Feeds

Great Firewall springs a leak: Chinese flood Obama's Google+ page

Free speech? In China?

Choosing a cloud hosting partner with confidence

China’s infamous tool of internet censorship the Great Firewall appeared to fail last week, allowing hundreds of web users in the People’s Republic to access and post comments on US president Barack Obama’s Google+ page.

Google’s social networking service is blocked in China – like many other sites including Facebook and Twitter – for fear that it could provide a platform for social and political dissent. The Communist Party enforces its stance with a range of country-wide internet monitoring and IP-blocking technologies collectively known as the Golden Shield Project.

However, the leader of the Western world’s Google+ page was flooded with users posting in the simplified Chinese of the mainland from Friday, with content reportedly focused on issues of democracy and censorship in China.

Of those posting in English, some were clearly just happy to be there, while others used their time on the site to asking for freedom for political prisoners such as blind lawyer Chen Guangcheng and human rights activist Liu Xiaobo.

Several more claimed they were staging their own tongue-in-cheek ‘Occupy’ protest on the president’s Google+ page.

Another, clearly astonished at the sudden influx of Mandarin on the site, wondered aloud whether Google had been bought by Baidu overnight.

Some claimed that Google+ had been available in China since the beginning of the week, although most comments in Chinese appeared on posts on Obama’s page from Friday through to Sunday. It’s pretty clear from reading them that he’s more popular in China than in the US at the moment.

The party may be over for those Obama-mad Chinese web users, however, with online censorship monitoring site greatfire.org claiming that the pages are now being blocked as usual.

It’s still unclear what caused the failure of the Golden Shield. While it’s one of the most sophisticated and large-scale systems of its kind on the planet, it’s not infallible – although this has certainly been the most high-profile breach in recent memory. ®

Security for virtualized datacentres

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.