Baidu's New Censorship Policies for Leaders' Names After the 18th Party Congress

Prior to November 2012, Baidu's practice was to restrict all queries containing the name of a member of

Searches on Oct. 27, 2012 for PBSC members' names on
Baidu restricted to Sina.com.cn return no results.

the Politburo Standing Committee of the Communist Party of China ("PBSC") to a strict white list of about a dozen websites controlled by the central government and the Communist Party:

State Run News Outlets
The China Daily (chinadaily.com.cn)
The Economic Daily (www.ce.cn)
The People's Daily (people.com.cn)
The Guang Ming Daily (gmw.cn)
Xinhua (xinhuanet.com)
China News Service (chinanews.com.cn) 
State Run Broadcasters
China Radio International (cri.cn)
China Central Television (cctv.com and cntv.com) 
Government Agencies
Communist Party Youth League (youth.cn)
Central Government (gov.cn)
State Council Information Office (china.com.cn)
State Council Taiwan Affairs Office(chinataiwan.org)

In early 2012 Baidu also began including its own "Baike" Wikipedia clone in its strict white list - https://plus.google.com/u/0/106378980111121757454/posts/K6wRmyDbJEV.

In the weeks surrounding the 18th Party Congress, which convened from November 8 - 15, Baidu began tweaking its censorship of the names of current and future PBSC members' names, in some cases relaxing its censorship of those names and returning search results from its broad white list, which includes large China-based news and portal websites such as Sina, Sohu, and Tencent. See: http://blog.feichangdao.com/2012/11/as-politburo-standing-committee.html

One month after the conclusion of the 18th Party Congress, Baidu appears to have settled on the following censorship policies for the names of senior government leaders:

  • Search results for queries containing only a member's name in Chinese are restricted to the strict white list.
  • Searches for member's names on Baidu's Tieba, Zhidao, and Wenku products return no results.
  • Search results for queries containing a member's name in Chinese plus a sensitive term are either restricted to the strict white list or censored completely.
  • New Search results for queries containing a member's name in Chinese plus a non-sensitive term are restricted to the broad white list.

Some examples:

These screenshots show that searches for "Hu Jintao" in 2009 and 2012 only returned results from Baidu's strict white list.


These screenshots show that a search for "Egypt Hu Jintao" in February 2011 only returned results from Baidu's strict white list. The same search in December 2012 returned results from Baidu's broad white list.


These screenshots, taken in December 2012, show that a search for "Egypt Hu Jintao site:sina.com.cn" returns tens of thousands of search results, while a search for "Namibia Hu Jintao site:sina.com.cn" returns no results, only a censorship notice.

These screenshots, also taken in December 2012, show that a search for "Xi Jinping" only returns results from Baidu's strict white list, but a search for "Xi Jinping Reform" returns results from Baidu's broad white list.

But these screenshots show that, while Baidu returned over a million results for a search for "Xi Jinping" restricted to the China-based Sina.com.cn, the same search on the Hong Kong-based Sina.com returned no results, just a censorship notice.


Finally, these screenshots, also taken in December 2012, show that a search for "Xi Jinping" on Baidu's Tieba, Zhidao, and Wenku products still returns no results.

From http://blog.feichangdao.com/2012/12/baidus-new-censorship-policies-for.html

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Tue, Jul 05, 2016

GreatFire.org now testing VPN speed and stability in China

There is a commonly held belief in China that if you have a VPN that works then you should keep quiet about it. In terms of freedom of access to information, the problem with this approach is that access to knowledge suddenly is a secret. Today we are launching a project that we hope will destroy that model.

Our newest website, Circumvention Central (CC), aims to provide real-time information and data about circumvention solutions that work in China. Since 2011, we have been collecting data about blocked websites in China and now we will add data about the effectiveness of VPNs and other circumvention tools.

We are launching CC with four main objectives in mind.

Our first objective is to help to grow the number of Chinese who circumvent censorship restrictions in China. By sharing our information and data about these tools, we hope to show a wider audience which circumvention tools are working.

Our second objective is to improve the circumvention experience for users in China by bringing transparency to tool performance. We will measure these tools on speed (how quickly popular websites are loaded) and on stability (the extent to which popular websites load successfully).

Sat, May 07, 2016

The New York Times vs. The Chinese Authorities

Could the New York Times be setting the best path forward for news organizations in China?

Thu, Feb 18, 2016

From the desk of Lu Wei: Apple, encryption and China

Lu Wei, Director of the Cyberspace Administration of China, offers some friendly help to FBI Director James Comey.

Thu, Sep 24, 2015

Apple blocked CNNIC CA months after MITM attacks

In March of this year, Google found unauthorized digital certificates for several Google domains. The root certificate authority for these domains was the China Internet Network Information Center (CNNIC). CNNIC was controlled by the Chinese government through the Ministry of Industry and Information Technology and is now under the management of the Cyberspace Administration of China (CAC). CNNIC was recognized by all major browsers as a trusted Certificate Authority. If CNNIC signs a fake certificate used in a man-in-the-middle attack, no browser will warn of any unusual activity unless the certificate is pinned.

After Google found these unauthorized certificates, both Google and Firefox revoked its trust in CNNIC a few days later, a development we at GreatFire.org have adovacting for since 2013. Apple and Microsoft on the other hand, did not revoke their trust in CNNIC, nor did they make any announcements regarding the security compromise.

Wed, Sep 23, 2015

Malicious Xcode could spread via download manager Xunlei

What’s at stake?

We reported last week that popular Chinese iOS apps were compromised in an unprecedented malware attack. We discovered that the source of the infection was compromised copies of Xcode hosted on Baidu Pan. Apple has published an article urging developers to download Xcode directly from the Mac App Store, or from the Apple Developer website and validate signatures. We’ve now discovered that even if a developer uses a download link seemingly from Apple, he might still be possible to obtain a compromised copy of Xcode.

Please note that we do not have evidence that such attacks has happened. But it is an easy attack that anyone can implement.

How does it work?

This compromise happened because of Xunlei. Xunlei is the most popular download manager in China. Much of its popularity is due to the fact they can accelerate download speeds by pulling resources from other Xunlei users as well as cached copies on the Xunlei server. All of this, however, is invisible to users. Users can simply enter a regular http download address into Xunlei  download manager and the download will start. Chinese developers were using direct download addresses such as http://adcdownload.apple.com/Developer_Tools/Xcode_7/Xcode_7.dmg to download Xcode.

Subscribe to our blog using RSS.

Comments

this post is awesome, great msg for us, plz update ur blog for daily basis, i am regular visitor of this site, so keep posting for us,

click the below links to create backlink
best free backlink website
click here for msg movie

Know your limits as well as do not pass them even by a little margin. When you let yourself go, it is a slippery slope. Specify your boundaries as well as stay with them whatever. Binary Reserve

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.