How the Model Gets Cheaper

Perhaps the most chilling insight comes from Schneider's breakdown of how these proxies achieve prices as low as 10% of the official cost. He calls this "one fish, three meals," a metaphor for extracting maximum value from a single stolen or compromised account. The first "meal" is the markup on access, achieved through arbitrage and the use of fraudulent credit cards. The second is "model swapping," where a user paying for a premium model like Opus might actually be receiving a cheaper, inferior version without knowing it. "A user selects Opus 4.7, but the proxy can silently route to Sonnet, Haiku, or, in the worst case, GLM or Qwen," he writes. This is a massive risk for enterprises relying on these models for critical tasks.

The third and most dangerous "meal" is data harvesting. "Every request that passes through a proxy — full prompt, full response, tool calls, iterations — is sitting on the proxy operator's server," Schneider warns. This turns the grey market into a massive data extraction engine, feeding logs into the training sets of Chinese models. This connects directly to the "Knowledge distillation" background, where the goal is to capture the reasoning patterns of a larger model to train a smaller one. The author suggests that the logs from these proxies are the raw material for the very distillation attacks the White House fears, but the mechanism is far more organic and widespread than a single coordinated campaign.

Critics might note that the prevalence of "model swapping" and fraud suggests that the official API market is already unstable, and that the grey market is merely a symptom of pricing inefficiencies rather than a security threat. However, Schneider's evidence of data harvesting and the use of stolen identities suggests the risks go far beyond simple price gouging.

The logs they generate may have become a commodity, traded for purposes ranging from model training to targeted fraud.

Bottom Line

Schneider's most compelling argument is that the "transfer station" economy has evolved from a niche workaround into a resilient, modular industry that renders traditional access controls obsolete. The piece's greatest strength is its refusal to treat this as a simple security breach, instead framing it as a systemic failure of AI governance that prioritizes border enforcement over the reality of global digital commerce. The biggest vulnerability in the current approach is the assumption that biometric checks and geoblocking can stop a market driven by such deep economic incentives; as Schneider shows, the market has already found a way to eat the fish three times over.

Deep Dives

Explore these related deep dives:

  • Knowledge distillation

    The article argues that US intelligence agencies misinterpret the 'industrial-scale' extraction of model weights as a strategic catch-up effort, when it is actually a byproduct of a broader consumer grey market for cheap inference.

  • Scapa Flow

    This technical concept explains the specific infrastructure the article describes as a direct countermeasure to biometric KYC checks, revealing how safety frameworks inadvertently fuel criminal operations harvesting real people's identities.

  • Taobao

    The article identifies this specific e-commerce platform as a primary venue for the 'transfer station' economy, illustrating how legitimate Chinese digital marketplaces have been repurposed to host the infrastructure for bypassing American AI geo-blocking.

Sources

How to buy cheap Claude tokens in China

by Jordan Schneider · ChinaTalk · Read full article

Zilan Qian is a research associate (research) at the Oxford China Policy Lab and holds a Master’s degree in Social Science of the Internet from the University of Oxford.

On April 23, 2026, the White House released a memo warning that Chinese entities were running “industrial-scale” distillation campaigns against American frontier AI models, leveraging “tens of thousands of proxy accounts” to evade detection. In February 2026, Anthropic similarly reported on Chinese labs’ coordinated distillation attacks using “a single proxy network managed more than 20,000 fraudulent accounts”. Both cases see “proxy” — the middlemen between model users and model providers — as a purposeful design by a selective Chinese frontier labs to systematically extract US AI models.

Regardless of whether Chinese labs rely on distillation to “catch up”, both documents misread the proxy economy they’re describing. Underneath the handful of labs sits a much larger market, one that has been operating in public on GitHub, Taobao, Twitter, and Telegram. It is a grey economy of API proxies (commonly called “transfer stations,” 中转站) that lets Chinese developers access Anthropic’s models at as low as 10% of the official price. The participants extend far beyond selective experienced AI researchers, and the motivations are much broader than building a frontier model to catch up. Everyone who wants to use more advanced AI models or tools, be they university professors and students, tech workers, individual developers, or hobbyists, uses API proxies.1 The logs they generate may have become a commodity, traded for purposes ranging from model training to targeted fraud.

Meanwhile, every layer of control frontier US AI companies have added (geoblocking, phone verification, credit card requirements, and now live biometric KYC checks) has produced a corresponding layer of evasion infrastructure. These new SMS farms and biometric harvesting operations have implications that extend beyond geopolitics into how frontier AI safety frameworks are designed.

Building on my 2025 ChinaTalk piece on accessing banned American models in China, this update zooms in on the transfer station economy specifically: how it is structured, how it monetizes, and what it reveals about the limits of access blocking and account monitoring as AI governance tools. Unlike 2025’s grey market, however, the 2026 story does not stop at the border between Chinese users and American AI model providers. The transfer station economy exposes blind spots in AI safety frameworks designed to prevent harms that extend beyond the US-China rivalry, from misuse ...