Status of Chinese People

About China and Chinese people's living condition

  • China Organ Harvesting Report, in 19 languages

  • Torture methods used by China police

  • Censorship

  • Massive protests & riots in China

  • Top 9 Posts (In 48 hours)

  • All Topics

  • Books to Read

    1. A China More Just, Gao Zhisheng
    2.Officially Sanctioned Crime in China, He Qinglian
    3.
    Will the Boat Sink the Water? Chen Guidi, Wu Chuntao
    4.
    Losing the New China, Ethan Gutmann
    5.
    Nine Commentaries on The Communist Party, the Epochtimes
  • Did you know

    Reporters Without Borders said in it’s 2005 special report titled “Xinhua: the world’s biggest propaganda agency”, that “Xinhua remains the voice of the sole party”, “particularly during the SARS epidemic, Xinhua has for last few months been putting out news reports embarrassing to the government, but they are designed to fool the international community, since they are not published in Chinese.”
  • RSS Feeds for Category

    Organ Harvesting

    Human Rights

    Made in China

    Food

    Health

    Environment

    Protest

    Law

    Politics

    Feed address for any specific category is Category address followed by 'Feed/'.

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 223 other followers

Archive for the ‘Software’ Category

Chinese Site Bans Censorship Evading Software- VPN

Posted by Author on August 24, 2011


(BEIJING) — A major Chinese online commerce site has banned sales of software used to bypass Internet censorship amid Beijing’s efforts to block the development of a Middle East-style protest movement.

But Taobao.com, part of e-commerce giant Alibaba Group, said it took the action on its own and received no official order.

A notice on Taobao.com said virtual private networks and Internet protocol proxies were being used to illegally visit foreign websites. It told merchants that use the site to stop selling them and said the accounts of violaters might be canceled. (See China’s ‘first blogger’ on censorship, creativity and dissent.) Read the rest of this entry »

Posted in Business, censorship, China, Internet, News, Politics, Software, Technology, World | Comments Off on Chinese Site Bans Censorship Evading Software- VPN

China Steps Up Web Monitoring, Driving Many Wi-Fi Users Away- Costly Web monitoring software required installed

Posted by Author on July 26, 2011


BEIJING — New regulations that require bars, restaurants, hotels and bookstores to install costly Web monitoring software are prompting many businesses to cut Internet access and sending a chill through the capital’s game-playing, Web-grazing literati who have come to expect free Wi-Fi with their lattes and green tea.

The software, which costs businesses about $3,100, provides public security officials the identities of those logging on to the wireless service of a restaurant, cafe or private school and monitors their Web activity. Those who ignore the regulation and provide unfettered access face a $2,300 fine and the possible revocation of their business license.

“From the point of view of the common people, this policy is unfair,” said Wang Bo, the owner of L’Infusion, a cafe that features crepes, waffles and the companionship of several dozing cats. “It’s just an effort to control the flow of information.” Read the rest of this entry »

Posted in Beijing, censorship, China, Internet, News, Politics, Social, Software, Technology, World | Comments Off on China Steps Up Web Monitoring, Driving Many Wi-Fi Users Away- Costly Web monitoring software required installed

‘Most Sophisticated’ Android Trojan Surfaces in China

Posted by Author on December 30, 2010


pcmag.com, Dec. 30, 2010 –

Geinimi, a highly sophisticated Trojan, has been detected in Android devices in China.

However, it appears to be more of a sign of things to come rather than a serious threat to U.S. Android users.

Dubbed Geinimi (a scrambulation of Gemini) by Lookout Mobile Security, a startup based in San Francisco, the botnet-like Trojan sends location information, device identity and even stored contacts to an unknown server.

According to Lookout co-founder Kevin MaHaffe, the most significant feature of Geinimi is its sophisticated command-and-control mechanism. Read the rest of this entry »

Posted in China, Mobile Phone, News, Software, Technology, Virus, World | Comments Off on ‘Most Sophisticated’ Android Trojan Surfaces in China

Chinese Antivirus Companies Create the Viruses They Kill

Posted by Author on December 12, 2010


By Li Ping, Epoch Times Staff, Dec 12, 2010-

A well-placed Chinese security official has been given a suspended death sentence for taking bribes in exchange for his role in an antivirus software fraud scheme.

Yu Bing, former director of the Internet monitoring department of Beijing’s Public Security Bureau, had his agency send out a “virus warning” telling the public to download software from the company Rising Antivirus, to combat a particular computer virus.

But that virus was itself devised by Rising Antivirus, who bribed Yu to send out an email to drum up business, according to a Dec. 2 First Financial Daily report. Read the rest of this entry »

Posted in Business, China, Company, News, Software, Technology, Virus, World | Comments Off on Chinese Antivirus Companies Create the Viruses They Kill

Time to reboot our push for global Internet freedom (esp. in Country such as China)

Posted by Author on October 25, 2010


By Jackson Diehl, Via The Washington Post, Monday, October 25, 2010 –

Last Tuesday 215,646 Internet users in Iran evaded their regime to visit sites such as Facebook, Twitter and RadioFarda.com, the U.S.-funded Persian-language news service. In Syria, 14,886 people freely surfed; in Vietnam, 10,612; in Saudi Arabia, 14,691; in China, 18,000.

I know this because I saw the internal logs of a company called UltraReach, which created and manages a firewall-breaching system that is allowing as many as half a million people a day to visit Web sites banned by their governments, and circumvent or avoid detection. To watch the traffic stream through the company’s servers is to see a parade of the world’s most oppressed people. In the few minutes I watched I also saw Cubans, Burmese, Uzbeks, Belarusians, Algerians, Cambodians and Libyans traveling via an Internet link to Northern California, where they were able to visit any non-pornographic site without being blocked or identified. Read the rest of this entry »

Posted in Anti-censorship, China, GIFC, Human Rights, Internet, News, Politics, Social, Software, Technology, USA, World | Comments Off on Time to reboot our push for global Internet freedom (esp. in Country such as China)

Microsoft boss decries software piracy by China firms

Posted by Author on October 9, 2010


MADRID — Microsoft chief executive Steve Ballmer on Friday decried the use of pirated software by Chinese businesses.

