Feeds

Skype uses peer pressure defense to explain China text censorship

Following orders and examples

Boost IT visibility and business value

VoIP firm Skype has admitted that its Chinese partner filters instant messages sent using its software to comply with local censorship laws. Tom Online, Skype's joint venture partner in China, has "implemented a text filter, which is what everyone else in that market is doing. Those are the regulations", Skype chief executive Niklas Zennstrom told the Financial Times.

The technology blocks messages containing phrases such as "Falun Gong" and "Dalai Lama" to satisfy local laws. China, along with the US and Germany, are the three biggest markets for Skype in terms of active users of its free internet telephony service, so it's not entirely surprising that the eBay subsidiary has taken the same stance as Google and other US high tech firms in kowtowing to Beijing's demands.

Yahoo! has been strongly criticised for handing over email data to the Chinese authorities that assisted in the prosecution and imprisonment of three dissidents.

On Wednesday, pressure group Reporters Without Borders highlighted the case of Jiang Lijun, 39, who was jailed on subversion charges for four years in November 2003. The evidence against Jiang reportedly came in the form of draft emails stored in his Yahoo! account, which the internet giant's Hong Kong subsidiary handed over to prosecutors.

Zennstrom said the censorship actions of Tom Online avoided putting Chinese users of Skype at similar risk. "Those things are in no way jeopardising the privacy or the security of any of the users," he said. ®

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.