Abstract
This exploratory research surveys scholarly literature on decentralized storage solutions, including theories and works of archival science, and similar applications in humanitarian contexts, to illustrate the necessity of these systems in Xinjiang Uyghur Autonomous Region in China. Xinjiang has recently shifted into the spotlight of the international press for allegations of abuse and forced labor, coercive cultural assimilation, and the creation of a police state. The leadership of the People’s Republic of China (PRC) justifies the existence of these training facilities and expansive surveillance networks as part of the PRC-backed efforts to de-radicalize ethnic groups in the region. However, many governments and scholars rebuke these justifications, arguing that these centers are state-run facilities that house extrajudicially detained individuals based on their ethnic identity and religious belief. This paper aims at limiting the plausible deniability of violations conducive to cultural genocide, thus improving the prospects for deterrence and accountability through decentralized evidence management. The technological sophistication of the regime in Xinjiang is outpacing centralized systems and rendering storage solutions hosting evidence of these violations obsolete. This jeopardizes the prospect of truth and reconciliation in the future and allows the party to craft and disseminate their narrative globally with little resistance. Major findings focus on how decentralized systems can improve the streamlining and hosting of evidence regarding human rights violations occurring as well as advancing the study of cryptographic management of evidence regarding the treatment of vulnerable communities in low-rights regions.


Similar content being viewed by others
Data Availability
The authors confirm that the data supporting the findings of this study are available within the article [and/or] its supplementary materials.
References
Aarvik, P. (2020). Blockchain as an anti-corruption tool. Case examples and introduction to the technology. Chr. Michelsen Institute. Retrieved from https://www.cmi.no/publications/7208-blockchain-as-an-anti-corruption-tool-case-examples-and-introduction-to-the-technology
Aggarwal, N., & Floridi, L. (2019). The ppportunities and challenges of blockchain in the fight against government corruption. 19th General Activity Report (2018) of the Council of Europe Group of States against Corruption.
Amnesty International Canada. (2020). Human rights defenders increasingly face threats, intimidation over China advocacy: Report. Retrieved from https://www.amnesty.ca/news/human-rights-defenders-increasingly-face-threats-intimidation-over-china-advocacy-report
Ayasun, A. (2021). Uyghurs wary of Turkey’s pending extradition deal with China . – The Diplomat. Retrieved from https://thediplomat.com/2021/01/uyghurs-wary-of-turkeys-pending-extradition-deal-with-china/
Baran, P. (1962). On distributed communications networks. IEEE Transactions on the Professional Technical Group on Communications Systems, CS-12(1). https://doi.org/10.7249/p2626
Barme, G. R., & Ye, S. (1997). The Great Firewall of China. Wired. Retrieved from https://www.wired.com/1997/06/china-3/
BBC. (2016). China confiscates passports of Xinjiang people. BBC News. Retrieved from https://www.bbc.com/news/world-asia-china-38093370
Bischoff, P. (2021). Surveillance camera statistics: Which cities has the most CCTV cameras? Comparitech. Retrieved from https://www.comparitech.com/vpn-privacy/the-worlds-most-surveilled-cities/
Bui, T., Cooper, D., Collomosse, J., Bell, M., Green, A., Sheridan, J., & Thereaux, O. (2020). Tamper-proofing video with hierarchical attention autoencoder hashing on blockchain. IEEE Transactions on Multimedia, 22(11), 2858–2872.
Byler, D. (2020). The Xinjiang data police. Retrieved from https://www.noemamag.com/the-xinjiang-data-police/
Byler, D. (2021). Terror capitalism: Uyghur dispossession and masculinity in a Chinese city. Duke University Press.
Chin, J., & Bürge, C. (2017). Twelve days in Xinjiang: How China’s surveillance state overwhelms daily life. The Wall Street Journal. Retrieved from https://www.wsj.com/articles/twelve-days-in-xinjiang-how-chinas-surveillance-state-overwhelms-daily-life-1513700355
Clarke, M. (2007). China’s internal security dilemma and the “Great Western Development”: The dynamics of integration, ethnic nationalism and terrorism in Xinjiang. Asian Studies Review, 31(3), 323–342. https://doi.org/10.1080/10357820701621350
Cliff, T. (2016). Oil and water: Being Han in Xinjiang. University of Chicago Press.