“One of the things that has improved a lot around the world is business piracy, and yet when we look at China today business piracy is more extreme than consumer piracy,” he told a business forum in Madrid. Read the rest of this entry »

Posted in Business, China, Company, Microsoft, News, Software, Technology, World | Comments Off on Microsoft boss decries software piracy by China firms

Google ditches Windows on security concerns after China hack

Posted by Author on June 1, 2010


By David Gelles and Richard Waters in San Francisco, The Financial Times, May 31 2010 –

Google is phasing out the internal use of Microsoft’s ubiquitous Windows operating system because of security concerns, according to several Google employees.

The directive to move to other operating systems began in earnest in January, after Google’s Chinese operations were hacked, and could effectively end the use of Windows at Google, which employs more than 10,000 workers internationally.

“We’re not doing any more Windows. It is a security effort,” said one Google employee.

“Many people have been moved away from [Windows] PCs, mostly towards Mac OS, following the China hacking attacks,” said another.

New hires are now given the option of using Apple’s Mac computers or PCs running the Linux operating system. “Linux is open source and we feel good about it,” said one employee. “Microsoft we don’t feel so good about.”

In early January, some new hires were still being allowed to install Windows on their laptops, but it was not an option for their desktop computers. Google would not comment on its current policy.

Windows is known for being more vulnerable to attacks by hackers and more susceptible to computer viruses than other operating systems. The greater number of attacks on Windows has much to do with its prevalence, which has made it a bigger target for attackers.

Employees wanting to stay on Windows required clearance from “quite senior levels”, one employee said. “Getting a new Windows machine now requires CIO approval,” said another employee.

In addition to being a semi-formal policy, employees themselves have grown more concerned about security since the China attacks. “Particularly since the China scare, a lot of people here are using Macs for security,” said one employee……. (mor details from The Financial Times)

Posted in Company, Computer, Economy, Google, News, Software, Technology, World | 1 Comment »

The Mystery of Falun Gong

Posted by Author on May 13, 2010


By David Matas, International human rights lawyer, via The Washington Post, May. 12, 2010-

Last year, as millions of Iranians flocked online to tell stories of political repression and police violence, the world was introduced to an unlikely champion in the fight for freedom of information online: the spiritual practice Falun Gong. American practitioners of Falun Gong, it turned out, had spent nearly a decade developing and refining the most effective and widely used anti-censorship software in the world — software that has been instrumental in the free flow of information to and from closed societies.

Who are Falun Gong and what drove them to build anti-censorship software?

The Government of China recognizes five beliefs and bans all others, including Falun Gong. Falun Gong is a modern update and blending of two religions China does recognize – Taoism and Buddhism, combined with a simple set of exercises. Of all the banned beliefs, none is treated worse than Falun Gong, banned in July 1999.

Practitioners of Falun Gong represent two-thirds of the Chinese torture victims and half the people in detention in re-education through labour camps. The documented yearly arbitrary killings and disappearances of Falun Gong exceed by far the totals for any other victim group. According to research that David Kilgour and I have done, set out in our book Bloody Harvest, practitioners have been killed in the tens of thousands since 2001 so that their organs could be sold to patients in need of transplants.

The extremes of language the Chinese regime uses against Falun Gong are unparalleled. The Government of China has imposed a censorship blackout on independent information about Falun Gong. Chinese internet police block any mention of Falun Gong – other than their own propaganda – on websites, blogs, e-mails and search engines.

Why is this happening? One answer is the numbers. The practice of Falun Gong went from a standing start in 1992 to numbers greater than the membership of the Party within the space of seven years, spreading rapidly throughout China immediately after the Tiananmen Square massacre, the collapse of the Soviet Union and the loss of Communist Party control in Central Asia and Eastern and Central Europe.

The Party took fright at seeing Chinese nationals in the tens of millions engaging publicly in a form of exercise which had an underlying belief system completely divorced from Communism. Falun Gong is not an organization. The exercises can be done anywhere at any time, as little or as often as the practitioner wants. They can be done singly or in groups, indoors or outdoors. The amorphous nature meant that it was impossible to control.

The early stages of propaganda and repression against the practice of Falun Gong by elements of the Party pushing to have the Party ban the practice led to petitions and protests by practitioners, generated through cell phone and internet coordination. The mobilization of Falun Gong practitioners alarmed and frightened the Communist Party.

For the Communists, victimizing the Falun Gong is a crime which is easier to get away with than victimizing other, better known groups. Falun Gong victims are often people without Western connections or Western languages.

The incitement to hatred against the Falun Gong, like all incitement to bigotry, has an impact. The Chinese Communist Party noise about the practice of Falun Gong confuses and obscures.

The Falun Gong are an outgrowth from ancient Chinese traditions. To the Chinese Communist Party, Falun Gong was a regression back to where China was before the Communist Party took over.

The problem for the Communists was not just that Falun Gong is so authentically Chinese; it is also that Communism is so patently foreign.

Communism is a Western ideological import into China. Communists saw a widespread, popular Chinese-based ideology as cutting out from under them the very ground on which they stood.

Tolerating the Falun Gong would not have meant the collapse of the current regime. But it would have meant the disappearance of whatever ideological presence the Communist Party had in the hearts and minds of the Chinese people.

Jiang Zemin, in a leaked memorandum sent to the standing members of the Political Bureau of Central Committee of the Chinese Communist Party in April 1999, wrote: “Can’t the Marxism our Communists have, the materialism, atheism we believe in really win over that suit of stuff aired by Falun Gong?”

The answer to that question, it seems, is no. Left alone, Falun Gong would have won. So the Party repressed it with a viciousness beyond compare.

David Matas, co-author of “Bloody Harvest: Organ Harvesting of Falun Gong Practitioners in China,” is an international human rights lawyer based in Winnipeg, Canada, and a nominee for the 2010 Nobel Peace Prize.

