/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Company

Uighurs

Filtered to controversy pattern ×
15 articles stable
Articles
15
mentions
Velocity
0.0%
growth rate
Acceleration
+0.667
velocity change
Sources
9
publications

Coverage Timeline

2022-05-13
Stanford CIS Blog

If Roe v. Wade is overturned, the enforcement of US laws should be seen as an urgent argument for strengthening encryption, not weakening it

Riana Pfefferkorn / Stanford CIS Blog : Tweets: @hipsterelectron , @decryption , and @christophera Tweets: @hipsterelectron : another bit that made my eyes widen: diffie-hellman key exchange was publ...

2021-08-08
Daring Fireball 6 related

An overview of Apple's three new “Child Safety” initiatives, what critics are getting wrong, and the completely legitimate slippery slope concerns from experts

*without asking.* https://twitter.com/... Kontra / @counternotions : If you must read only one article to see the absurdity of the bombastic headline regurgitation currently being spewed about Apple's...

2020-07-01
New York Times 2 related

Researchers say China's mobile hacking campaign against the Uighurs was broader and more aggressive than previously known, beginning as far back as 2013

A new report revealed a broad campaign that targeted Muslims in China and their diaspora in other countries, beginning as early as 2013.

2020-04-22
Wired

MIT has terminated its five-year research collaboration with Chinese AI firm iFlytek, which is accused of supplying tech for surveilling Uighurs in China

Reports accuse iFlytek of selling technology to the government that's used to oppress ethnic Uighurs in China's northwest. Tweets: @kenroth , @wired , and @tsimonite Tweets: Kenneth Roth / @kenroth : ...

2019-11-26
ICIJ 8 related

Leaked Chinese government docs reveal the mechanics of running mass detention camps in Xinjiang, predictive policing, mass surveillance, and snooping on expats

"brainwashing" — to which China is subjecting at least one million detained Uighur and other Turkic Muslims until they renounce Islam and their ethnicity. https://www.bbc.com/... https://twitter.com/....

2019-10-23
New York Times

Researchers: China's state sponsored hackers have switched tactics over the last few years, focusing increasingly sophisticated attacks on its ethnic minorities

SAN FRANCISCO — China's state-sponsored hackers have drastically changed how they operate over the last three years … Tweets: @liyuan6 , @nytimes , @nicoleperlroth , and @paulmozur Tweets: Li Yuan / @...

2019-09-08
Apple 50 related

Apple accuses Google's Project Zero of stoking fear by creating a “false impression of mass exploitation”, says the sophisticated attack was narrowly focused

And They're Wrong PYMNTS.com : Apple, Google At Odds On iPhone Security Flaws Tied To Attacks Michael Tsai : Apple Responds to Project Zero Abner Li / 9to5Google : Google stands by iOS vulnerability r...

2019-09-07
Apple 50 related

Apple accuses Google's Project Zero of stoking fear by creating a “false impression of mass exploitation”, says the sophisticated attack was narrowly focused

And They're Wrong Michael Tsai : Apple Responds to Project Zero Firstpost Tech : Apple hits back at Google, accusing it of creating a ‘false impression’ of ‘mass exploitation’ around iPhone exploits A...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Relationships

Loading graph...