Decrypt Weibo

***Click here to start decrypting censored weibos now***

Frequent Sina Weibo users will have no doubt seen this message before:

抱歉,此微博不适宜对外公开。如需帮助,请联系客服 .”

This message translates as:

“Sorry, this weibo is not suitable for the public. Please contact customer support for help.”  

“Not suitable for the public” is just an euphemism for censored. The weibo most frequently subjected to this kind of treatment focus on discussions of current and topical events.

Weibo users will see this message often when viewing their own timelines, conducting searches on Sina Weibo or when viewing someone’s profile page. The retweet of the censored weibo is however sometimes not censored. Weibo users are thus left with an intriguing comment but have no way to view the original weibo.

In an effort to solve this problem, Freeweibo.com is pleased to announce the launch of Decrypt Weibo which will make an effort to address this problem. Now, when Sina Weibo users stumble upon such messages, they can click the posted time on the lower left corner and obtain a link like http://www.weibo.com/2093591281/Ab4YMlFgS.

By copying and pasting the weibo URL on Decrypt Weibo Sina Weibo users can then decrypt the weibo and read the original censored message.

It takes a few seconds for FreeWeibo.com to decrypt the original message:


 

Sina Weibo users are used to seeing this “customer service” message and have accepted that censorship on Sina Weibo is occurring on a regular basis. Many users even developed the habit to save the disk to local computer first then retweet when seeing sensitive information. This is largely because they do not have any other recourse to view the censored information. With the launch of Decrypt Weibo, we have taken a big step forward in allowing Sina Weibo users the ability to read their timeline completely. No longer will Chinese internet users be left in the dark about what information has been censored on the country’s largest social network.

Given recent events surrounding Weibo big Vs practicing self-censorship, perhaps there will be less controversial content which needs to be censored. However, we also know that one message can make a big difference, and we are delighted to be able to provide Sina Weibo users with the ability to see this information whenever they want to.

***Click here to start decrypting censored weibos now***

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Thu, Feb 18, 2016

From the desk of Lu Wei: Apple, encryption and China

Lu Wei, Director of the Cyberspace Administration of China, offers some friendly help to FBI Director James Comey.

Thu, Sep 24, 2015

Apple blocked CNNIC CA months after MITM attacks

In March of this year, Google found unauthorized digital certificates for several Google domains. The root certificate authority for these domains was the China Internet Network Information Center (CNNIC). CNNIC was controlled by the Chinese government through the Ministry of Industry and Information Technology and is now under the management of the Cyberspace Administration of China (CAC). CNNIC was recognized by all major browsers as a trusted Certificate Authority. If CNNIC signs a fake certificate used in a man-in-the-middle attack, no browser will warn of any unusual activity unless the certificate is pinned.

Wed, Sep 23, 2015

Malicious Xcode could spread via download manager Xunlei

What’s at stake?

We reported last week that popular Chinese iOS apps were compromised in an unprecedented malware attack. We discovered that the source of the infection was compromised copies of Xcode hosted on Baidu Pan. Apple has published an article urging developers to download Xcode directly from the Mac App Store, or from the Apple Developer website and validate signatures. We’ve now discovered that even if a developer uses a download link seemingly from Apple, he might still be possible to obtain a compromised copy of Xcode.

Please note that we do not have evidence that such attacks has happened. But it is an easy attack that anyone can implement.

How does it work?

This compromise happened because of Xunlei. Xunlei is the most popular download manager in China. Much of its popularity is due to the fact they can accelerate download speeds by pulling resources from other Xunlei users as well as cached copies on the Xunlei server. All of this, however, is invisible to users. Users can simply enter a regular http download address into Xunlei  download manager and the download will start. Chinese developers were using direct download addresses such as http://adcdownload.apple.com/Developer_Tools/Xcode_7/Xcode_7.dmg to download Xcode.

Mon, Sep 21, 2015

中美互联网论坛回信

你们的公司有责任尊重人权,防止您的业务被侵犯。我们知道,中国是你们公司的一个重要市场,但恳请您在美国促进和保护人权的同时,也同样在中国致力于此。习主席的访问和美中互联网产业论坛是一个理想的机会,明确表示你的公司将会捍卫隐私权,反对成为监控同谋,将它们的强大在中国和美国一视同仁。

Sat, Sep 19, 2015

Popular Chinese iOS apps compromised in unprecedented malware attack

What happened?

According to recent reports, some versions of Xcode used by developers in China have been compromised and are being used to inject tracking codes in iOS apps without developer knowledge. (1,2). Unaware of the injection, those developers then released their compromised iOS apps to the App Store which were then later approved by Apple. At the time of writing this post, the compromised apps are still available in the App store. Any user who has installed and launched these compromised apps will be a victim of these tracking codes.

This is a significant compromise of Apple’s app store. Apple notoriously manually reviews all app submissions and, in comparison to Android stores, has been relatively malware-free. This is the most widespread and significant spread of malware in the history of the Apple app store, anywhere in the world.

The compromised version of Xcode was hosted on Baidu Pan. It is unlikely that Baidu was aware of the compromised version of Xcode. The company removed the files yesterday when news of the compromise surfaced. Because of slow download speeds from foreign websites in China, many Chinese developers prefer to download apps from domestic websites. Many Chinese also use download software like Xunlei, rather than downloading directly from the official Mac App Store.

According to users reports, many prominent Chinese apps are affected. We have included links to the compromised apps in the list below but DO NOT DOWNLOAD these apps. We are simply linking to them so that users can recognize the apps. Affected apps include:  

Wechat The most popolar messaging app in China 

Subscribe to our blog using RSS.

Comments

You really make it seem so easy with your presentation but I find this
matter to be really something that I think I would never understand.
It seems too complicated and very broad for me. I am looking forward
for your next post, I will try to get the hang of it!

Feel free to visit my web blog

inspired a lot from this post am following this blog regularly and found very good for bookmarking thanks admin
new year sms in hindi 2015
happy new year sms 2015
happy new year 2015 wallpapers
happy new year 2015 quotes
happy new year 2015
happy new year wishes 2015

this post is awesome, great msg for us, plz update ur blog for daily basis, i am regular visitor of this site, so keep posting for us,

click the below links to create backlink
best free backlink website
click here for msg movie

Hello, I savor version tҺrough yoսr article mail.
ӏ corresponding to drop a line а brief cοmment tо stick out yoս.

Also visit my website

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.