Feeds

Twitter cosies up to governments with country-level filters

The tweets must flow, unless we're told they shouldn't...

Intelligent flash storage arrays

Micro-blogging phenomenon Twitter has modified its commitment to the free flow of information online by adding a new feature enabling the removal of users' tweets at a country level while allowing them to be viewed elsewhere.

In a move many will see as a thinly veiled attempt to cosy up to repressive regimes and maybe even make its service China-friendly, Twitter said that the update would help it comply with local laws.

Previously the firm was only able to block tweets on a global level. A user will know if content has been removed because they will see a grayed out tweet in their timeline indicating access has been withheld.

Here’s what Twitter had to say:

As we continue to grow internationally, we will enter countries that have different ideas about the contours of freedom of expression. Some differ so much from our ideas that we will not be able to exist there. Others are similar but, for historical or cultural reasons, restrict certain types of content, such as France or Germany, which ban pro-Nazi content.

Until now, the only way we could take account of those countries’ limits was to remove content globally. Starting today, we give ourselves the ability to reactively withhold content from users in a specific country — while keeping it available in the rest of the world. We have also built in a way to communicate transparently to users when content is withheld, and why.

Rather compassionately, Twitter said it hasn’t yet used these new powers.

It added that in the spirit of transparency it had created a new page in collaboration with cease and desist site Chilling Effects designed to make it easier for users to find notices asking Twitter to block content.

It wasn’t always this way.

Twitter was at the centre of the Arab Spring uprisings where it acted as a platform for free speech and helped protesters spread their message and organise themselves. In fact it was so successful that Hosni Mubarak’s regime blocked the service as part of its desperate attempt to cling on to power in Egypt. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.