Hong Kongers Erase Their Digital Footprints

As a former British colony, Hong Kong was promised a high degree of autonomy when it returned to Chinese control in 1997. The reality, however, is somewhat different as social media users are deleting posts or alter identities to avoid detection and prosection under newly imposed Chines security legislation. 

As China' new national security laws for Hong Kong are implemented by local police, people are rushing to alter their digital footprints or remove their presence entirely from social media.

The legislation has triggered widespread  self-censorship among Hong Kong people. A Twitter user named "Winnie" has deactivated an account with the hashtag #hkprotest. "I'm not doing it because I feel I am at risk, it is out of an abundance of caution," the tweet said, adding that "my heart goes out to the visible activists." Prominent activist Joshua Wong Chi-fung is likely to one of the first two targets after the security laws are enacted. 

The new laws, which will outlaw activities of "separatism, subversion, terrorism and foreign interference" and follow last year's massive anti-government protests, have raised concerns among legal experts. It seems clear that the law will have a severe impact on freedom of expression, if not personal security, on the people of Hong Kong.

A high school teacher in his late 20s, who requested anonymity, explained to the Nikkei Asian Review newspaper why he recently changed his name on Facebook: "We are now so afraid that we could be sold out by our so-called friends online." He has  changed his profile photo on social media, deleted politically sensitive posts, and has gone through his online "friends" list to check whether anyone could possibly target him for his liberal views on political and social issues. He screened his online contacts by reading through their recent postings of their political views. 

The teacher's colleague, who also requested anonymity, is taking a similar approach. The colleague, who is in his early 30s, changed the online name that he had used for seven years after learning that others had done so out of security concerns. Not only has the colleague dropped his familiar cyberspace identity and erased past postings that could be deemed politically sensitive, he has stopped writing comments on news and social events published on Facebook and Instagram. He now simply reposts content that he finds online without making additional remarks.

Both men said "fear" was looming over them, as the enactment of the national security laws is imminent. Although articles and provisions of the laws have not yet been made public, comments from prominent pro-Beijing figures in Hong Kong and a "summary" from China's official Xinhua News Agency are causing jitters among many people in Hong Kong.

The eradication and alteration of digital footprints were first seen June last year, when a series of protests erupted against a proposed extradition bill. 

Some of social media users have changed their names, deleted content from cyberspace and closed down WhatsApp chat groups in advance of the new laws as direct reaction to the enactment of the law. Even though the two teachers do not intend to leave Hong Kong for now, it remains an option. The teacher in his 20s said that he spoke with his father and his younger brother after the initial announcement of the national security bill, and decided to remain in Hong Kong, even though the family has the financial means to depart.

Hongkongers have taken to the streets to protest China’s confirmation that someone traveling overseas to successfully lobby for sanctions could be charged with foreign collusion offences, or that provoking hatred of police, by spreading “rumours” of violence for instance, could be a national security offence.

Nikkei:       Guardian:         FirstPost

You Might Also Read:

Police Location App Used By Hong Kong Protesters Deleted:

« Police First Hack Then Demolish Organised Crime Gangs
Hackers Extort $1.14m From University of California »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

Ory Corp

Ory Corp

Ory's IAM/CIAM solutions are designed to empower businesses with the tools they need to protect their users, services and things, and maintain compliance.