Protocol | China

Apple exports PRC censorship to Hong Kong and Taiwan, report says

Researchers say the U.S. tech giant copies censored word lists from Chinese sources to populate its own list of forbidden terms.

A guard standing outside an Apple store.

Citizen Lab researchers describe Apple's engraving censorship in Greater China as "thoughtless, non-transparent and expansive."

Photo: STR/AFP via Getty Images

A new investigation into Apple's censorship of terms used to create product engravings shows that the multinational has not only broadly censored political speech in mainland China, but has partially applied its China censored keyword lists — "thoughtlessly reappropriated" from Chinese sources — to Hong Kong and Taiwan.

The report, published Wednesday by The Citizen Lab at the University of Toronto, a research lab studying digital threats to civil society, discovered Apple's 1,105 censored keywords were applied "inconsistently" across six regions in Apple's free engraving service, which allows users to put custom names or messages on products like Airpods. (Beijing delegates the burden of censorship to private companies.)

Of the 1,105 blocked keywords Citizen Lab researchers identified, most are applied in the Greater China region, Apple's third-largest market by revenue. About 95% of all the censored terms (1,045) are applied in the mainland China market, followed by Hong Kong (542) and then Taiwan (397), the report says. Apple censors almost as much political speech in mainland China as social speech — content referencing explicit sexual content, illicit goods and services and vulgarity — which is the most commonly filtered content across regions. And because political censorship from the PRC has seeped into Hong Kong and Taiwan, Apple users in these two regions also experience political censorship when they try to engrave words.

In mainland China, researchers found that about 43% of all keywords censored by Apple's engraving service refer to China's political system, the Communist Party, senior government and Party leaders and dissidents. Apple applies 174 of those 458 keywords in the Hong Kong market as well, and 29 in Taiwan. For example, the traditional Chinese phrase 新聞自由, meaning freedom of the press, is censored in China and Hong Kong. Engravings referencing Mao Zedong (Chairman Mao, 毛主席) and Xi Jinping (paramount leader, 最高領導人) are filtered in all three regions, both in simplified and complex script.

According to The Citizen Lab, Apple's public-facing documents "failed to explain how it determines the keyword lists" and the company's censorship in mainland China "may have exceeded" its legal obligations in the market. Much of Apple's censorship in Hong Kong, a special administrative region of China on which Beijing has significantly tightened its grip, is not required by local laws and regulations. And in Taiwan, a self-governing island, Apple has no legal obligations to perform political censorship.

Researchers say there are two possible reasons why Apple applies its mainland China censorship in Hong Kong and Taiwan. "One is that this is, in fact, intentional behavior. In which case, it does speak to [how much] they want to appease the Chinese government," Jeffrey Knockel, co-author of the report and a research associate at The Citizen Lab, told Protocol. "But another possibility, too, is that it's just negligence." In a letter to The Citizen Lab, which Apple shared with Protocol, Chief Privacy Officer Jane Horvath wrote that Apple tries to not allow engraving requests that "would be considered illegal according to local laws, rules, and regulations of the countries and regions" in which it is offered.

The Citizen Lab found that Apple's blocked keywords in Taiwan are a subset of the filtered words applied in Hong Kong, which are in turn a subset of censored words used in mainland China. Researchers found evidence suggesting Apple designed its censored keyword list for mainland China first, then constructed the Hong Kong and Taiwan lists by removing some content that doesn't bear similar political importance for other regions. But they didn't take out everything inapplicable.

"That wouldn't show that these political terms are being censored intentionally, but it would still show that Apple is using a problematic methodology for constructing the lists used in Hong Kong and Taiwan," Knockel explained.

Horvath said Apple handles engraving requests regionally. "There is no single global list that contains one set of words or phrases," Horvath wrote in her letter. "Instead, these decisions are made through a review process where our teams assess local laws as well as their assessment of cultural sensitivities."

"Apple does not fully understand what content they censor"

There's also evidence that suggests that rather than carefully curating its own filter words list, Apple has copied strings of random keywords from blacklists used by Chinese tech companies.