Decentralized Identity Foundation. (2022). Identifiers and discovery. DIF. Retrieved from https://identity.foundation/working-groups/identifiers-discovery.html
Dotan, J. (2021). Trustless truth: How private and public ledgers can take on misinformation - and win. Hyperledger. Retrieved from www.youtube.com/watch?v=w1r3Fsjaw0s
European Medicines Agency. (2021). Cyberattack on ema - update 6 European Medicines Agency. European Medicines Agency. Retrieved from https://www.ema.europa.eu/en/news/cyberattack-ema-update-6
Feng, G. C., & Guo, S. Z. (2013). Tracing the route of China’s Internet censorship: An empirical study. Telematics and Informatics, 30(4), 335–345. https://doi.org/10.1016/j.tele.2012.09.002
Flores, D., Lacombe, C., & Lemieux, V. (2017). (rep.). Real estate transaction recording in the blockchain in Brazil (RCPLAC-01) – Case Study 1.
Forti, L. (2017). InterPlanetary File System (Ipfs) Tutorial - Building the distributed web. Fullstack Academy. Youtube. Retrieved from https://www.youtube.com/watch?v=6kqgsGXpykM&ab_channel=FullstackAcademy
Greig, J. (2022). Red Cross worried about misuse of stolen data by nation states and cybercriminals after hack. ZDNet. Retrieved from https://www.zdnet.com/article/red-cross-worried-about-misuse-of-stolen-data-by-nation-states-cybercriminals/
Griffiths, J. (2021a). Over the wall - China’s first email and the rise of the online censor. In Great Firewall of China: How to build and control an alternative version of the internet. essay, Zed Books Ltd.
Griffiths, J. (2021b). Enemy at the gates - How fear of Falun Gong boosted the Firewall. In Great Firewall of China: How to build and control an alternative version of the internet. essay, Zed Books Ltd.
Guerif, V. (2010). Making states, displacing peoples a comparative perspective of Xinjiang and Tibet in the People’s Republic of China . The Refugee Studies Centre Working Paper Series, 1–46.
Gutnikov, A., Kupreev, O., & Yaroslav, S. (2022). DDoS attacks in Q1 2022. Securelist. Retrieved from https://securelist.com/ddos-attacks-in-q1-2022/106358/
Hadjimatheou, C. (2021). Mayday: How the White Helmets and James Le Mesurier got pulled into a deadly battle for truth. BBC. Retrieved from https://www.bbc.com/news/stories-56126016
Hui, M. (2021). Hong Kongers are using Blockchain archives to fight government censorship. Quartz. Retrieved from https://qz.com/2008673/hong-kongers-use-blockchain-to-fight-government-censorship/
Human Rights Watch. (2020). Saudi Arabia: Clarify status of Uyghur detainees. Retrieved from https://www.hrw.org/news/2020/11/23/saudi-arabia-clarify-status-uyghur-detainees
Husain, S., Sathik, M., & Nisha, S. (2019). Enhanced security on e-voting system using BlockChain. SSRG International Journal of Computer Science and Engineering, 23–25.
ISCN. (2021). International standard content number specifications. LikeCoin Foundation Ltd. Retrieved from https://iscn.io/
Kang, D., & Fraser, S. (2021). Turkey Uighurs fear sellout to China in exchange for vaccine. AP News. https://apnews.com/article/turkey-beijing-coronavirus-pandemic-ankara-china-c8b714974552c484c501a5784efc117a
Kasthala, V. (2019). Blockchain key characteristics and conditions to use it as a solution. Medium. Retrieved from https://medium.com/swlh/blockchain-characteristics-and-its-suitability-as-a-technical-solution-bd65fc2c1ad1
Killing, A., Rajagopalan, M., & Buschek, C. (2020). Blanked-out spots on China’s maps helped us uncover Xinjiang’s camps. BuzzFeed News. Retrieved from https://www.buzzfeednews.com/article/alison_killing/satellite-images-investigation-xinjiang-detention-camps
Kuo, L. (2021). China appears to block Signal app, tightening internet controls. The Washington Post. Retrieved from https://www.washingtonpost.com/world/asia_pacific/signal-app-china-blocked-firewall/2021/03/16/a7972b52-860c-11eb-be4a-24b89f616f2c_story.html
Leibold, J. (2019). Surveillance in China’s Xinjiang Region: Ethnic sorting, coercion, and inducement. Journal of Contemporary China, 29(121), 46–60. https://doi.org/10.1080/10670564.2019.1621529
Lemieux, V. L. (2017a). (rep.). Blockchain recordkeeping: A SWOT analysis. ARMA. Retrieved from http://imm.arma.org/publication/?i=454085&article_id=2939577&view=articleBrowser&ver=html5
Lemieux, V. L. (2017b). Future Technologies Conference 2017b. In Blockchain and distributed ledgers as trusted recordkeeping systems: An archival theoretic evaluation framework (pp. 1–11). Vancouver.
