Keyword Censorship in Chinese Mobile Games
In a recent paper presented at FOCI, Citizen Lab researchers investigate the nature of keyword filtering in Chinese mobile games, supporting a decentralized framework of censorship.
In a recent paper presented at FOCI, Citizen Lab researchers investigate the nature of keyword filtering in Chinese mobile games, supporting a decentralized framework of censorship.
加拿大多伦多大学公民实验室(Citizen Lab)研究了微信和微博针对刘晓波逝世的信息审查,初步分析显示,在刘晓波去世後审查力度大幅增加,以至于任何对刘晓波的讨论乃至简单提及也不被允许.
WeChat and Sina Weibo adapted and evolved their censorship efforts in response to the death of Liu Xiaobo.
本报告属于多伦多大学蒙克全球事物学院公民实验室对微信和新浪微博信息审查的研究系列。通过一系列测试,研究者发现了在这两个平台上被审查过滤的与“709追捕”相关的关键词和图片。与公民实验室过去的研究结果相同,审查以不透明的形式进行。
This report analyzes the information control practices related to a national crackdown on Chinese rights lawyers and activists on two leading Chinese social media networks. We document the Search filtering on Weibo, China’s Twitter-like service, as well as keyword and image censorship on WeChat, the most popular chat app in China.
From January 2 to 13 2017, His Holiness the Dalai Lama is holding a popular Tibetan Buddhist teaching called Kalachakra in Bodh Gaya, India. Increased restrictions from the government of China has barred Tibetans in Tibet from attending the teachings. This report documents blocking of Kalachakra-related keywords on WeChat revealing how restrictions on the ritual extend online.
多伦多大学公民实验室的最新报告揭露了微信平台的审查机制。微信是中国腾讯控股有限公司旗下的即时通讯应用,目前是中国最受欢迎的聊天软件之一,也是全球排名第四的最流行聊天软件
In this report we provide the first systematic study of keyword and website censorship on WeChat, the most popular chat app in China
In this report, we reverse engineer three popular live streaming platforms (YY, Sina Show, and 9158) and find keyword lists used to censor chat messages. Tracking changes to the keyword lists over the past year gives an inside look into how these applications implement censorship
In this report we analyze Windows and Android versions of web browser UC Browser, and find they transmitted personally identifiable information with easily decryptable encryption and were vulnerable to arbitrary code execution during software updates