Citizen Lab researchers identified different censored lists developed by four Chinese companies that have "a shockingly high amount of overlap" of anomalous sequences of keywords with that of Apple's. For example, Apple's list contains 10 random Chinese names surnamed Zhang with no clear political significance, and researchers found that those names appeared in a larger interval of keywords blacklisted by the Sina Show live streaming software. In another case, Apple blocks the term "SNK.NI8.NET," which refers to a website that hasn't been in operation since 2005. Researchers found it in a long string of filter words on NetEase Games' blacklist, which Apple all copied to block.

Laws and regulations in China regarding content moderation are largely vague and opaque. There is no central censored keyword list in China; instead, tech companies are left on their own to develop lists of words and names to block, meaning little overlap exists between censored lists owned by different companies, according to Knockel. The significant overlap of consecutive filtered words between Apple's list and those used by Chinese tech companies, however, doesn't suggest that Apple copied its list from Chinese companies. "Maybe there's some third party, possibly even the government, who provided them to Apple," Knockel said.

Though Apple's engraving political censorship seems expansive, Eric Liu, whose earlier documentation of blocked keywords on Apple's new AirTag products for the China Digital Times inspired the Citizen Lab's investigation, told Protocol that Apple's censorship scope is far narrower than that of the Chinese companies. Liu is a former censor for Chinese tech companies. "Apple has made some essential mistakes that even novices [in China] will not make," Liu said. "For example, the children of senior national leaders are not in its sensitive thesaurus, which is absolutely not allowed [in China]; they are much more sensitive than [dissident] Cheng Guangcheng or [exiled Tibetan spiritual leader] the Dalai Lama."

Liu believes what he calls the "lameness" of Apple's China filter list suggests Apple might have its own in-house censorship team, because "if it were a Chinese company to provide censorship to Apple, they would've done a far better job."

Apple's Horvath confirmed in her letter that the multinational company's own content moderation teams rely on information from outside sources, but "no third parties or government agencies have been involved [in] the process [of filtering words]." She also wrote that Apple's curation of blocked terms for the most part "is not an automated process and relies on manual curation," which at times "can result in engraving requests being mistakenly rejected." Citizen Lab researchers said it's difficult to compare lists. But for Apple, or any tech company operating in China, their yardstick for "success" is whether their censorship system can keep them out of trouble.

"At the end of the day, for a lot of companies, filtering is the cost they have to bear for conducting business in China," Lotus Ruan, co-author of the report and a senior researcher at The Citizen Lab, told Protocol. Censorship "could be something [companies] just want to get over with ... to show the government that they have done something already."

Protocol | Policy

Why Twitch’s 'hate raid' lawsuit isn’t just about Twitch

When is it OK for tech companies to unmask their anonymous users? And when should a violation of terms of service get someone sued?

The case Twitch is bringing against two hate raiders is hardly black and white.

Photo: Caspar Camille Rubin/Unsplash

It isn't hard to figure out who the bad guys are in Twitch's latest lawsuit against two of its users. On one side are two anonymous "hate raiders" who have been allegedly bombarding the gaming platform with abhorrent attacks on Black and LGBTQ+ users, using armies of bots to do it. On the other side is Twitch, a company that, for all the lumps it's taken for ignoring harassment on its platform, is finally standing up to protect its users against persistent violators whom it's been unable to stop any other way.

But the case Twitch is bringing against these hate raiders is hardly black and white. For starters, the plaintiff here isn't an aggrieved user suing another user for defamation on the platform. The plaintiff is the platform itself. Complicating matters more is the fact that, according to a spokesperson, at least part of Twitch's goal in the case is to "shed light on the identity of the individuals behind these attacks," raising complicated questions about when tech companies should be able to use the courts to unmask their own anonymous users and, just as critically, when they should be able to actually sue them for violating their speech policies.

Keep Reading Show less
Issie Lapowsky

Issie Lapowsky ( @issielapowsky) is Protocol's chief correspondent, covering the intersection of technology, politics, and national affairs. She also oversees Protocol's fellowship program. Previously, she was a senior writer at Wired, where she covered the 2016 election and the Facebook beat in its aftermath. Prior to that, Issie worked as a staff writer for Inc. magazine, writing about small business and entrepreneurship. She has also worked as an on-air contributor for CBS News and taught a graduate-level course at New York University's Center for Publishing on how tech giants have affected publishing.

