New censorship on weibo

Back in October, we mentioned that weibo rolled out new semi-censorship. Apparently this is not enough. Now weibo has four different ways to censor keywords.

A. Explicit complete censorship

根据相关法律法规和政策,“[the blocked keyword]”搜索结果未予显示。

This translates into:

According to relevant laws, regulations and policies, search results for [the blocked keyword] can not be displayed.

Keyword example: 六四

Note: This is the good old way of censorship since the beginning of weibo.

B. Implicit complete censorship

抱歉,未找到“[the blocked keyword]”相关结果。

This translates into:

Sorry, no relevant results could be found for [the blocked keyword].

Keyword example: 江泽民

Note: This is a brand new form of censorship. Sina weibo used to admit what they censored. Now this message will also be shown to b keywords which actually have no results such as "dsfhadslfhadsljk".

C. Explicit semi-censorship

根据相关法律法规和政策,部分搜索结果未予显示。

This translates into:

According to relevant laws, regulations and policies, some of the search results can not be displayed.

Note: This method is employed around October as mentioned in the blog post.

D. Implicit semi-censorship

When you search for the keywords, only some selected results are returned. With a message at the button, stating

为了提供多样性结果,我们省略了部分相似微博,您可以点击查看全部搜索结果.。

This translates into:

In order to provide a diversity of results, we omitted some similar results. You could click here to view all results.

However, this message is shown to every keyword(except complete censored ones and those actually without any results). So you cannot determine the keyword is semi-censored from this message alone. When you click to view all results, sina weibo will append "&nodup=1" to the end of the search url. Now it will show the exact same message as b. Implicit complete censorship.

抱歉,未找到“[the blocked keyword]”相关结果。

This translates into:

Sorry, no relevant results could be found for [the blocked keyword].

Keyword example: 习近平

Note: This is a brand new way of censorship. It's really interesting to see how keywords are censored. For example, the censorship status of "习近平" went from a->not censored(?)->c->d->c. As I started to write this post, it was d, as I used web-archive to record it. When I'm writing this sentence 28 minutes later, however, it switched back to c. Another keyword "江泽民" went from a->b->a->b and stays at b. Our system could now detect censorship a, b(false positive of "dsfhadslfhadsljk" is inevitable), c. We might update our system to detect d if more keywords are censored this way in a prolonged time. Last but not least, this is merely censorship of searching on weibo. Much emphasis is also put on preventing users from posting sensitive weibo. Some keywords couldn't be posted on weibo in the first place, others will trigger a manual review by censors. Unfortunately, we haven't monitored that kind of censorship yet. But you could visit https://freeweibo.com/en to view recently censored posts on weibo.

Update: Now Sina has the 5th way of censoring keywords-7 day delay, please read Sina Weibo Enacts New "7 Day Delay" Function for Sensitive Terms Following 18th Party Congress for detail.

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Sat, Apr 04, 2015

CNNIC censors news about their own statement

On April 1, 2015 Google announced that they will no longer recognize the CNNIC Root and EV (extensive validation) certificate authorities (CAs).

On April 2, 2015 Mozilla concluded that CNNIC’s behaviour in issuing an unconstrained intermediate certificate to another company was ‘egregious practice’ and that Mozilla products would no longer trust any certificate issued by CNNIC’s roots. Mozilla also published a more detailed report about their actions.

After unauthorized digital certificates for several Google domains were exposed by Google and Mozilla on March 23, 2015, CNNIC censored any mention of these posts. CNNIC is not only a certificate authority, they are also China’s online censorship apparatus. CNNIC was, is and will continue to practice internet censorship.

 

News about the April 1 and 2 annoucements has again been censored on social media and also on traditional media in China.

Below is a screenshot of Weibo posts about these announcements.

 

Tue, Mar 31, 2015

Chinese authorities compromise millions in cyberattacks

The Great Firewall has switched from being a passive, inbound filter to being an active and aggressive outbound one. This is a frightening development and the implications of this action extend beyond control of information on the internet. In one quick movement, the authorities have shifted from enforcing strict censorship in China to enforcing Chinese censorship on internet users worldwide.

Fri, Mar 27, 2015

CNNIC censored Google and Mozilla’s posts about CNNIC CA

This week, Google found unauthorized digital certificates for several Google domains, the root CA of which is CNNIC. Google and Mozilla both publicly disclosed this security incident and published blog posts(Google, Mozilla). However, Chinese translations of Google’s and Mozilla's blog posts were censored on the Chinese Internet.

  • William Long is a prominent Chinese blogger on IT and tech. He translated Google’s security post without adding any personal opinions. The Chinese blogpost ranked #1 when searching CNNIC MITM in Chinese on Google and Baidu. He tweeted that he received a phone call from propaganda department demanding the post to be removed immediately. The post http://www.williamlong.info/archives/4183.html was deleted. Google cache is still available.

Wed, Mar 25, 2015

Evidence shows CNNIC and CAC behind MITM attacks

Since 2013, we have repeatedly called on major software vendors to revoke CNNIC-issued certificates. Most notably, we raised this issue when we reported on the Cyberspace Administration of China’s (CAC) man-in-the-middle (MITM) attacks on Google, Microsoft’s Outlook, Apple, Yahoo and Github. Mainstream media have reported about these security vulnerabilities before and on March 24, Ars Technica reported on Google’s announcement that they have definitive evidence that CNNIC (China Internet Network Information Center) was behind a new MITM attack on Google.

From our October, 2014 blog post:

Thu, Mar 19, 2015

We are under attack

We are under attack and we need help.

Likely in response to a recent story in the Wall Street Journal (WSJ), we’ve experienced our first ever distributed denial of service (DDoS) attack. This tactic is used to bring down web pages by flooding them with lots of requests - at the time of writing they number 2.6 billion requests per hour. Websites are not equipped to handle that kind of volume so they usually “break” and go offline.

This kind of attack is aggressive and is an exhibition of censorship by brute force. Attackers resort to tactics like this when they are left with no other options.

We are not equipped to handle a DDoS attack of this magnitude and we need help. Some background:

  • The attack started on March 17 and we are receiving up to 2.6 billion requests per hour which is about 2500 times more than normal levels.

Subscribe to our blog using RSS.

Comments

just dropping by to say hey

yeah really good info from this site .. Loved a lot thank you
happy rose day sms
happy Chocolate day sms
Happy Valentines Day status
happy kiss day sms

this post is awesome, great msg for us, plz update ur blog for daily basis, i am regular visitor of this site, so keep posting for us,

click the below links to create backlink
best free backlink website
click here for msg movie

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.