Modern Australian
Times Advertising

How a cyber attack hampered Hong Kong protesters

  • Written by Stanley Shanapinda, Research Fellow, La Trobe University

Massive public protests taking place in Hong Kong over the past week are aimed at a new extradition law, known as the Fugitive Offenders Ordinance, that would see accused criminals extradited to mainland China to face prosecution.

Hongkongers feel the law could be used to legalise the kidnapping of people who express views, and act in ways, that are not popular with the Chinese government. The same law could also be used to extradite tourists and visitors to China who are arrested on suspicion of having committed these crimes.

Protesters want the bill scrapped. For now, debate of the legislation has been postponed.

Organisers say one million people turned out for the protests, while police estimate the number was around 240,000. Either way, it was a significant number of Hong Kong’s 7.5 million population. Commentators on Twitter remarked on how well organised the protesters were.

So, how did they do it?

Protesters across the world are using new technologies to organise. Social media platforms were used to share information about the Hong Kong protests. And messaging apps, such as Telegram and WhatsApp, were essential for coordinating with other protesters.

Read more: Beyond hashtags: how a new wave of digital activists is changing society

Telegram as a protest tool

In choosing a messaging app, organisers are looking to communicate effectively while avoiding surveillance. Telegram, which launched in 2013, has become a more secure competitor to WhatsApp.

Telegram says it has standard end-to-end encryption for its chats, to prevent spying on the contents of communications.

There is the “cloud chats” option for group messaging. Telegram also allows for “secret chats” between two people. These chats are stored on the phones rather than in the cloud, and can be set to self-destruct at a time determined by the user.

Unlike WhatsApp, Telegram hasn’t suffered major hacks in the recent past. Earlier this year, WhatsApp was reportedly infected with the Pegasus spyware as part of an attempt to access the messages of a UK-based human rights lawyer who was working on a case for civil rights activists. During the 2014 protests, WhatsApp was also reportedly attacked to spy on Hongkongers.

Telegram is a partially open source platform. Anyone can contribute to strengthening its security by looking for and fixing vulnerabilities, which can help to prevent hacks like those from Pegasus.

Telegram therefore offered Hongkongers a messaging service they could use with a bit more confidence, or so the organisers thought. But the use of spyware isn’t the only method available to those who might want to disrupt the communications of protesters.

Read more: Shutting down social media does not reduce violence, but rather fuels it

Telegram becomes a target

The administrator of a 30,000-member Telegram chat group, which was used to organise the protests, was arrested on Tuesday. Ivan Ip, 22, was accused of conspiring to commit a public nuisance. Ip told the New York Times:

I never thought that just speaking on the internet, just sharing information, could be regarded as a speech crime […] I’m scared that they will show up again and arrest me again. This feeling of terror has been planted in my heart.

In a further show of force, Telegram was also targeted in a distributed denial-of-service (DDoS) attack during the protests.

DDoS attacks use botnets, which are computers that have been compromised by malicious software and then used to launch cyber attacks in an automated fashion. The owner of the computer may not even know that their property was used as a tool to suppress civil rights activists.

Telegram’s servers were flooded with junk communications at rate of 200-400 gigabits per second, slowing functioning of the service until it was ineffective or unusable.

Based on past trends, this size of an attack is likely to have been carried out by a state actor. Telegram founder and CEO Pavel Durov said source IP addresses indicated the geographic location of the attacks were mainly originating in China.

This disruption appears to have been coordinated to occur at the height of the protests for maximum impact, creating a chilling effect on the ability of protesters to organise and communicate.

The effect of the attack was global, impacting Telegram users in other countries like the United States. This shows how targeted internet censorship techniques in one country could punish citizens of another.

Read more: From billboards to Twitter, why the aesthetics of protest matters more today

Forcing protesters into a corner

By making Telegram unusable, the cyber attack redirects the communications of organisers onto less secure platforms, where vulnerabilities can be exploited.

Communications on these platforms might be more easily intercepted, and metadata and location information might be available from telecommunications companies and ISPs. This can heighten protesters’ fears of being identified and prosecuted for their political actions.

