{"id":42399,"date":"2021-08-19T01:04:54","date_gmt":"2021-08-19T01:04:54","guid":{"rendered":"http:\/\/b3398783-283c-4458-91f4-2a7d5f526d3c"},"modified":"2021-08-19T01:04:54","modified_gmt":"2021-08-19T01:04:54","slug":"citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/","title":{"rendered":"Citizen Lab finds Apple&#8217;s China censorship process bleeds into Hong Kong and Taiwan"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/08\/19\/54d290a0-f95e-4afe-8f1d-2c86d4a3a28b\/resize\/1200xauto\/8479006b9f2b0f3faf981f1e32df9abe\/apple-engravings.png\" class alt=\"apple-engravings.png\" height=\"auto\" width=\"1200\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Citizen Lab <\/span><\/figcaption><\/figure>\n<p>Apple&#8217;s application of filters for blocking content in China has seeped into how it operates in Hong Kong and Taiwan, according to Citizen Lab researchers.<\/p>\n<p>According to <a href=\"https:\/\/citizenlab.ca\/2021\/08\/engrave-danger-an-analysis-of-apple-engraving-censorship-across-six-regions\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">research<\/a> performed by Citizen Lab, Apple&#8217;s application of filters, which pertain to derogatory, racist, sexual, and sometimes political content, censor more than what is required by a certain region&#8217;s moderation regulations. <\/p>\n<p>The research looked at keyword filtering rules used by Apple to moderate content across China, Hong Kong, Taiwan, Japan, Canada, and the United States. <\/p>\n<p>While the six jurisdictions each have different regulatory and political environments that may affect Apple&#8217;s filtering decisions and content moderation policies, Citizen Lab found the censorship applied within China also bled into both Hong Kong and Taiwan, with much of this censorship exceeding Apple&#8217;s legal obligations.<\/p>\n<p>In Taiwan, Apple does not have any legal obligation to perform political censorship, but it still blocks engravings related to the Chinese Communist Party, China&#8217;s state organs, and political-religious groups like Falun Gong.<\/p>\n<p>Meanwhile, in Hong Kong, Apple broadly censors references to collective action, such as the Umbrella Revolution, Hong Kong Democratic Movement, double universal suffrage, and freedom of the press.<\/p>\n<p>Although the <a href=\"https:\/\/www.bbc.com\/news\/world-asia-china-52765838\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">National Security Law took effect<\/a> in Hong Kong last year, which can potentially be used to mandate entities and individuals to remove political content, freedom of expression is legally protected in the region under the city&#8217;s Basic Law and the Bill of Rights.<\/p>\n<section class=\"sharethrough-top placeholder\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Beyond Apple double-dipping China&#8217;s filtering practices in Hong Kong and Taiwan, the iPhone maker at times also made arbitrary blocks. In one case, Citizen Lab said Apple censored ten Chinese names surnamed Zhang with generally unclear significance, although it said the names were also on a list used to censor products from a Chinese company.<\/p>\n<p>&#8220;Apple does not fully understand what content they censor and that, rather than each censored keyword being born of careful consideration, many seem to have been thoughtlessly reappropriated from other sources,&#8221; Citizen Lab claimed.<\/p>\n<p>&#8220;Apple&#8217;s seemingly thoughtlessly and inconsistently curated keyword lists highlight the ongoing debates of companies&#8217; content regulation models. Companies, especially those operating globally, have great impacts on both users of their products and non-users who may be indirectly affected by their products.&#8221;<\/p>\n<p>In the research, Citizen Lab analysed how Apple engravings for keywords are filtered across the six different regions. For each region, Apple verifies engravings using a different API endpoint, which facilitates different filtering rules for each region. <\/p>\n<p>By testing how these different API endpoints responded to the engravings of over 505,000 previously discovered keywords that are censored in various Chinese applications, including WeChat, Citizen Lab discovered the largest amount of blocks applied to mainland China, where Citizen Lab found 1,045 keywords filtering product engravings, followed by Hong Kong with 542, and then Taiwan with 397.<\/p>\n<p>By reviewing the filtered engravings, Citizen Lab found the Taiwan filtering rules are a strict subset of the Hong Kong filtering rules which are a strict subset of the mainland China filtering rules.<\/p>\n<p>The researchers also said Apple does not have any public-facing policy documents that explain or regulate what users can or cannot engrave on Apple products across each of the six jurisdictions.<\/p>\n<p>In light of the lack of transparency regarding how Apple moderates its content, Citizen Lab has called for the company to release a set of guidelines explaining why and how the company moderates content.<\/p>\n<p>&#8220;The need for Apple to provide transparency in how it decides what content is filtered is especially important as we discovered evidence that Apple derived their Chinese language keyword filtering lists from outside sources, whether copying from others&#8217; lists or receiving them as part of a directive,&#8221; the Canadian research group said. <\/p>\n<p>Citizen Lab previously unveiled WeChat, the popular messaging app operated by Tencent, <a href=\"https:\/\/www.zdnet.com\/article\/citizen-lab-says-non-china-registered-accounts-used-to-beef-up-wechat-censorship\/\">subjected China&#8217;s pervasive content surveillance<\/a> to accounts beyond China that were previously thought to be exclusively reserved for China-registered accounts.<\/p>\n<p>&#8220;WeChat implements censorship for users with accounts registered to mainland China phone numbers. This censorship is done without notification to users and is dynamically updated, often in response to current events,&#8221; Citizen Lab wrote in that <a href=\"https:\/\/citizenlab.ca\/2020\/05\/we-chat-they-watch\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">piece of research<\/a>.<\/p>\n<h3>Related Coverage<\/h3>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite Apple not having any legal obligation to perform political censorship in Taiwan, it has done so anyway.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42400,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-42399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Citizen Lab finds Apple&#039;s China censorship process bleeds into Hong Kong and Taiwan 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Citizen Lab finds Apple&#039;s China censorship process bleeds into Hong Kong and Taiwan 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-19T01:04:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"669\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Citizen Lab finds Apple&#8217;s China censorship process bleeds into Hong Kong and Taiwan\",\"datePublished\":\"2021-08-19T01:04:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/\",\"name\":\"Citizen Lab finds Apple's China censorship process bleeds into Hong Kong and Taiwan 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png\",\"datePublished\":\"2021-08-19T01:04:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png\",\"width\":1200,\"height\":669},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Citizen Lab finds Apple&#8217;s China censorship process bleeds into Hong Kong and Taiwan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Citizen Lab finds Apple's China censorship process bleeds into Hong Kong and Taiwan 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/","og_locale":"en_US","og_type":"article","og_title":"Citizen Lab finds Apple's China censorship process bleeds into Hong Kong and Taiwan 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-19T01:04:54+00:00","og_image":[{"width":1200,"height":669,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Citizen Lab finds Apple&#8217;s China censorship process bleeds into Hong Kong and Taiwan","datePublished":"2021-08-19T01:04:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/"},"wordCount":708,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/","url":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/","name":"Citizen Lab finds Apple's China censorship process bleeds into Hong Kong and Taiwan 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png","datePublished":"2021-08-19T01:04:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan.png","width":1200,"height":669},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/citizen-lab-finds-apples-china-censorship-process-bleeds-into-hong-kong-and-taiwan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Citizen Lab finds Apple&#8217;s China censorship process bleeds into Hong Kong and Taiwan"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42399"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42399\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42400"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}