Feeds

Twitter plans Chinese presence

But don't hold your breath

Choosing a cloud hosting partner with confidence

Google may be "99.9 per cent" certain that it will leave China, but Twitter will instead move into the Middle Kingdom.

Eventually.

Or so Twitter creator Jack Dorsey told a New York gathering sponsored by news site ReadWriteWeb. According to a report in Tuesday's New York Times, Dorsey was asked by Chinese artist and activist Ai Weiwei if Chinese-language access to Twitter would appear.

"I would say yes," Dorsey - who was participating from a remote hook-up - responded. "It's just a matter of time."

The key word in Dorsey's response, of course, is "time". Whether he was referring to internet time or geological time, he didn't say. There are numerous time-consuming obstacles to creating a Chinese twitter, both technological and political.

On the tech side, there's the fact that there are a number of different character codes for creating Chinese text. The web may support the most universally popular of these - Unicode - but as the NYT rightly points out, few cell-phone SMS systems do. And SMS texting is the weapon of choice for active activists from China to Tehran to Naypyidaw to T'bilisi to Chişinău.

Then there's the task of getting around the Great Firewall of China - which is both a technical and a political challenge. As the Tor Project has proved, doing so is possible, but as the old US civil rights song noted, "Freedom Is a Constant Struggle."

The power of a Chinese Twitter could be enormous, however. In that locked-down, heavily regulated, overtly censored state, short bursts of "here's what's going on" news could assist activists' efforts to keep tabs on government activities - and on each other.

Besides, as Ai pointed out to the NYT, the character-as-word structure of the Chinese language could enable richer tweets: "At 140 words, in Chinese," he said, "you can really write a novel. You can discuss most profound ideas really to democracy, freedom, poetry."

If Dorsey wasn't just blowing smoke, Twitter - although it would surely face attacks from the Chinese government - could provide Ai and his compatriots with a potent information platform.

Eventually. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.