Levinger, M. (2007). Master narratives of disinformation campaigns. Journal of International Affairs, 75(1.5), 125–134. https://www.jstor.org/stable/26508126?seq=1&cid=pdf-reference
LikeCoin. (2021). Decentralized Publishing. LikeCoin. Retrieved from https://docs.like.co/
Liu, A. H., & Peters, K. (2017). The Hanification of Xinjiang, China: The economic effects of the Great Leap West. Studies in Ethnicity and Nationalism, 17(2), 265–280. https://doi.org/10.1111/sena.12233
Lyngaas, S. (2022). Aid groups helping Ukraine face both cyber and physical threats. CNN. Retrieved from https://edition.cnn.com/2022/04/23/politics/humanitarian-aid-ukraine-war-cyberattacks/
Meaker, M. (2019). China is trolling and hacking Uighur exiles across the world. WIRED UK. Retrieved from https://www.wired.co.uk/article/china-uighur-hacking
Millward, J., & Peterson, D. (2020). China’s system of oppression in Xinjiang: How it developed and how to curb it. Global China: Assessing China’s Growing Role in the World. Retrieved from https://www.brookings.edu/wp-content/uploads/2020/09/FP_20200914_china_oppression_xinjiang_millward_peterson.pdf
Moran, T., & Orlov, I. (2019). Simple proofs of space-time and rational proofs of storage. Advances in Cryptology – CRYPTO 2019, 381–409. https://doi.org/10.1007/978-3-030-26948-7_14
Moreau, Y. (2019). Crack down on genomic surveillance. Nature, 576(7785), 36–38. https://doi.org/10.1038/d41586-019-03687-x
Mozur, P. (2019). One month, 500,000 Face Scans: How China is using A.I. to profile a minority. The New York Times. Retrieved from https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html
Pomerantz, O. (2021). Merkle proofs for offline data integrity Etherum Foundation. Retrieved from https://ethereum.org/en/developers/tutorials/merkle-proofs-for-offline-data-integrity/
Protocol Labs. (2017). Filecoin: A decentralized storage network [White Paper]. Retrieved from https://filecoin.io/filecoin.pdf
Qu, Y. (2021). Extending grassroots power and mobilizing the people. Xinjiang Documentation Project. Retrieved from https://xinjiang.sppga.ubc.ca/critical-scholarship/project-reports/extending-grassroots-power-and-mobilizing-the-people/
Ramzy, A., & May, T. (2021). “Hong Kong cracks down on a pro-democracy newspaper”. The New York Times. Retrieved from https://www.nytimes.com/2021/06/16/world/asia/hong-kong-apple-daily.html
Rehman, E., Khan, M. A., Soomro, T. R., Taleb, N., Afifi, M. A., & Ghazal, T. M. (2021). Using Blockchain to ensure trust between donor agencies and NGOs in under-developed countries. Computers, 10(8), 98. MDPI AG. Retrieved from https://doi.org/10.3390/computers10080098
Reuters. (2018). China upset as Interpol removes wanted alert for exiled Uighur leader. Retrieved from https://www.reuters.com/article/us-china-xinjiang-idUSKCN1G80FK
Rickleton, C. (2021). China hounds Xinjiang data collectors. Eurasianet. Retrieved from https://eurasianet.org/china-hounds-xinjiang-data-collectors
Roberts, S. R. (2021). The roots of cultural genocide in Xinjiang. Foreign Affairs. Retrieved from https://www.foreignaffairs.com/articles/china/2021-02-10/roots-cultural-genocide-xinjiang
Rollet, C. (2018). Hikvision wins Chinese government forced facial recognition project across 967 mosques. IPVM. Retrieved from https://ipvm.com/reports/hik-mosques
Ruser, N., Leibold J., Munro K., & Hoja, T. (2020). Cultural erasure: Tracing the destruction of Uyghur and Islamic spaces in Xinjiang (Policy Brief No. 38). Australian Strategic Policy Institute. Retrieved from https://www.aspi.org.au/report/cultural-erasure.
Salimjan, G. (2021a). Camp land: Settler ecotourism and Kazakh dispossession in contemporary Xinjiang. Lausan. Retrieved from https://lausan.hk/2021a/camp-land/
Salimjan, G. (2021b). Naturalized violence: Affective politics of China’s ‘ecological civilization’ in Xinjiang. Human Ecology: An Interdisciplinary Journal, 49(1), 59–68. https://doi.org/10.1007/s10745-020-00207-8
Sarin, A., & Kim, S. (2018). Distributed ledger and Blockchain technology: Frameworks and use cases. Journal of Investment Management. https://doi.org/10.2139/ssrn.3373347
Sechenova, M. (2014). Fahrenheit 451 - Burning through The Great Firewall of China. The Indonesian Journal of International & Comparative Law, 283–314.