The Washington Post

Posted in Anti-censorship, China, Freedom of Belief, Freedom of Information, Freedom of Speech, Human Rights, Internet, News, Opinion, Politics, Social, Software, Technology, World | Comments Off on The Mystery of Falun Gong

Why the State Department refused to spend the funds to “expand access and information in closed societies” such as Iran and China

Posted by Author on May 3, 2010


By L. GORDON CROVITZ, via The Wall Street Journal, May.2, 2010-

When a government department refuses to spend money that Congress has allocated, there’s usually a telling backstory. This is doubly so when the funds are for a purpose as uncontroversial as making the Internet freer.

So why has the State Department refused to spend $45 million in appropriations since 2008 to “expand access and information in closed societies”? The technology to circumvent national restrictions is being provided by volunteers who believe that with funding they can bring Web access to many more people, from Iran to China.

A bipartisan group in Congress intended to pay for tests aimed at expanding the use of software that brings Internet access to “large numbers of users living in closed societies that have acutely hostile Internet environments.” The most successful of these services is provided by a group called the Global Internet Freedom Consortium, whose programs include Freegate and Ultrasurf.

When Iranian demonstrators last year organized themselves through Twitter posts and brought news of the crackdown to the outside world, they got past the censors chiefly by using Freegate to get access to outside sites.

The team behind these circumvention programs understands how subversive their efforts can be. As Shiyu Zhou, deputy director of the Global Internet Freedom Consortium, told Congress last year, “The Internet censorship firewalls have become 21st-century versions of Berlin Walls that isolate and dispirit the citizens of closed-society dictatorships.”

Repressive governments rightly regard the Internet as an existential threat, giving people powerful ways to communicate and organize. These governments also use the Web as a tool of repression, monitoring emails and other traffic. Recall that Google left China in part because of hacking of human-rights activists’ Gmail accounts.

To counter government monitors and censors, these programs give online users encrypted connections to secure proxy servers around the world. A group of volunteers constantly switches the Internet Protocol addresses of the servers—up to 10,000 times an hour. The group has been active since 2000, and repressive governments haven’t figured out how to catch up. More than one million Iranians used the system last June to post videos and photos showing the government crackdown.

Mr. Zhou tells me his group would use any additional money to add equipment and to hire full-time technical staff to support the volunteers. For $50 million, he estimates the service could accommodate 5% of Chinese Internet users and 10% in other closed societies—triple the current capacity.

So why won’t the State Department fund this group to expand its reach, or at least test how scalable the solution could be? There are a couple of explanations.

The first is that the Global Internet Freedom Consortium was founded by Chinese-American engineers who practice Falun Gong, the spiritual movement suppressed by Beijing. Perhaps not the favorites of U.S. diplomats, but what other group has volunteers engaged enough to keep such a service going? As with the Jewish refuseniks who battled the Soviet Union, sometimes it takes a persecuted minority to stand up to a totalitarian regime.

The second explanation is a split among technologists—between those who support circumvention programs built on proprietary systems and others whose faith is on more open sources of code. A study last year by the Berkman Center at Harvard gave more points to open-source efforts, citing “a well-established contentious debate among software developers about whether secrecy about implementation details is a robust strategy for security.” But whatever the theoretical objections, the proprietary systems work.

Another likely factor is realpolitik. Despite the tough speech Hillary Clinton gave in January supporting Internet freedom, it’s easy to imagine bureaucrats arguing that the U.S. shouldn’t undermine the censorship efforts of Tehran and Beijing. An earlier generation of bureaucrats tried to edit, as overly aggressive, Ronald Reagan’s 1987 speech in Berlin urging Mikhail Gorbachev: “Tear down this wall.”

It’s true that circumvention doesn’t solve every problem. Internet freedom researcher and advocate Rebecca MacKinnon has made the point that “circumvention is never going to be the silver bullet” in the sense that it can only give people access to the open Web. It can’t help with domestic censorship.

During the Cold War, the West expended huge effort to get books, tapes, fax machines, radio reports and other information, as well as the means to convey it, into closed societies. Circumvention is the digital-age equivalent.

If the State Department refuses to support a free Web, perhaps there’s a private solution. An anonymous poster, “chinese.zhang,” suggested on a Google message board earlier this year that the company should fund the Global Internet Freedom Consortium as part of its defense against Chinese censorship. “I think Google can easily offer more servers to help to break down the Great Firewall,” he wrote.

The Wall Street Journal

Posted in Anti-censorship, Asia, China, Firewall, Freedom of Information, Freedom of Speech, GIFC, Human Rights, Internet, News, Opinion, Politics, Social, Software, Speech, Technology, World | Comments Off on Why the State Department refused to spend the funds to “expand access and information in closed societies” such as Iran and China

Google’s Password Control System attacked by Cyber hacking from China

Posted by Author on April 20, 2010


By JOHN MARKOFF, New York Times, April 19, 2010 –

Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. But a person with direct knowledge of the investigation now says that the losses included one of Google’s crown jewels, a password system that controls access by millions of users worldwide to almost all of the company’s Web services, including e-mail and business applications.

The program, code named Gaia for the Greek goddess of the earth, was attacked in a lightning raid taking less than two days last December, the person said. Described publicly only once at a technical conference four years ago, the software is intended to enable users and employees to sign in with their password just once to operate a range of services.

The intruders do not appear to have stolen passwords of Gmail users, and the company quickly started making significant changes to the security of its networks after the intrusions. But the theft leaves open the possibility, however faint, that the intruders may find weaknesses that Google might not even be aware of, independent computer experts said.

The new details seem likely to increase the debate about the security and privacy of vast computing systems such as Google’s that now centralize the personal information of millions of individuals and businesses. Because vast amounts of digital information are stored in a cluster of computers, popularly referred to as “cloud” computing, a single breach can lead to disastrous losses.

The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program, according to the person with knowledge of the internal inquiry, who spoke on the condition that he not be identified.

