10.1145/3473604.3474560acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Open Access

Measuring QQMail's automated email censorship in China

Published:27 August 2021

ABSTRACT

Desiring to control political ideas shared within its borders, China fosters its own domestic Internet communications platforms where it can better enforce its laws and more tightly control political expression. Access to foreign platforms failing to comply with China's requirements on speech restrictions are often wholesale blocked by the country's national firewall. However, some technologies, such as the Web and email, are too universal to wholesale block and are restricted discriminately. While China's restrictions to Web access have been extensively studied, our work provides a look into email censorship in China.

In this work, we study censorship on Tencent's QQMail, the most popular email platform in China. We introduce a technique to test whether QQMail automatically censors a message, without requiring control of any Internet endpoints in China or any accounts on the QQMail platform, finding 173 combinations of keywords that trigger automated censorship of multiple political topics. We also discover that some censored keyword combinations have extenuating keyword combinations, any of whose presence disables the corresponding censored combination's censorship. Many of these extenuating terms are as politically sensitive as the censored combinations they are extenuating. We find that the motivation behind such extenuating terms is puzzling, defying easy explanation.

References

  1. Anonymous. 2014. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. USENIX Workshop on Free and Open Communications on the Internet (2014). https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdfGoogle ScholarGoogle Scholar
  2. Miguel Araujo. 2017. What is QQ Mail and what is it for? Available at https://www.qqmail.info/what-is-qq-mail-and-what-is-it-for.html. (2017).Google ScholarGoogle Scholar
  3. Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, and Dave Levin. 2020. Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion. In Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 586--598.Google ScholarGoogle Scholar
  4. Carolyn Clancy. 2020. Country overview: China. Available at https://help.returnpath.com/hc/en-us/articles/220562707-Country-overview-China-. (2020).Google ScholarGoogle Scholar
  5. Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman. 2013. Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18, 7 (6 2013). http://firstmonday.org/ojs/index.php/fm/article/view/4628/3727Google ScholarGoogle Scholar
  6. Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, and Ric East. 2007. ConceptDoppler: A weather tracker for Internet censorship. In 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov 2, 2007. 1--18.Google ScholarGoogle Scholar
  7. James Doubek. 2018. China Removes Presidential Term Limits, Enabling Xi Jinping To Rule Indefinitely. (3 2018).Google ScholarGoogle Scholar
  8. Barney Glaser and Anselm Strauss. 2006. The Discovery of Grounded Theory: Strategies for Qualitative Research. INternational and Pan-American Copyright Conventions, New Jersey.Google ScholarGoogle Scholar
  9. Google. [n. d.]. Create task-specific email addresses. Available at https://support.google.com/a/users/answer/9308648?hl=en. ([n. d.]).Google ScholarGoogle Scholar
  10. Seth Hardy. 2013. Asia Chats: Investigating Regionally-based Keyword Censorship in LINE. Technical Report. Citizen Lab, University of Toronto. https://citizenlab.ca/2013/11/asia-chats-investigating-regionally-based-keyword-censorship-line/Google ScholarGoogle Scholar
  11. Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis. 2021. How Great is the Great Firewall? Measuring China's DNS Censorship. (2021). arXiv:cs.CR/2106.02167Google ScholarGoogle Scholar
  12. Gary King, Jennifer Pan, and Margaret Roberts. 2013. How Censorship in China Allows Government Criticism but Silences Collective Expression. American Political Science Review 107, 2 (2013), 326--343.Google ScholarGoogle ScholarCross RefCross Ref
