FINDING · DETECTION

Forensic analysis of keyword list formatting artifacts — C-style escapes appearing in XML files, XML entities appearing in non-XML files, and double-backslash encoding traceable to a 2004 leaked QQ keyword list — provides evidence that developers copy and circulate keyword lists across companies through informal channels including old web applications and bulletin boards. This keyword propagation mechanism explains partial overlap between unrelated companies' lists without implying a central authority.

From 2017-knockel-measuringMeasuring Decentralization of Chinese Keyword Censorship via Mobile Games · §5.1 · 2017 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
keyword-filtering

Extracted by claude-sonnet-4-6 — review before relying.