A Privacy Threat for Internet Users in Internet-censoring Countries

Feno Heriniaina R.


Online surveillance has been increasingly used by different governments to control the spread of information on the Internet. The magnitude of this activity differs widely and is based primarily on the areas that are deemed, by the state, to be critical. Aside from the use of keywords and the complete domain name filtering technologies, Internet censorship can sometimes even use the total blocking of IP addresses to censor content. Despite the advances, in terms of technology used for Internet censorship, there are also different types of circumvention tools that are available to the general public. In this paper, we report the results of our investigation on how migrants who previously had access to the open Internet behave toward Internet censorship when subjected to it. Four hundred and thirty-two (432) international students took part in the study that lasted two years. We identified the most common circumvention tools that are utilized by the foreign students in China. We investigated the usability of these tools and monitored the way in which they are used. We identified a behaviour-based privacy threat that puts the users of circumvention tools at risk while they live in an Internet-censoring country. We also recommend the use of a user-oriented filtering method, which should be considered as part of the censoring system, as it enhances the performance of the screening process and recognizes the real needs of its users.


  1. A. Dainotti, Kimberly C. Claffy, M. Russo , C.Squarcella, Marco C., Antonio P. and Emile Aben. (2011). Analysis of country-wide internet outages caused by Censorship Proceeding IMC 7811 Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Pages 1-18 ISBN: 978-1-4503-1013-0
  2. Arma. (2014). How to read our China usage graphs? Retrieved in 2015, from https://blog.torproject.org/blog /how-to-read-our-china-usage-graphs
  3. Chellappa, Ramnath K., and Raymond G. Sin. (2005) “Personalization versus privacy: An empirical examination of the online consumer's dilemma." Information Technology and Management 6.2-3: 181- 202.
  4. Clayton, R., Murdoch, S. J. & Watson, R. N. M. (2006), “Ignoring the great firewall of china”, in G. Danezis & P. Golle, eds, 'Privacy Enhancing Technologies workshop (PET 2006)78, LNCS, Springer-Verlag.
  5. CSC. (2013). China Scholarship Council Organized the First CSC Scholarship Student Conference. Retrieved in 2015, from http://en.csc.edu.cn/News/ db88603b8da54f89a574f863b6a1863b.shtml
  6. CSC. (2015). Introduction to Chinese Government Scholarships. Retrieved in 2015, from http://www.csc.edu.cn/laihua/scholarshipdetailen.aspx ?cid=97&id=2070
  7. Danezis, G. (2011). An anomaly-based censorship detection system for Tor. The Tor Project.
  8. Facebook. (2013). About Facebook's Security & Warning Systems. Retrieved in 2015, from http://www.facebook.com/help/365194763546571/
  9. Facebook. (2015). En quoi consistent les notifications ou alertes de connexion? Retrieved in 2015, from https://www.facebook.com/help/www/162968940433 354
  10. Guardian. (2011). China tightens great Firewall internet control. Retrieved in 2015, from http://www.guardian.co.uk/technology/2012/dec/14/ch ina-tightens-great-firewall-internet-control
  11. Han, P. (2010). The Internet in China. Retrieved in 2015, from http://english1.english.gov.cn/2010-06/08/con tent_1622956_7.htm
  12. Hu Zuliu and Khan Mohsin S. (1997). Why Is China Growing So Fast? Economics issues 8, International Monetary Fund. ISBN 1-55775-641-4; ISSN 1020- 5098
  13. Kincaid, J. (2013). Mark Zuckerberg On Facebook's Strategy For China. Retrieved in 2015, from http://techcrunch.com/2010/10/16/mark-zuckerbergon-facebooks-strategy-for-china-and-his-wardrobe/
  14. Mahmood, S. (2012, November). New privacy threats for Facebook and Twitter users. In P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2012 Seventh International Conference on (pp. 164-169). IEEE.
  15. Michael Backes, Goran Doychev, Boris Kopf. (2013). Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. NDSS
  16. Rodriguez, G. (2013). Facebook's "One Billion" May be Even Bigger Than You Think. Forbes. Retrieved in 2015, from http://www.forbes.com/sites/giovanni rodriguez/2012/10/04/facebooks-one-billion-may-beeven-bigger-than-you-think/
  17. Spiekermann, Sarah, Jens Grossklags, and Bettina Berendt. (2001) "E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior." Proceedings of the 3rd ACM conference on Electronic Commerce. ACM.
  18. Walton, Greg. (2001) China's golden shield: corporations and the development of surveillance technology in the People's Republic of China. Rights & Demcracy.
  19. Xu, X., Mao, ZM and Halderman, JA, 2011, January Internet censorship in China: (. Pp 133-142). “Where does the filtering occur?” In Passive and Active Measurement Springer Berlin Heidelberg.
  20. Yang, Guobin. (2003) “The Internet and civil society in China: A preliminary assessment.” Journal of Contemporary China 12.36: 453-475.

Paper Citation

in Harvard Style

R. F. (2016). A Privacy Threat for Internet Users in Internet-censoring Countries . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 372-379. DOI: 10.5220/0005739203720379

in Bibtex Style

author={Feno Heriniaina R.},
title={A Privacy Threat for Internet Users in Internet-censoring Countries},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},

in EndNote Style

JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - A Privacy Threat for Internet Users in Internet-censoring Countries
SN - 978-989-758-167-0
AU - R. F.
PY - 2016
SP - 372
EP - 379
DO - 10.5220/0005739203720379