While it's easy to get lost in the operational and technical side of a transaction, it's important to remember the third component of a payment. That is, the human behind the screen.

Over the last two years, many retailers have seen the benefit of investing in new, flexible payments. Ones that reflect the changing lifestyles of younger spenders, who are increasingly holding onto their cash — despite reports to the contrary. This means it's more important than ever for merchants to take note of the latest payment innovations so they can tap into the savings of the COVID-19 generation.

Keep Reading Show less
Antoine Nougue,

Antoine Nougue is Head of Europe at He works with ambitious enterprise businesses to help them scale and grow their operations through payment processing services. He is responsible for leading the European sales, customer success, engineering & implementation teams and is based out of London, U.K.

Protocol | Fintech

When COVID rocked the insurance market, this startup saw opportunity

Ethos has outraised and outmarketed the competition in selling life insurance directly online — but there's still an $887 billion industry to transform.

Life insurance has been slow to change.

Image: courtneyk/Getty Images

Peter Colis cited a striking statistic that he said led him to launch a life insurance startup: One in twenty children will lose a parent before they turn 15.

"No one ever thinks that will happen to them, but that's the statistics," the co-CEO and co-founder of Ethos told Protocol. "If it's a breadwinning parent, the majority of those families will go bankrupt immediately, within three months. Life insurance elegantly solves this problem."

Keep Reading Show less
Benjamin Pimentel

Benjamin Pimentel ( @benpimentel) covers fintech from San Francisco. He has reported on many of the biggest tech stories over the past 20 years for the San Francisco Chronicle, Dow Jones MarketWatch and Business Insider, from the dot-com crash, the rise of cloud computing, social networking and AI to the impact of the Great Recession and the COVID crisis on Silicon Valley and beyond. He can be reached at or via Signal at (510)731-8429.

Protocol | Workplace

Remote work is here to stay. Here are the cybersecurity risks.

Phishing and ransomware are on the rise. Is your remote workforce prepared?

Before your company institutes work-from-home-forever plans, you need to ensure that your workforce is prepared to face the cybersecurity implications of long-term remote work.

Photo: Stefan Wermuth/Bloomberg via Getty Images

The delta variant continues to dash or delay return-to-work plans, but before your company institutes work-from-home-forever plans, you need to ensure that your workforce is prepared to face the cybersecurity implications of long-term remote work.

So far in 2021, CrowdStrike has already observed over 1,400 "big game hunting" ransomware incidents and $180 million in ransom demands averaging over $5 million each. That's due in part to the "expanded attack surface that work-from-home creates," according to CTO Michael Sentonas.

Keep Reading Show less
Michelle Ma
Michelle Ma (@himichellema) is a reporter at Protocol, where she writes about management, leadership and workplace issues in tech. Previously, she was a news editor of live journalism and special coverage for The Wall Street Journal. Prior to that, she worked as a staff writer at Wirecutter. She can be reached at
Protocol | Enterprise

How GitHub COO Erica Brescia runs the coding gold mines

GitHub sits at the center of the world's software-development activity, which makes the Microsoft-owned code repository a major target for hackers and a trend-setter in open source software.

GitHub COO Erica Brescia

Photo: GitHub

An astonishing amount of the code that runs the world's software spends at least part of its life in GitHub. COO Erica Brescia is responsible for making sure that's not a disaster in the making.

Brescia joined GitHub after selling Bitnami, the open-source software deployment tool she co-founded, to VMware in 2019. She's responsible for all operational aspects of GitHub, which was acquired by Microsoft in 2018 for $7.5 billion in one of its largest deals to date.

Keep Reading Show less
Tom Krazit

Tom Krazit ( @tomkrazit) is Protocol's enterprise editor, covering cloud computing and enterprise technology out of the Pacific Northwest. He has written and edited stories about the technology industry for almost two decades for publications such as IDG, CNET, paidContent, and GeekWire, and served as executive editor of Gigaom and Structure.

Latest Stories