Feeds

Great Firewall springs a leak: Chinese flood Obama's Google+ page

Free speech? In China?

High performance access to file storage

China’s infamous tool of internet censorship the Great Firewall appeared to fail last week, allowing hundreds of web users in the People’s Republic to access and post comments on US president Barack Obama’s Google+ page.

Google’s social networking service is blocked in China – like many other sites including Facebook and Twitter – for fear that it could provide a platform for social and political dissent. The Communist Party enforces its stance with a range of country-wide internet monitoring and IP-blocking technologies collectively known as the Golden Shield Project.

However, the leader of the Western world’s Google+ page was flooded with users posting in the simplified Chinese of the mainland from Friday, with content reportedly focused on issues of democracy and censorship in China.

Of those posting in English, some were clearly just happy to be there, while others used their time on the site to asking for freedom for political prisoners such as blind lawyer Chen Guangcheng and human rights activist Liu Xiaobo.

Several more claimed they were staging their own tongue-in-cheek ‘Occupy’ protest on the president’s Google+ page.

Another, clearly astonished at the sudden influx of Mandarin on the site, wondered aloud whether Google had been bought by Baidu overnight.

Some claimed that Google+ had been available in China since the beginning of the week, although most comments in Chinese appeared on posts on Obama’s page from Friday through to Sunday. It’s pretty clear from reading them that he’s more popular in China than in the US at the moment.

The party may be over for those Obama-mad Chinese web users, however, with online censorship monitoring site greatfire.org claiming that the pages are now being blocked as usual.

It’s still unclear what caused the failure of the Golden Shield. While it’s one of the most sophisticated and large-scale systems of its kind on the planet, it’s not infallible – although this has certainly been the most high-profile breach in recent memory. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.