By clicking on a link and connecting to a “poisoned” Web site, the employee inadvertently permitted the intruders to gain access to his (or her) personal computer and then to the computers of a critical group of software developers at Google’s headquarters in Mountain View, Calif. Ultimately, the intruders were able to gain control of a software repository used by the development team…….(New York Times)

Posted in Business, China, Company, cyber attack, Google, hacking, Internet, News, Politics, Social, Spyware, Technology, USA, Virus, World | Comments Off on Google’s Password Control System attacked by Cyber hacking from China

China’s foreign journalists club shuts down website after repeated cyber attacks

Posted by Author on April 2, 2010


AFP, Apr. 2, 2010-

BEIJING — China’s foreign journalists association said Friday it had taken its website offline after it was targeted in repeated denial-of-service attacks.

The Foreign Correspondents’ Club of China (FCCC) said it did not know who was behind the attacks but that they originated from Internet addresses in both China and the United States.

However, it noted the “physical location of the servers does not tell us much since hackers can use any machine they have been able to exploit.”

The statement said the club, regarded by the Chinese government as an illegal organisation, “has been the target of persistent denial-of-service attacks.”

“We have taken the site down temporarily while we work to sort out the problem,” it said.

A denial-of-service attack floods a network with so many requests that normal traffic is slowed down or completely interrupted.

The move comes after Google re-routed traffic from its Chinese-language search engine to an uncensored site in Hong Kong over state web censorship and cyberattacks on Gmail accounts it said originated in China.

There also have been mounting allegations overseas, including by the US government, that China is ramping up its global cyber-espionage activities and has become a key source of world cyber-attacks — a claim denied by Beijing.

The FCCC said on Wednesday that the Yahoo! email accounts of foreign journalists based in China and Taiwan had been targeted in hacking attacks.

“In one instance, a Beijing-based journalist?s account had an unknown forwarding address added, sending all the journalist?s messages to an unknown recipient,” it said in a notice to members, adding that it had confirmed eight cases.

AFP

Posted in Beijing, China, cyber attack, Freedom of Information, Freedom of Speech, hacking, Human Rights, Internet, Journalist, News, People, Politics, Social, Software, Technology, website, World | Comments Off on China’s foreign journalists club shuts down website after repeated cyber attacks

Best 5 Anti-censorship Software Tools (proxy, VPN), Free ! (Tutorial Video)

Posted by Author on April 1, 2010


[tweetmeme source=’chinaindepth’ only_single=false]

Looking for the best anti-censorship software tools / methods to get around the repressive regimes such as Mainland China and Iran’ firewall and filtering system? And hopefully free?

Solutions: Yes, it’s possible. The following 5 free anti-censorship client software tools are the most powerful tools and and popular methods used by people esp. Chinese people in the past years, to access the information in the free world from inside the closed society, they are UltraSurf, FreeGate, GTunnel, FirePhoenix and GPass.

  • Users from over 180 countries access UltraSurf’s website at over 800 million hits a day !
  • As of May 2008, Dyanweb has had over 150 million user visits

Best 5 Anti-censorship Software Tools

1. UltraSurf (无界)

Download (下载) software from following official websites:

– English: http://www.ultrareach.com/
– Chinese (中文): http://www.wujie.net/

UltraSurf is one of the most successful anti-censorship software in the world. It’s a flagship anti-censorship product by UltraReach  Internet Corp. (www.ultrareach.com), an Internet technology company founded in 2002 by a group of Silicon Valley technologists (Chinese). It’s is a green software, no installation process is needed and no change in system setting is required.

UltraSurf enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely- just the same as using the regular IE browser– while it automatically searches the fastest proxy servers in the background. It has strong support for load balancing and fault tolerance, and it even employs a decoying mechanism to thwart any tracing effort of its communication with its infrastructure.

UltraSurf is a robust anti-censorship system evolved from the lasting battle between Chinese regime’s Great FireWall (GFW) and UltraReach, which has following features:

  • Protect privacy
    Protect Internet privacy with anonymous surfing and browsing — hide IP addresses and locations, clean browsing history, cookies & more …
  • High security
    Completely transparent data transfer and high level encryption of the content allow you to surf the web with high security.
  • Great freedom
    UltraSurf allows you to overcome the censorship and blockage on the Internet. You can browse any website freely, so as to obtain true information from the free world.

UltraSurf has gained large popularity among the Internet users, which has got:

  • Daily hits over 800 million
  • Daily traffic over 8,000 GB
  • Millions of users
  • Users from over 180 countries

With the support of UltraReach’s dedicated anti-censorship force, service of UltraSurf has been serving the censored people for 7 years !

Following video is a UltraSurf Tutorial produced by Freedom House:

2. FreeGate (自由门)

Download (下载) FreeGate Client software and user guide from following official websites:

– Chinese (中文): http://us.dongtaiwang.com/
– English: http://us.dongtaiwang.com/loc/download_en.php

FreeGate is an anti-censorship software for secure and fast Internet access  developed and maintained by Dynamic Internet Technology Inc. (DIT: www.dit-inc.us), a  pioneer in censorship-circumvention operation, which was founded originally in 2001 to provide email delivery services to China for U.S. government agencies and NGOs.

FreeGate works by tapping into an anti-censorship backbone, DynaWeb, DIT’s P2P-like proxy network system and a web-based anti-censorship portal. Once users point their web browser at one of the DynaWeb URLs, a web page will be presented similar to the one at us.dongtaiwang.com, with most blocked websites as links. In addition, a user can type in any URL in the box on this page and DynaWeb will fetch the pages for him/her instantly. No software is needed, nor are any settings tweaked on a user’s computer.

But since the Chinese net police watch DynaWeb’s portal websites closely and block them as soon as they identify them, DynaWeb must indeed be very dynamic. It has hundreds of mirror sites at anytime, and each with a varying IP and DNS domain name, to defeat IP blocking and DNS hijacking. On the backstage, DynaWeb also has mechanisms to proactively monitor the blocking status of each of its mirror sites, and as soon as blocking is detected, it will change the IP and DNS domain name instantly.

There are indications that FreeGate has some capabilities built-in to exploit some zero-day vulnerabilities of Chinese regime’s Great FireWall (GFW).

