Jeffrey Knockel

Articles

FAQ: A comparison of search censorship in China

We discovered over 60,000 unique censorship rules used to partially or totally censor search results across eight China-accessible search platforms analyzed. These findings call into question the ability of non-Chinese technology companies to better resist censorship demands than their Chinese counterparts.

Missing Links: A comparison of search censorship in China

We discovered over 60,000 unique censorship rules used to partially or totally censor search results across eight China-accessible search platforms analyzed. These findings call into question the ability of non-Chinese technology companies to better resist censorship demands than their Chinese counterparts.

微軟必應自動建議在北美審查與中國政治相關的關鍵詞

本報告研究微軟必應自動建議功能(autosuggestion)針對人名的審查。我們發現,除了審查與色情相關的人名,第二大被微軟必應審查的人名類別是與中國領導人,異議人士相關以及其他在中國被認為是政治敏感的人名。

微软必应自动建议在北美审查与中国政治相关的关键词

本报告研究微软必应自动建议功能(autosuggestion)针对人名的审查。我们发现,除了审查与色情相关的人名,第二大被微软必应审查的人名类别是与中国领导人,异议人士相关以及其他在中国被认为是政治敏感的人名。

Engrave Condition: Apple’s Political Censorship Leaves Taiwan, Remains in Hong Kong

Since our report in August 2021, we find that Apple has eliminated their Chinese political censorship in Taiwan. However, Apple continues to perform broad, keyword-based political censorship outside of mainland China in Hong Kong, despite human rights groups’ recommendations for American companies to resist blocking content.

「冬奧通」安全分析

「冬奧通」是2022年北京奧運會官方規定與會者必須安裝的一個手機軟件。本研究指出「冬奧通」有一個簡單但後果嚴重的安全漏洞,即其用于加密用戶語音音頻和文件傳輸的加密技術可以輕易被繞過。健康申報表等傳輸詳細護照等個人資料,個人健康信息以及旅遊史等也存在安全漏洞。服務器響應也可以被欺騙,允許攻擊者向用戶顯示虛假指令。

Cross-Country Exposure: Analysis of the MY2022 Olympics App

MY2022, an app mandated for use by all attendees of the 2022 Olympic Games in Beijing, has a simple but devastating flaw where encryption protecting users’ voice audio and file transfers can be trivially sidestepped. Health customs forms which transmit passport details, demographic information, and medical and travel history are also vulnerable. Server responses can also be spoofed, allowing an attacker to display fake instructions to users.