Feeds

Beijing to get free Wi-Fi with obvious strings attached

Mobile number needed to access 480,000 hotspots

Boost IT visibility and business value

Over the next five years Beijing will get 480,000 free Wi-Fi hotspots, but using them will require a mobile number and an agreement to have your activities tracked and monitored.

The network is being put together by China Mobile, China Unicom and China Telecom, and will be free to use for least the next three years. However, access will require one to hand over your mobe's number, which can be used to "trace those whose online activity might endanger social security", China.org was told.

The Beijing network could well be the largest municipal Wi-Fi network in the world, with 90,000 hotpots to be live by the end of 2011 and another 390,000 being connected over the next five years. But by the time it's finished time users might be expected to pay for access as well as being tracked at every turn, as free access is only being offered until the tail end of 2014.

Not that locals seems worried about government snooping: internet usage is already notoriously restricted in China. The real concern is that creating a link between a mobile phone number and a web browsing history (plus a physical location) will open the door to even more mobile spam.

The Chinese are bombarded with advertising pushed to their handsets, and some argue that a few more ads won't make a significant difference. The state's officials are saying the data won’t be sold off to private companies, but Beijing residents don't seem to be as trusting as the wonks might hope. ®

Seven Steps to Software Security

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.