Following video is a FreeGate  Tutorial produced by Freedom House:

3. GTunnel (花园)

Download (下载) GTunnel Software and user guide  from following official websites:

– English: http://gardennetworks.org/
– Chinese (中文): http://gardennetworks.com/

GTunnel is a Windows application that works as a local HTTP or SOCKS proxy server, developed by non-profit organization Garden Networks (http://gardennetworks.org/), which was made  for people to access Internet content blocked by totalitarian countries such as China and to protect Internet users’ online privacy and security.

After proxy set to GTunnel in web browser (like IE)  or other Internet applications, the traffic will go through GTunnel and Garden Networks’ server farm before it reaches its original destination.

GTunnel protects Internet users’ privacy and freedom of speech in these ways:

  • User’s IP address is hidden and user’s Internet privacy protected. The destination servers see GTunnel server addresses instead.
  • Traffic content is encrypted with industry-strength algorithms between the user’s PC and GTunnel servers so the local filtering/censorship systems will not see the content in clear-text format.
  • Blockade of target servers circumvented.

4. FirePhoenix (火凤凰)

Download (下载) the current FirePhoenix Software and user guide from following official websites:

– English: http://firephoenix.edoors.com/
– Chinese (中文): http://firephoenix.edoors.com/index-cn.html

FirePhoenix (FP) is the first virtual private network (VPN) based anti-censorship tool which is dramatically different from other existing tools. It offers the most powerful protection so far to users working under censorship.

It’s regarded as an all-protocol, automatic, secure and dynamic proxy system that not only encrypts web (http) traffic, but also encrypts emails, online games, instant messages (MSN, Yahoo Messenger, AOL IM, etc.) and streaming medias (videos, etc).

After FirePhoenix installed, to a user, it is just as if his/her computers were directly connected to a wide open network overseas, and the firewall and filter system becomes nonexistent.

FirePhoenix is released in the summer of 2006 by The World’s Gate Inc. (WG), an upcoming organization focusing on building an extensive and trustworthy Internet platform, Edoors (www.edoors.com),  for users from repressive regimes to freely and securely access and publish information such as emails, blogs, forums and social networks.

5. GPass (世界通)

Download (下载) GPass for free from following official websites:

– English: http://gpass1.com/
– Chinese (中文): http://www.gpass1.com/index_cn.php

Gpass is an Internet anti-jamming product widely used in China to overcome Internet censorship, released by World’s Gate, Inc. in the summer of 2006.

Compared with traditional online privacy and anti-jamming products, GPass’s innovative design allows it to

  • support Internet access mechanisms such as Web2.0 websites,
  • online multimedia streaming (e.g. MMS protocol), file transfer (e.g. FTP), and
  • communication tools such as email and instant messengers as well as web surfing (e.g. HTTP).

GPass (and FirePhoenix) sets the trend of multi-protocol protection. Currently most anti-censorship tools only offer protection to web traffic, which means a user’s privacy and safety are only protected when he/she visits those specific websites, but other applications with non-web protocols, such as emails, instant messaging, and audio/video streaming, are still subject to censorship.


Summary 总结

To fight the Goliath of repressive Internet censorship, the above leading companies and grassroots organizations on the front line, formed an alliance, the Global Internet Freedom Consortium (GIFC). The Consortium brings together a veritable “dream team” of talent and experience combined with dedication and determination.

Dreams,  can become true, with the help of the Global Internet Freedom Consortium – GIFC.

Download (下载)

You can download the up-to-date GIFC  Anti-Censorship Tools Bundle which includes all above 5 popular client software packages from following official website:

English: http://www.internetfreedom.org/

Enjoy !

[tweetmeme source=’chinaindepth’ only_single=false]

Related news:

Why the State Department refused to spend the funds to “expand access and information in closed societies” such as Iran and China, via The Wall Street Journal, May.2, 2010
Iranian Internet lifeline– Chinese Falun Gong’s Software, The New York Time, June 17, 2009
GIF resumes anti-censorship services to Iran due to election crisis, Global Internet Freedom Consortium, June 17, 2009
Editorial: The US congress can help fend off authoritarian censorship in Burma, Iran and China, The Washington Post, July 7, 2009

Posted in Anti-censorship, break net-block, censorship, China, Freedom of Information, Freedom of Speech, Human Rights, Internet, Life, News, Software, Technology, World | 21 Comments »

Millions in China Have No Antivirus Software, Survey Shows

Posted by Author on March 31, 2010


By Owen Fletcher, IDG News Service, via PC World, Mar. 31, 2010-

The massive number of Chinese Internet users running no antivirus software increased last year, a survey showed, even though online security risks continued to multiply in the country.

The percentage of Internet users in China with no security software was 4.4 percent last year, up from 3.9 percent the previous year, according to survey results released late Tuesday by the China Internet Network Information Center (CNNIC) and China’s National Computer Network Emergency Response Technical Team (CNCERT).

CNNIC estimates that 384 million people in China used the Internet in the second half of last year. By that calculation, the number of people in the country surfing the Internet with no antivirus software was nearly 17 million, representing a huge pool of PCs that attackers could easily infect and use for malicious ends.

Other results from the survey also showed the size of online security problems in China. For instance, nearly half of Chinese Internet users own virtual property, such as items in an online game or virtual coins for use on a social-networking site, according to the survey. Among those people, 14.6 percent said they had experienced some loss of that property due to theft of login credentials……. (more details from The PC World)

Posted in China, Computer, Firewall, Internet, Internet User, Life, News, People, Software, Technology, World | Comments Off on Millions in China Have No Antivirus Software, Survey Shows

Symantec finds China top source of malware attacks- targeting businesss directors

Posted by Author on March 26, 2010


by Lance Whitney, Via Cnet.com, Mar. 26, 2010-

More malware is now coming out of China than from any other country, according to a new report from Symantec.

The United States still leads the world in the number of malware attacks sent from mail servers. Symantec’s report (PDF) found U.S. mail servers responsible for distributing 36.6 percent of all global malware in March, followed by China at 17.8 percent and Romania at 16.5 percent.

Symantec captured these results by analyzing the IP addresses of sending mail servers. The company uncovered a large amount of malware from the United States in large part because many Web-based e-mail services, such as Gmail and Yahoo Mail, are hosted in the U.S.