Takahashi, D. (2021). USC and Stanford launch Starling Lab to protect human rights with decentralization. VentureBeat. Retrieved from https://venturebeat.com/2021/06/10/usc-and-stanford-launch-starling-lab-to-protect-human-rights-with-decentralization/
Tatar, U., Gokce, Y., & Nussbaum, B. (2020). Law versus technology: Blockchain, GDPR, and tough tradeoffs. Computer Law & Security Review. https://doi.org/10.1016/j.clsr.2020.105454
The InterPARES Project. (2018). (rep.). Glossary - InterPARES 2 project book. Retrieved from http://www.interpares.org/ip2/display_file.cfm?doc=ip2_glossary.pdf
Tofox A Stanford Project. (2011). The Great Firewall of China: Background. Retrieved from https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/FreedomOfInformationChina/the-great-firewall-of-chinabackground/index.html
Truong, N. B., Jayasinghe, U., Um, T.-W., & Lee, G. M. (2016). A survey on trust computation in the Internet of Things. Information and Communication: Journal of the Korean Telecommunications Society, 33(2).
Ullah, A. (2020). Uighur scholar fears deportation from Saudi Arabia. Middle East Eye. Retrieved from https://www.middleeasteye.net/news/uighur-china-saudi-arabia-scholar-deportation
United Nations Department of Economic and Social Affairs. (2007). United Nations declaration on the rights of indigenous peoples for indigenous peoples. Retrieved from https://www.un.org/development/desa/indigenouspeoples/declaration-on-the-rights-of-indigenous-peoples.html
Unrepresented Nations & Peoples Organization. (2015). East Turkestan. UNPO. Retrieved from https://unpo.org/members/7872
Wang, M. (2018). "Eradicating ideological viruses". Human Rights Watch. Retrieved from https://www.hrw.org/report/2018/09/09/eradicating-ideological-viruses/chinas-campaign-repression-against-xinjiangs
Wolfe, P. (2006). Settler colonialism and the elimination of the native. Journal of Genocide Research, 8(4), 387–409. https://doi.org/10.1080/14623520601056240
Wood, C. (2021). “Why Atajurt’s brief YouTube suspension matters”. The Diplomat. Retrieved from https://thediplomat.com/2021/06/why-atajurts-brief-youtube-suspension-matters/
Woodall, A., & Ringel, S. (2019). Blockchain archival discourse: Trust and the imaginaries of digital preservation. New Media & Society, 22(12), 2200–2217. https://doi.org/10.1177/1461444819888756
World Food Programme. (2016). Building Blocks. In Center for Innovation and Partnerships (pp.1–2). Université de Genève. Retrieved from https://www.unige.ch/gsem/files/5815/8858/2412/Building_Blocks_website.pdf
World Food Programme. (2017). Building Blocks- The future of cash disbursements at the World Food Programme. Retrieved from https://unite.un.org/sites/unite.un.org/files/session_2_wfp_building_blocks_20170816_final.pdf
World Food Programme. (2022). Building Blocks Blockchain network for humanitarian assistance- Graduated Program. Retrieved from https://innovation.wfp.org/project/building-blocks
Yi, X. (2019). Recruiting loyal stabilisers: On the banality of carceral colonialism in Xinjiang. Made in China Journal, 4(3). https://madeinchinajournal.com/2019/10/25/recruiting-loyal-stabilisers-on-the-banality-of-carceral-colonialism-in-xinjiang/
Zenz. A. (2017). Chen Quanguo: The strongman behind Beijing’s securitization strategy in Tibet and Xinjiang. China Brief, 17(12). Retrieved from https://jamestown.org/program/chen-quanguo-the-strongman-behindbeijings-securitization-strategy-in-tibet-and-xinjiang/
Zuo, H., Wang, L., & Qin, J. (2017). XJU1: A Chinese ethnic minorities face database. International Conference on Machine Vision and Information Technology, 2017, 7–11. https://doi.org/10.1109/CMVIT.2017.17
Funding
Preliminary research for this paper was funded in part by the Natural Science and Engineering Research Council of Canada.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare no competing interests.
Rights and permissions
About this article
Cite this article
Hellstern, R., Park, D.C., Lemieux, V. et al. Leveraging Blockchain-Based Archival Solutions for Sensitive Documentation: a Xinjiang Case Study. DISO 1, 4 (2022). https://doi.org/10.1007/s44206-022-00007-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s44206-022-00007-1