Hong Kongers Erase Their Digital Footprints

As a former British colony, Hong Kong was promised a high degree of autonomy when it returned to Chinese control in 1997. The reality, however, is somewhat different as social media users are deleting posts or alter identities to avoid detection and prosection under newly imposed Chines security legislation. 

As China' new national security laws for Hong Kong are implemented by local police, people are rushing to alter their digital footprints or remove their presence entirely from social media.

The legislation has triggered widespread  self-censorship among Hong Kong people. A Twitter user named "Winnie" has deactivated an account with the hashtag #hkprotest. "I'm not doing it because I feel I am at risk, it is out of an abundance of caution," the tweet said, adding that "my heart goes out to the visible activists." Prominent activist Joshua Wong Chi-fung is likely to one of the first two targets after the security laws are enacted. 

The new laws, which will outlaw activities of "separatism, subversion, terrorism and foreign interference" and follow last year's massive anti-government protests, have raised concerns among legal experts. It seems clear that the law will have a severe impact on freedom of expression, if not personal security, on the people of Hong Kong.

A high school teacher in his late 20s, who requested anonymity, explained to the Nikkei Asian Review newspaper why he recently changed his name on Facebook: "We are now so afraid that we could be sold out by our so-called friends online." He has  changed his profile photo on social media, deleted politically sensitive posts, and has gone through his online "friends" list to check whether anyone could possibly target him for his liberal views on political and social issues. He screened his online contacts by reading through their recent postings of their political views. 

The teacher's colleague, who also requested anonymity, is taking a similar approach. The colleague, who is in his early 30s, changed the online name that he had used for seven years after learning that others had done so out of security concerns. Not only has the colleague dropped his familiar cyberspace identity and erased past postings that could be deemed politically sensitive, he has stopped writing comments on news and social events published on Facebook and Instagram. He now simply reposts content that he finds online without making additional remarks.

Both men said "fear" was looming over them, as the enactment of the national security laws is imminent. Although articles and provisions of the laws have not yet been made public, comments from prominent pro-Beijing figures in Hong Kong and a "summary" from China's official Xinhua News Agency are causing jitters among many people in Hong Kong.

The eradication and alteration of digital footprints were first seen June last year, when a series of protests erupted against a proposed extradition bill. 

Some of social media users have changed their names, deleted content from cyberspace and closed down WhatsApp chat groups in advance of the new laws as direct reaction to the enactment of the law. Even though the two teachers do not intend to leave Hong Kong for now, it remains an option. The teacher in his 20s said that he spoke with his father and his younger brother after the initial announcement of the national security bill, and decided to remain in Hong Kong, even though the family has the financial means to depart.

Hongkongers have taken to the streets to protest China’s confirmation that someone traveling overseas to successfully lobby for sanctions could be charged with foreign collusion offences, or that provoking hatred of police, by spreading “rumours” of violence for instance, could be a national security offence.

Nikkei:       Guardian:         FirstPost

You Might Also Read:

Police Location App Used By Hong Kong Protesters Deleted:

« Police First Hack Then Demolish Organised Crime Gangs
Hackers Extort $1.14m From University of California »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.