But analyzing the source of malware based on the mail servers doesn’t tell the full picture as the sender can use any Web-based e-mail account. By checking the actual sender’s IP address found in the e-mail’s header, Symantec found individuals in China responsible for 28.2 percent of malware, Romania for 21.1 percent, and the U.S. for 13.8 percent. Overall, the analysis discovered that most of the attacks coming from mail services in North American actually stem from other regions, including Asia, Europe, and Africa.

(Credit: Symantec)

“When considering the true location of the sender rather than the location of the email server, fewer attacks are actually sent from North America than it would at first seem,” Paul Wood, a senior analyst at Symantec’s MessageLabs Intelligence, said Thursday in a statement. “A large proportion of targeted attacks are sent from legitimate webmail accounts which are located in the US and therefore, the IP address of the sending mail server is not a useful indicator of the true origin of the attack.”

China, of course, has been in the news lately due to its ongoing battles with Google over search and censorship. China has also been tagged as the source of the cyberattacks launched against Google and other companies.

In its latest analysis, Symantec also discovered more malware targeted to people with specific job roles. The five leading titles hit by malware now include director, senior official, vice president, manager, and executive director. The people receiving a higher number of attacks are typically in charge of foreign trade and defense policy, especially related to Asian countries, said the report.

E-mail file attachments hiding malware continue to be a popular method of attack. The most common types of files found in such e-mails were .xls (Microsoft Excel) and .doc (Microsoft Word) documents. Along with .zip and .pdf files, these four accounted for 50 percent of the files attached to malicious messages this month…… (more details from CNet)

Posted in China, Internet, News, Software, Spyware, Technology, Virus, World | 2 Comments »

Mainland Chinese Develop New Anti-Censorship Software Tool to penetrate the Great Firewall of China

Posted by Author on March 14, 2010


The first anti-censorship software developed inside China, the Xi Xiang project, has recently been released online to penetrate the regime-sponsored Internet surveillance tools, the Great Firewall of China (GFW).

Striving to gain freedom of information on the Internet, a group of anonymous computer specialists started the Xi Xiang project in July 2008, according to the GFW Technical Comments blog. They spent a great deal of effort to reverse-engineer the GFW and released the products to the public, on the blog, on March 10.

The technical documents claim that the software enables users to easily bypass the GFW to directly visit blocked Web sites such as Youtube and Twitter.

The developers named the project after the famous 13th century play “Xi Xiang Ji,” known in English as “Romance of the West Chamber” in reference to the young scholar Zhang, who climbed over a wall to have secret meetings with his lover.

After studying the software, Dong Xiaoxing, a computer network expert, told Radio Free Asia that the Xi Xiang tools take advantage of the RST packets that are ignored by the GFW. Dong believes the blocking and anti-blocking war will be ongoing, and the software will be widely spread in the Chinese Internet communities.

According to those who have researched the GFW, it is a very resource-intensive system. It detects and blocks Internet access to any Web sites with unwanted contents, utilizing a combination of technologies, such as basic traffic analysis, DNS filtering and redirection, and keyword filtering. The Chinese regime invested heavily in the complex system, making it very difficult to be bypassed.

However, the GFW is not without vulnerabilities, according to the Xi Xiang developers. They provide a set of tools to perform a one-time configuration on users’ computers to avoid the GFW’s detection mechanisms so that users can connect to the target Web sites directly. The preliminary test successfully connected users to the blocked Web sites such as Youtube.

Shi Zhao, the director of the Chinese Wikipedia said: “Unlike other anti-censorship products that use proxy servers hosted overseas as intermediary connection points, the Xi Xiang tools can connect users directly to the blocked Web sites. It’s mainly useful for the keywords filtering.” Due to the technical limitations of the GFW, Shi believed it would take a while for the GFW to contain Xi Xiang.

A Chinese blogger commented: “The Xi Xiang project is the most exciting product I’ve seen in the past two years. I’ll pay close attention to it.” Another Internet user said the software marks the end of the cat-and-mouse game between anti-censorship software and GFW, and the beginning of a new era of anti-censorship software actively attacking the GFW.

Guo Weidong, a well-known blogger said: “When the Internet users find out the information they get has been filtered and distorted, they will start looking for the truth. The desire to search for the truth, free thinking, and free expression can never be blocked by the GFW.” (the Epochtimes)

Posted in break net-block, censorship, China, Firewall, Freedom of Information, Human Rights, Internet, Internet User, News, People, Software, Technology, World | Comments Off on Mainland Chinese Develop New Anti-Censorship Software Tool to penetrate the Great Firewall of China

The High-Tech Persecution of Falun Gong in China (3)

Posted by Author on February 28, 2010


Global Internet Freedom Consortium – (cont’d)

<< previous

The targets of this project (the Golden Shield Project) are Chinese dissidents, and in particular, practitioners of Falun Gong. As one expert put it, when presented with Internet censorship technology, the “first question from the Chinese buyers was not ‘Will it make my workers more productive?’ but, invariably, ‘Can it stop Falun Gong?’”[8]

In 2000, China had a public security trade show in Beijing, where corporations from around the world gathered to sell products for sale to the Chinese government. An engineer from one company said that Internet surveillance capabilities were specifically designed “to catch Falun Gong.”[9] Another company’s booth contained literature declaring that its technology could help in “strengthening police control” and “increasing social stability.”[10]

Moreover, according to Hao Fengjun, who worked for the secret police in the so-called Office 610, in the northern city of Tianjin until he fled China in 2005, Office 610 used the Golden Shield network specifically to track members of the Falun Gong religion.[11] Thus, as Naomi Kline noted in her Rolling Stone article, even if the tools were the same, an assertion that is not necessarily supported by the evidence, “the political contexts are radically different. China has a government that uses its high-tech web to imprison and torture peaceful protestors, Tibetan monks and independent-minded journalists.”[12]

In addition, insider corporate documents indicate that one of the stated central purposes of the Golden Shield Project was to “persecute ‘Falun Gong’ evil cult and other hostile elements.”[13] The Chinese term translated as “persecute” in this and other corporate documents is the very same term used by the Party to describe the persecution of the landlord class, the intellectuals, and the pro-democracy advocates in China, i.e., douzheng [斗争]. Regardless of the role of US corporations in the design and implementation of the Golden Shield, an issue that is now being investigated further by the Human Rights Law Foundation, it is clear from a second document that was sent anonymously to HRLF that at least one Cisco corporate design of the Golden Shield included a Falun Gong database.

