A Study of China's Censorship and Its Evasion Through the Lens of Online
Gaming
- URL: http://arxiv.org/abs/2308.02961v1
- Date: Sat, 5 Aug 2023 22:16:40 GMT
- Title: A Study of China's Censorship and Its Evasion Through the Lens of Online
Gaming
- Authors: Yuzhou Feng and Ruyu Zhai and Radu Sion and Bogdan Carbunar
- Abstract summary: China has increasingly restricted the access of minors to online games using addiction prevention systems (APSes)
This paper studies how these restrictions impact young online gamers, and their evasion efforts.
- Score: 12.227095608806696
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: For the past 20 years, China has increasingly restricted the access of minors
to online games using addiction prevention systems (APSes). At the same time,
and through different means, i.e., the Great Firewall of China (GFW), it also
restricts general population access to the international Internet. This paper
studies how these restrictions impact young online gamers, and their evasion
efforts. We present results from surveys (n = 2,415) and semi-structured
interviews (n = 35) revealing viable commonly deployed APS evasion techniques
and APS vulnerabilities. We conclude that the APS does not work as designed,
even against very young online game players, and can act as a censorship
evasion training ground for tomorrow's adults, by familiarization with and
normalization of general evasion techniques, and desensitization to their
dangers. Findings from these studies may further inform developers of
censorship-resistant systems about the perceptions and evasion strategies of
their prospective users, and help design tools that leverage services and
platforms popular among the censored audience.
Related papers
- Are LLMs Good Safety Agents or a Propaganda Engine? [74.88607730071483]
PSP is a dataset built specifically to probe the refusal behaviors in Large Language Models from an explicitly political context.<n> PSP is built by formatting existing censored content from two data sources, openly available on the internet: sensitive prompts in China generalized to multiple countries, and tweets that have been censored in various countries.<n>We study: 1) impact of political sensitivity in seven LLMs through data-driven (making PSP implicit) and representation-level approaches (erasing the concept of politics); and, 2) vulnerability of models on PSP through prompt injection attacks (PIAs)
arXiv Detail & Related papers (2025-11-28T13:36:00Z) - Digital Iran Reloaded: Gamer Mitigation Tactics of IRI Information Controls [0.0]
This report presents findings from a mixed-methods study of 660 Iranian internet users.<n>Results show that while younger users report higher confidence with circumvention, peer networks, rather than formal training, are the strongest predictors of resilience.<n>Gaming communities, particularly those active on platforms such as Discord and Telegram, serve as hubs for sharing tactics and lowering barriers to adoption.
arXiv Detail & Related papers (2025-09-11T00:05:31Z) - 'Teens Need to Be Educated on the Danger': Digital Access, Online Risks, and Safety Practices Among Nigerian Adolescents [0.0]
This study investigates the online experiences of 409 secondary school adolescents in Nigeria's Federal Capital Territory (FCT)<n>Using self-administered surveys, we found that while most adolescents reported moderate access to online technology and connectivity, those who encountered risks frequently reported exposure to inappropriate content and online scams.<n>Parents emerged as the primary support network, though monitoring practices and communication varied widely.
arXiv Detail & Related papers (2025-07-11T15:39:01Z) - SoK: Advances and Open Problems in Web Tracking [71.54586748169943]
Web tracking is a pervasive and opaque practice that enables personalized advertising, and conversion tracking.<n>Web tracking is undergoing a once-in-a-generation transformation driven by shifts in the advertising industry, the adoption of anti-tracking countermeasures by browsers, and the growing enforcement of emerging privacy regulations.<n>This Systematization of Knowledge (SoK) aims to consolidate and synthesize this wide-ranging research, offering a comprehensive overview of the technical mechanisms, countermeasures, and regulations that shape the modern and rapidly evolving web tracking landscape.
arXiv Detail & Related papers (2025-06-16T23:30:54Z) - EdgeAIGuard: Agentic LLMs for Minor Protection in Digital Spaces [13.180252900900854]
We propose the EdgeAIGuard content moderation approach to protect minors from online grooming and various forms of digital exploitation.
The proposed method comprises a multi-agent architecture deployed strategically at the network edge to enable rapid detection with low latency and prevent harmful content targeting minors.
arXiv Detail & Related papers (2025-02-28T16:29:34Z) - Modern DDoS Threats and Countermeasures: Insights into Emerging Attacks and Detection Strategies [49.57278643040602]
Distributed Denial of Service (DDoS) attacks persist as significant threats to online services and infrastructure.
This paper offers a comprehensive survey of emerging DDoS attacks and detection strategies over the past decade.
arXiv Detail & Related papers (2025-02-27T11:22:25Z) - A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges [0.32985979395737774]
In this paper, we firstly provide a survey of Internet censorship techniques.
Secondly, we survey censorship measurement methodology, including a coverage of available datasets.
