Feeds

China's lifting of internet blockade denied by state media

Party mouthpiece says Great Firewall will stay in Shanghai zone

High performance access to file storage

Hopes that the Chinese government was about to relax its strict internet censorship regime in Shanghai appear to have been dashed after state-run media ran stories denying previous reports.

An “exclusive” from Hong Kong’s South China Morning Post on Tuesday, referencing anonymous government sources, claimed that the Great Firewall would be lifted inside the new Shanghai Free Trade Zone (FTZ).

The mooted plan, which would have allowed access to blocked sites such as Facebook and Twitter, was said by one source to help foreigners working in the zone to “feel like at home”.

However, Communist Party mouthpiece the People’s Daily has hit back, claiming from its own unnamed sources that the story is not correct, and that “internet management measures” inside the zone will not be any different from those elsewhere in China.

There will be a strict crack down on any pornography, gambling, drugs or smuggling in the zone, it added, re-emphasising the point that the FTZ will not be allowed to function in a bubble, removed from the rest of China.

There was no news in the report, which Xinhua has recapped in English, about the other claim made by the SCMP – that foreign telcos would be allowed to compete directly against China’s state-run firms to supply internet services in the 28km2 FTZ.

Xi Jinping and his new administration is currently overseeing one of the most severe clamp downs on internet freedom in years, with online rumour-mongers now facing jail time for erroneous tweets.

In this context, an “internet concession” in Shanghai was always looking unlikely – at least at this point in China’s history.

The original story may have been either wishful thinking or an attempt by officials to gain more publicity for the FTZ – a pet project of premier Li Keqiang which it is hoped will spur greater foreign trade and investment and help open the yuan to international markets.

In the meantime, MNCs and employees in the People’s Republic will just have to rely on that old staple the VPN for access to an unfettered internet, or check-in to a luxury hotel, most of which offer the same for tourists. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.