Feeds

Twitter plans Chinese presence

But don't hold your breath

Intelligent flash storage arrays

Google may be "99.9 per cent" certain that it will leave China, but Twitter will instead move into the Middle Kingdom.

Eventually.

Or so Twitter creator Jack Dorsey told a New York gathering sponsored by news site ReadWriteWeb. According to a report in Tuesday's New York Times, Dorsey was asked by Chinese artist and activist Ai Weiwei if Chinese-language access to Twitter would appear.

"I would say yes," Dorsey - who was participating from a remote hook-up - responded. "It's just a matter of time."

The key word in Dorsey's response, of course, is "time". Whether he was referring to internet time or geological time, he didn't say. There are numerous time-consuming obstacles to creating a Chinese twitter, both technological and political.

On the tech side, there's the fact that there are a number of different character codes for creating Chinese text. The web may support the most universally popular of these - Unicode - but as the NYT rightly points out, few cell-phone SMS systems do. And SMS texting is the weapon of choice for active activists from China to Tehran to Naypyidaw to T'bilisi to Chişinău.

Then there's the task of getting around the Great Firewall of China - which is both a technical and a political challenge. As the Tor Project has proved, doing so is possible, but as the old US civil rights song noted, "Freedom Is a Constant Struggle."

The power of a Chinese Twitter could be enormous, however. In that locked-down, heavily regulated, overtly censored state, short bursts of "here's what's going on" news could assist activists' efforts to keep tabs on government activities - and on each other.

Besides, as Ai pointed out to the NYT, the character-as-word structure of the Chinese language could enable richer tweets: "At 140 words, in Chinese," he said, "you can really write a novel. You can discuss most profound ideas really to democracy, freedom, poetry."

If Dorsey wasn't just blowing smoke, Twitter - although it would surely face attacks from the Chinese government - could provide Ai and his compatriots with a potent information platform.

Eventually. ®

Internet Security Threat Report 2014

More from The Register

next story
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.