The Human Rights Law Foundation has received an enormous array of information in support of these and other allegations from credible sources. It is investigating all of the evidence carefully. Based on all of the new information, it is contemplating the filing of a lawsuit to hold accountable some of the key parties responsible for the high-tech persecution of Falun Gong.(to be cont’d)

From Global Internet Freedom Consortium

Related:
The High-Tech Persecution of Falun Gong in China (1)
The High-Tech Persecution of Falun Gong in China (2)

Posted in censorship, China, Falun Gong, Firewall, Freedom of Information, Human Rights, Internet, News, Politics, Social, Software, Technology, website, World | Comments Off on The High-Tech Persecution of Falun Gong in China (3)

China Attacks on Google May Have Hit 100 Companies, ISEC Says

Posted by Author on February 27, 2010


Business Week, Feb. 27, 2010-

Feb. 27 (Bloomberg) — The Chinese cyber attacks that Google Inc. reported last month may have targeted more than 100 companies, a larger number than previously thought, according to security research firm ISEC Partners Inc.

ISEC said it discovered the additional targets while working with victims of the attack, which originated in China. Google initially alerted 30 companies to the problem, San Francisco-based ISEC said.

Google disclosed last month that it suffered “a highly sophisticated” cyber attack on its corporate infrastructure and threatened to withdraw from China. The Mountain View, California-based company said Gmail e-mail accounts of Chinese human-rights activists were targeted by the hackers.

Chief Executive Officer Eric Schmidt said Jan. 21 that Google had begun talks with the Chinese government and would be “making some changes” to its operations in China. The company was still following Chinese laws and censoring its search results locally, he said……. (more details)

Posted in Business, China, Company, Economy, Google, Internet, Law, News, Politics, Software, Technology, USA, World | 1 Comment »

The High-Tech Persecution of Falun Gong in China (2)

Posted by Author on February 25, 2010


Global Internet Freedom Consortium – (cont’d)

<< previous

According to author E. Guttmann, the technology used in China to construct the Golden Shield Project “provide[s] a secure connection to provincial security databases, allowing for thorough cross-checking and movement tracing.”[4] These databases and secure connections allow for an unprecedented level of government intrusion:

A Chinese policeman or [Public Security Bureau] agent…could remotely access the suspect’s danwei or work unit, thereby accessing reports on the individual’s political behavior and family history. Even fingerprints, photographs and other imaging information would be available with a tap on the screen…[T]he Chinese police could even check remotely whether the suspect had built or contributed to a Web site in the last three months, access the suspect’s surfing history and read his e-mail.[5]

Thus, Michael Robinson, an American computer engineer hired in 1996 to help build the first public-access network in China, was asked by the Chinese government for assurances that it would be able to “build an Internet firewall to keep the world out and conduct surveillance on their own citizens” before he could continue his work.[6]

In her examination of China’s surveillance industry published in Rolling Stone, Naomi Kline describes the surveillance capabilities of the Golden Shield network as follows:

Chinese citizens will be watched around the clock through networked CCTV cameras and remote monitoring of computers. They will be listened to on their phone calls, monitored by digital voice-recognition technologies. Their Internet access will be aggressively limited through the country’s notorious system of online controls known as the Great Firewall. Their movements will be tracked through national ID cards with scanable computer chips and photos, that are instantly uploaded to police databases and linked to their holders personal data. This is the most important element of all: linking all these tools together in a massive, searchable database of names, photos, residency information, work history and biometric data. When Golden Shield is finished, there will be a photo in those databases for every person in China: 1.3 billion faces. [7]…… (to be cont’d)

From Global Internet Freedom Consortium

Related:
The High-Tech Persecution of Falun Gong in China (1)

Posted in China, Computer, Human Rights, Internet, News, People, Politics, Social, Software, Technology, World | Comments Off on The High-Tech Persecution of Falun Gong in China (2)

Chinese rights advocates ask US for funds to break China ‘firewall’

Posted by Author on February 24, 2010


AFP, Feb. 23, 2010-

WASHINGTON — A coalition of human rights campaigners on Tuesday urged the US government to fund efforts led by the Falungong spiritual movement to circumvent Internet censorship in China and other nations.

Congress approved 30 million dollars in the 2010 budget to combat cyber censorship in China, Iran and elsewhere. But lawmakers have voiced concern that the funding since 2008 has been used ineffectively.

In a letter to Secretary of State Hillary Clinton, rights advocates — most from China — urged that money go to the Global Internet Freedom (GIF) Consortium, originally set up to evade China’s Internet “firewall.”

“By taking the right steps, the United States can make a historic contribution to its own security and to the advancement of democracy by rapidly tearing down the information firewalls of the world’s closed societies,” it said.

The letter was signed by exiled leaders of the 1989 democracy uprising in Tiananmen Square including Chai Ling, Wu’er Kaixi and Xiong Yan, along with figures behind the landmark Charter 08 petition for greater freedoms in China.

Other signatories included Rebiya Kadeer, the leader of exiles from China’s Uighur minority, along with activists campaigning for greater openness in Cuba, Myanmar, North Korea and Syria.

GIF software was designed by the Falungong, which was banned by China in 1999 and branded an “evil cult” following a silent mass gathering in Beijing by its members.

But the technology was also put to use last year by Iranians who circumvented censorship to organize protests against clerical hardliners via Twitter and other websites.

The letter said that GIF servers, which nearly crashed after the Iranian elections, could be upgraded to allow 50 million unique users a day, up from 1.5 million now.

