Articles On: WeChat, Censorship, Smartphones and PCs

Sunday, August 30, 2020

WeChat Is a Trap for China’s Diaspora: App’s Dominance Forces People to Adopt Self-Censorship
by Yaqiu Wang
via Human Rights Watch on August 14, 2020


Censored Contagion II: A Timeline of Information Control on Chinese Social Media During COVID-19
by Masashi Crete-Nishihata, Jakub Dalek, Jeffrey Knockel, Nicola Lawford, Caroline Wesley, and Mari Zhou
via Citizen Lab on August 25, 2020


Chinese-Made Smartphones Are Secretly Stealing Money From People Around The World
by Craig Silverman
via BuzzFeed News on August 24, 2020


Canada has effectively moved to block China's Huawei from 5G, but can't say so 
by David Ljunggren
via Reuters on August 25, 2020


Censorship in China: UK embassy’s rebuttals to state media accusations erased from WeChat
by David Bandurski
via Hong Kong Free Press on June 25, 2020


WeChat Surveillance Explained
by Miles Kenyon
via Citizen Lab on May 7, 2020


We Chat, They Watch: How International Users Unwittingly Build up WeChat’s Chinese Censorship Apparatus
by Jeffrey Knockel, Christopher Parsons, Lotus Ruan, Ruohan Xiong, Jedidiah Crandall, and Ron Deibert
via Citizen Lab on May 7, 2020


(Can’t) Picture This 2: An Analysis of WeChat’s Realtime Image Filtering in Chats
by Jeffrey Knockel and Ruohan Xiong
via Citizen Lab on July 15, 2020


How WeChat censors private conversations, automatically in real time
by Patrick Howell O’Neill
via MIT Technology Review on July 15, 2019


We (can’t) Chat: “709 Crackdown” Discussions Blocked on Weibo and WeChat
by Lotus Ruan, Jeffrey Knockel, and Masashi Crete-Nichihata
via Citizen Lab on April 13, 2017


One App, Two Systems: How WeChat uses one censorship policy in China and another internationally
by Lotus Ruan, Jeffrey Knockel, Jason Q. Ng, and Masashi Crete-Nishihata
via Citizen Lab on November 30, 2016


Lenovo reportedly banned by MI6, CIA, and other spy agencies over fear of Chinese hacking
by Adi Robertson
via The Verge on July 30, 2013


Has PC maker Lenovo committed the ultimate breach of customer security?
by Michael Hiltzik
via Los Angeles Times on February 24, 2015