In cases where it is beneficial, we bridge the terminology and taxonomy of Internet censorship with related domains.
arXiv Detail & Related papers (2025-02-20T17:50:50Z) - CensorLab: A Testbed for Censorship Experimentation [15.411134921415567]
We design and implement CensorLab, a generic platform for emulating Internet censorship scenarios.
CensorLab aims to support all censorship mechanisms previously or currently deployed by real-world censors.
It provides an easy-to-use platform for researchers and practitioners enabling them to perform extensive experimentation.
arXiv Detail & Related papers (2024-12-20T21:17:24Z) - SENet: Visual Detection of Online Social Engineering Attack Campaigns [3.858859576352153]
Social engineering (SE) aims at deceiving users into performing actions that may compromise their security and privacy.
SEShield is a framework for in-browser detection of social engineering attacks.
arXiv Detail & Related papers (2024-01-10T22:25:44Z) - Detection of Offensive and Threatening Online Content in a Low Resource
Language [0.0]
Hausa is a major Chadic language, spoken by over 100 million people in Africa.
Online platforms often facilitate social interactions that can lead to the use of offensive and threatening language.
arXiv Detail & Related papers (2023-11-17T14:08:44Z) - Factuality Challenges in the Era of Large Language Models [113.3282633305118]
Large Language Models (LLMs) generate false, erroneous, or misleading content.
LLMs can be exploited for malicious applications.
This poses a significant challenge to society in terms of the potential deception of users.
arXiv Detail & Related papers (2023-10-08T14:55:02Z) - LLM Censorship: A Machine Learning Challenge or a Computer Security
Problem? [52.71988102039535]
We show that semantic censorship can be perceived as an undecidable problem.
We argue that the challenges extend beyond semantic censorship, as knowledgeable attackers can reconstruct impermissible outputs.
arXiv Detail & Related papers (2023-07-20T09:25:02Z) - Countering Malicious Content Moderation Evasion in Online Social
Networks: Simulation and Detection of Word Camouflage [64.78260098263489]
Twisting and camouflaging keywords are among the most used techniques to evade platform content moderation systems.
This article contributes significantly to countering malicious information by developing multilingual tools to simulate and detect new methods of evasion of content.
arXiv Detail & Related papers (2022-12-27T16:08:49Z) - Upgrading the protection of children from manipulative and addictive
strategies in online games: Legal and technical solutions beyond privacy
regulation [0.0]
We discuss manipulative and exploitative strategies in the context of online games for children.
We propose an upgrade for the regulatory approach to address these risks from the perspective of freedom of thought.
arXiv Detail & Related papers (2022-07-20T14:13:17Z) - Towards Determining the Effect of Age and Educational Level on
Cyber-Hygiene [0.0]
Authors of this paper undertook an online pilot study among students and employees of University of Nigeria, Nsukka.
The survey seeks to find out the effect of age and level of education on the cyber hygiene knowledge and behaviour of the respondents.
Our findings show wide adoption of internet in institution of higher learning, whereas, significant number of the internet users do not have good cyber hygiene knowledge and behaviour.
arXiv Detail & Related papers (2021-03-11T11:42:23Z) - Understanding Underground Incentivized Review Services [26.402818153734035]
We study review fraud on e-commerce platforms through an HCI lens.
We uncover sophisticated recruitment, execution, and reporting mechanisms fraudsters use to scale their operation.
Countermeasures that crack down on communication channels through which these services operate are effective in combating incentivized reviews.
arXiv Detail & Related papers (2021-01-20T05:30:14Z) - Is 40 the new 60? How popular media portrays the employability of older
software developers [78.42660996736939]
We analyzed popular online articles and related discussions on Hacker News through the lens of employability issues and potential mitigation strategies.
We highlight the importance of keeping up-to-date, specializing in certain tasks or technologies, and present role transitions as a way forward for veteran developers.
arXiv Detail & Related papers (2020-04-13T10:00:03Z) - Challenges and Countermeasures for Adversarial Attacks on Deep
Reinforcement Learning [48.49658986576776]
Deep Reinforcement Learning (DRL) has numerous applications in the real world thanks to its outstanding ability in adapting to the surrounding environments.
Despite its great advantages, DRL is susceptible to adversarial attacks, which precludes its use in real-life critical systems and applications.
This paper presents emerging attacks in DRL-based systems and the potential countermeasures to defend against these attacks.
arXiv Detail & Related papers (2020-01-27T10:53:11Z) - Testing Robustness Against Unforeseen Adversaries [54.75108356391557]
Adversarial robustness research primarily focuses on L_p perturbations.
In real-world applications developers are unlikely to have access to the full range of attacks or corruptions their system will face.
We introduce ImageNet-UA, a framework for evaluating model robustness against a range of unforeseen adversaries.
arXiv Detail & Related papers (2019-08-21T17:36:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.