Feeds

Twitter plans Chinese presence

But don't hold your breath

Top three mobile application threats

Google may be "99.9 per cent" certain that it will leave China, but Twitter will instead move into the Middle Kingdom.

Eventually.

Or so Twitter creator Jack Dorsey told a New York gathering sponsored by news site ReadWriteWeb. According to a report in Tuesday's New York Times, Dorsey was asked by Chinese artist and activist Ai Weiwei if Chinese-language access to Twitter would appear.

"I would say yes," Dorsey - who was participating from a remote hook-up - responded. "It's just a matter of time."

The key word in Dorsey's response, of course, is "time". Whether he was referring to internet time or geological time, he didn't say. There are numerous time-consuming obstacles to creating a Chinese twitter, both technological and political.

On the tech side, there's the fact that there are a number of different character codes for creating Chinese text. The web may support the most universally popular of these - Unicode - but as the NYT rightly points out, few cell-phone SMS systems do. And SMS texting is the weapon of choice for active activists from China to Tehran to Naypyidaw to T'bilisi to Chişinău.

Then there's the task of getting around the Great Firewall of China - which is both a technical and a political challenge. As the Tor Project has proved, doing so is possible, but as the old US civil rights song noted, "Freedom Is a Constant Struggle."

The power of a Chinese Twitter could be enormous, however. In that locked-down, heavily regulated, overtly censored state, short bursts of "here's what's going on" news could assist activists' efforts to keep tabs on government activities - and on each other.

Besides, as Ai pointed out to the NYT, the character-as-word structure of the Chinese language could enable richer tweets: "At 140 words, in Chinese," he said, "you can really write a novel. You can discuss most profound ideas really to democracy, freedom, poetry."

If Dorsey wasn't just blowing smoke, Twitter - although it would surely face attacks from the Chinese government - could provide Ai and his compatriots with a potent information platform.

Eventually. ®

Top three mobile application threats

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.