Feeds

Google China uncensors verboten tank man

Search engine breaks law against Google will

Intelligent flash storage arrays

Google's Chinese search engine was defying local law on Tuesday by returning links involving the 1989 Tiananmen Square protests and the Xinjiang independence movement, according to a report from NBC News.

Google did not immediately respond to a request for comment, but the company tells NBC that despite its January 12 announcement that it has decided to "no longer" censor search results in China, it is continuing to do so. ""We have not changed our operations," the web giant said.

Nonetheless, NBC was able to access previously-censored links from Google.cn, including the famous 1989 image of a lone man blocking a line of Chinese tanks in Tiananmen Square. A search for "tank man" in Chinese characters on the search engine returned just one link to the photo - though several are available from the company's engine overseas.

Meanwhile, searching for "Tiananmen Square massacre", "Xinjiang independence" and "Tibet Information Network" turned up long lists of previously censored results.

NBC did say, however, that search results were erratic and that in some cases, access to verboten sites was indeed denied. One can only assume that Google.cn was experiencing some sort of wonderfully convenient technical difficulties. Or that someone was having some fun.

In mid-January, in response to an alleged Chinese hack on its internal systems, Google said it would enter talks with the Chinese government to determine "the basis on which we could operate an unfiltered search engine within the law, if at all". But talks continue to drag on - apparently - and Google CEO Eric Schmidt says the company has "no timetable" for their completion.

This has caused "extreme pain" for Google's Chinese ad partners, who are demanding that the web giant explain how they will be compensated if it shuts its Chinese search engine or leaves the country entirely. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.