How a cyber attack hampered Hong Kong protesters Protesters during a rally against an extradition bill outside the Legislative Council in Hong Kong on June 12. Vernon Yuen/EPA

The power of governments to attack and disrupt the communications of protesting citizens has a chilling effect on the universal right to march and to protest. Social media hacking tools, which are sold to repressive governments to spy on their own citizens, further erode the right to free speech and to organise political activity.

In this environment, demand for secure social media apps will only increase out of a basic necessity to break free from surveillance, and for protection against authoritative regimes around the world.

Authors: Stanley Shanapinda, Research Fellow, La Trobe University

Read more http://theconversation.com/how-a-cyber-attack-hampered-hong-kong-protesters-118770

3PL Logistics Australia Driving Smarter Supply Chains And Faster Deliveries

In a world where customers expect speed almost as much as quality, logistics has become the silent heartbeat of every successful business. Behind th...

Why Professional Electrical Services Are Essential For Modern Properties

Electricity powers almost every aspect of daily life, from lighting and appliances to complex systems in homes and businesses. This makes choosing a...

What Not to Pack When Moving: The Essential Guide to Smart Packing

Moving house is one of those all-encompassing events in life and most people focus their energy on deciding what to pack. But knowing what not to pa...

From Assistance to Independence: Progression in Daily Living Skills

The ultimate goal of many support systems is to empower individuals to lead lives defined by autonomy and self-reliance. While some support requiremen...

The Cost Difference Between Early Repairs and Delayed Replacement

Automotive maintenance often involves a choice between addressing a small issue immediately or waiting until a component fails completely. When it c...

What Is a Stainless Steel Bar? Applications, Benefits, and Buying Tips

Stainless steel is one of the most widely used materials across industrial and commercial sectors, known for its strength, corrosion resistance, and...

Scholars in Developing Nations Depending on Z library

Access to books often shapes the course of study for scholars who live in regions with thin library shelves and slow supply chains. Many students wo...

6 Cheapest POS Systems in Australia (2026)

The cheapest POS systems in Australia for 2026 are POSApt, Square, Zeller, Loyverse, Epos Now, and Shopify POS (Lite). However, “cheap” does no...

The Ultimate Guide to Automating Your Weekend Yard Chores

We all look forward to the weekend as a chance to unwind after a long week of work. You probably picture yourself relaxing on the patio with a cold ...

How Ignoring Regular Car Servicing Can Lead to Costly Repairs

Owning a car gives you a sweet sense of freedom and comfort. You can go wherever you want, whenever you want. But with that freedom comes responsibili...

Someone Trips at Your Fundraiser. Now What? Understanding Public Liability for NFPs

Three months of planning. Volunteers giving up their weekends. Sponsorships chased, catering sorted, tables decorated. And then, about an hour into ...

Stainless Steel Tube: A Complete Specification Guide for Engineers, Project Managers, and Industrial Buyers

Few materials in the industrial and manufacturing world are as universally relied upon — or as frequently misspecified — as stainless steel tube...

How to Choose the Right Barber Shears Scissors for Professional Results

Since a barber is only as good as their tool, choosing the right barber shear scissor must not be taken lightly. Most barbers end up buying the first ...

Why Commercial Construction Companies Play A Critical Role In Modern Urban Development

Urban development requires highly organised planning, engineering expertise, and professional construction teams capable of delivering complex build...

Essential Features for Comfortable Family Caravan Trips

Choosing the right van for family travel requires careful consideration of how the space will be used on a daily basis. Families have specific needs...

Chatswood Tutor: Helping Students Achieve Academic Success With Personalised Learning

Education plays a crucial role in shaping a student’s future, and many students benefit from additional academic support outside the classroom. A pr...

How External Consulting Can Guide Enterprise IT Strategy and Procurement

Internal IT teams carry deep operational knowledge, but that familiarity can create blind spots in strategic decisions. An external IT consultant br...

Why Sports Nutrition Australia Is Important for Performance and Recovery

Athletes and fitness enthusiasts place significant demands on their bodies during training and competition. Maintaining energy levels, supporting mu...