Feeds

Snowden, schmoden. Let's talk about crushing hackers, say US'n'China

America's web snooping doesn't derail cosy security confab

Secure remote control for conventional and virtual desktops

China and the US were able to set aside their cyber-spying-oneupmanship at a meeting yesterday, with officials from both sides agreeing to improving cooperation in tackling hackers.

Before representatives met to talk about computer security defences, China had made much of whistleblower Edward Snowden's revelations about the NSA's PRISM electronic surveillance programme - and how American pots shouldn't be calling any kettles black, while the US continued to harp on about commercial cyber attacks and theft of blueprints.

But Chinese state news agency Xinhua said despite their differences, the talks had gone well.

"The two sides held candid in-depth discussions on cybersecurity, including the mechanism of a bilateral cyber working group, international cyberspace rules, and measures to boost dialogue and cooperation on cybersecurity," the agency said.

"Both sides expressed the willingness to improve the mechanism of the cyber working group on the basis of mutual respect and equality so that it can play a positive role in enhancing mutual trust, reducing mutual suspicion, managing disputes and expanding cooperation."

The US State Department agreed with the Chinese assessment of the meeting, saying that discussions were "constructive".

"I think we could say both sides made practical proposals to increase our cooperation and build greater understanding and transparency between the two sides. We also raised issues concerning cyber-enabled economic theft," an official told reporters.

"We expect this meeting will be the start of substantive and a sustained discussions between the United States and China on cyber issues."

Another official said that the US was focused on "cyber-enabled theft of intellectual property" in the talks and not on the alleged hacking in connection with PRISM into Chinese telcos and the country's Tsinghua University.

The talks were held just ahead of the fifth China-US Strategic and Economic Dialogue, where Vice Premier Wang Yang and State Councillor Yang Jiechi will meet with Secretary of State John Kerry and Treasury Secretary Jacob Lew to discuss all sorts of political, economic and security topics. ®

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Microsoft EU warns: If you have ties to the US, Feds can get your data
European corps can't afford to get complacent while American Big Biz battles Uncle Sam
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.