Feeds

HK movie star porn snap thief faces trial

Allegedly swiped intimate pics from Edison Chen's laptop

Secure remote control for conventional and virtual desktops

The man allegedly responsible for copying and distributing 1,300 compromising photos of Hong Kong film star Edison Chen has pleaded not guilty to "three charges of obtaining access to a computer with a view to making dishonest gain".

Sze Ho-chun, 24, appeared in Kowloon City Court accused of copying the snaps from Chen's laptop between 1 and 8 June 2006, while working at a computer repair shop. The pictures in question show Chen engaged in various sexual activities with female stars, including fellow thesp Cecilia Cheung and popstress Gillian Chung.

According to the BBC, prosecutors state "some time after those dates, he showed some of the images to two female customers before giving a CD with all 1,300 images on to one of them".

In February 2008, the images surfaced on the internet, causing an almighty rumpus in China. Canada-born Chen jumped ship to his native land and, suitably repentant, said he'd exit showbusiness "indefinitely".

In fact, having appeared in last year's The Dark Knight, he turned up earlier this week at a press conference in Singapore to punt his latest movie The Sniper - despite having received death threats to keep a low profile. He told AFP: "I'm a little afraid, but I have to do what needs to be done so I hope everyone will welcome me and watch my movie." ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.