  13. Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, and Jedidiah R. Crandall. 2015. Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China. In 5th USENIX Workshop on Free and Open Communications on the Internet.Google ScholarGoogle Scholar
  14. Jeffrey Knockel, Masashi Crete-Nishihata, and Lotus Ruan. 2018. The effect of information controls on developers in China: An analysis of censorship in Chinese open source projects. In First Workshop on NLP for Internet Freedom. https://www.aclweb.org/anthology/W18-4201Google ScholarGoogle Scholar
  15. Jeffrey Knockel, Lotus Ruan, and Masashi Crete-Nishihata. 2017. Measuring Decentralization of Chinese Keyword Censorship via Mobile Games. In 7th USENIX Workshop on Free and Open Communications on the Internet. https://www.usenix.org/conference/foci17/workshop-program/presentation/knockelGoogle ScholarGoogle Scholar
  16. Rebecca MacKinnon. 2009. China's Censorship 2.0: How companies censor bloggers. First Monday 14, 2 (2009). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2378/2089Google ScholarGoogle Scholar
  17. Blake Miller. 2019. The Limits of Commercialized Censorship in China. (2019). https://doi.org/10.31235/osf.io/wn7prGoogle ScholarGoogle Scholar
  18. Bei Qin, David Strömberg, and Yanhui Wu. 2017. Why Does China Allow Freer Social Media? Protests versus Surveillance and Propaganda. Journal of Economic Perspectives 31, 1 (2017), 117--140.Google ScholarGoogle ScholarCross RefCross Ref
  19. R Rambert, Z Weinberg, D Barradas, and N Christin. 2021. Chinese wall or Swiss cheese? Keyword filtering in the Great Firewall of China. In Proceedings of the 30th Web Conference (WWW'21). Ljubljana, Slovenia (online).Google ScholarGoogle Scholar
  20. Lotus Ruan, Jeffrey Knockel, Jason Q. Ng, and Masashi Crete-Nishihata. 2016. One App, Two Systems: How WeChat uses one censorship policy in China and another internationally. Technical Report. Citizen Lab, University of Toronto. https://citizenlab.ca/2016/11/wechat-china-censorship-one-app-two-systems/Google ScholarGoogle Scholar
  21. Taiyi Sun and Quansheng Zhao. 2021. Delegated Censorship: The Dynamic, Layered, and Multistage Information Control Regime in China. Politics & Society (2021), 00323292211013181.Google ScholarGoogle Scholar
  22. Tokachu. 2006. The Not-So-Great Firewall of China. 2600 23, 4 (2006), 58--60.Google ScholarGoogle Scholar
  23. United Nations. 2011. EASTERN TURKISTAN ISLAMIC MOVEMENT. Technical Report.Google ScholarGoogle Scholar
  24. United States Department of State and the Broadcasting Board of Governors Office of Inspector General. 2010. Report of Inspection: Voice of America's Chinese Branch. Available at https://www.stateoig.gov/system/files/145823.pdf. (2010).Google ScholarGoogle Scholar
  25. Ruohan Xiong and Jeffrey Knockel. 2019. An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message. In 9th USENIX Workshop on Free and Open Communications on the Internet. Santa Clara.Google ScholarGoogle Scholar
  26. Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R Crandall, and Dan S Wallach. 2013. The Velocity of Censorship: High-fidelity Detection of Microblog Post Deletions. In Proceedings of the 22nd USENIX Conference on Security. 227--240.Google ScholarGoogle Scholar
  27. 国家互联网应急中心. 2003. 中国互联网反垃圾邮件的现状. (9 2003). https://www.cert.org.cn/publish/main/49/2012/20120330182937909855444/20120330182937909855444_.htmlGoogle ScholarGoogle Scholar
  28. 秦兝. 2015. 详述GFW对SMTP协议的三种封锁手法. Available at https://fqrouter.tumblr.com/post/43400982633/gfwsmtp. (2015).Google ScholarGoogle Scholar

Index Terms

  1. Measuring QQMail's automated email censorship in China

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        ACM Conferences cover image
        FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet
        August 2021
        59 pages
        ISBN:9781450386401
        DOI:10.1145/3473604

        Copyright © 2021 Owner/Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 August 2021
        • Online: 23 August 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)191
        • Downloads (Last 6 weeks)88

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!