Five senators — Democrats Robert Casey, Edward Kaufman and Arlen Specter, along with Republicans Sam Brownback and Jon Kyl — wrote a letter to Clinton last month voicing concern that the grant money was going to waste.

They faulted the State Department for restricting grants to groups working inside a country, countering that “the most successful censorship circumvention tools are operated remotely.”

Clinton, who testifies before Congress on Wednesday and Thursday, last month urged China to conduct a thorough probe into cyberattacks on Google and pressed technology firms to resist censorship.

AFP

Posted in Activist, Anti-censorship, break net-block, censorship, China, Freedom of Information, Human Rights, Internet, News, People, Social, Software, Technology, USA, World | Comments Off on Chinese rights advocates ask US for funds to break China ‘firewall’

Google Attacks Came From One China University and One School With Close Ties to Military

Posted by Author on February 18, 2010


By JOHN MARKOFF and DAVID BARBOZA, The New York Times, February 18, 2010 –

SAN FRANCISCO
— A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including one with close ties to the Chinese military, say people involved in the investigation.

They also said the attacks, aimed at stealing trade secrets and computer codes and capturing e-mail of Chinese human rights activists, may have begun as early as April, months earlier than previously believed. Google announced on Jan. 12 that it and other companies had been subjected to sophisticated attacks that probably came from China.

Computer security experts, including investigators from the National Security Agency, have been working since then to pinpoint the source of the attacks. Until recently, the trail had led only to servers in Taiwan.

If supported by further investigation, the findings raise as many questions as they answer, including the possibility that some of the attacks came from China but not necessarily from the Chinese government, or even from Chinese sources.

Tracing the attacks further back, to an elite Chinese university and a vocational school, is a breakthrough in a difficult task. Evidence acquired by a United States military contractor that faced the same attacks as Google has even led investigators to suspect a link to a specific computer science class, taught by a Ukrainian professor at the vocational school.

The revelations were shared by the contractor at a meeting of computer security specialists.

The Chinese schools involved are Shanghai Jiaotong University and the Lanxiang Vocational School, according to several people with knowledge of the investigation who asked for anonymity because they were not authorized to discuss the inquiry.

Jiaotong has one of China’s top computer science programs. Just a few weeks ago its students won an international computer programming competition organized by I.B.M. — the “Battle of the Brains” — beating out Stanford and other top-flight universities.

Lanxiang, in east China’s Shandong Province, is a huge vocational school that was established with military support and trains some computer scientists for the military. The school’s computer network is operated by a company with close ties to Baidu, the dominant search engine in China and a competitor of Google……. (more details from The New York Times)

Posted in China, East China, Internet, military, News, Politics, Shandong, shanghai, Software, spy, Technology, World | Comments Off on Google Attacks Came From One China University and One School With Close Ties to Military

Promote Internet Freedom in China By Supporting GIF

Posted by Author on January 21, 2010


By Caylan Ford, Via Washington Post, Wednesday, January 20, 2010-

Google announced last week that it is no longer willing to censor its Chinese searches and may soon be closing its offices in China, and Secretary of State Hillary Clinton will be rolling out a new policy initiative concerning internet freedom on Thursday.

But if the State Department and internet giants really want to promote free access to the Internet worldwide, the most effective thing they could do is to support the Global Internet Freedom Consortium (GIF).

GIF is a small outlet run by a group of Chinese-American computer scientists. Over the last ten years, they have developed a suite of censorship-circumvention software that allows users to safely evade internet firewalls and surveillance. They have no offices or funding. Their scientists work day jobs and pay for their operations out of their own pockets. Yet in spite of their obvious limitation, they are responsible for approximately 90 percent of all anti-censorship internet traffic in China and Iran.

When protests erupted in Burma in 2007 and its military junta moved to violently suppress demonstrations, it was GIF software that activists used to relay images, video and information to the rest of the world. When riots erupted in Tibet in 2008, GIF’s traffic from the region rose by 300 percent. And when Iranians took to the streets to demonstrate against suspected election fraud in 2009, over 1 million Iranians per day were using GIF software to communicate with the outside world. Without GIF, there could have been no “Twitter revolution.

But GIF servers, which can currently support only 1.5 million unique users per day, nearly crashed in the aftermath of the Iranian election. With a small amount of funding or with private donations of server bandwidth, GIF could increase its capacity to support 50 million users. …… (more details)

Posted in Anti-censorship, break net-block, censorship, China, Freedom of Information, Human Rights, Internet, News, Politics, Software, Technology, USA, World | Comments Off on Promote Internet Freedom in China By Supporting GIF

China Authorities Behind Google Attack, Researcher Claims

Posted by Author on January 15, 2010


By Gregg Keizer, Computer World, January 15, 2010 –

Computerworld –  The malware used to hack Google is so sophisticated that researchers brought in by the company to investigate believe the attack code was designed and launched with support from Chinese authorities.

According to Carlos Carrillo, a principal consultant for Mandiant, a Washington D.C.-based security incident response and forensics firm, the attack against Google last month was “definitely one of the most sophisticated attacks I’ve seen in the last few years.”

Mandiant was called in by Google to look into the attack, and Carrillo was the project manager for the Google investigation. During an interview Friday, he frequently chose his words carefully, saying that there was much he couldn’t discuss because the work was ongoing.

“The malware was unique,” Carrillo said. “It had unique characteristics … it was … let’s just say it was unique.”

Other researchers who have examined the malware have also come away impressed. Thursday, Dmitri Alperovitch, vice president of threat research at McAfee, called the attack code “very sophisticated” and added, “We’ve never seen anything this good in the commercial space. In [attacks on] government, yes, but not commercial.”

But what does that kind of expertise mean?

Carrillo is convinced that, given the sophistication of the code, it was produced with support from Chinese authorities. “This wasn’t on the level of Metasploit,” Carrillo said, referring to the open-source penetration testing framework whose exploits are often used by hackers to craft malware. “This wasn’t something that a 16-year-old came up in his spare time.”

When asked if the code quality pointed toward Chinese state support, Carrillo answered, “I would say so.” He declined to elaborate.

Mandiant was called in to investigate the attack on Google “early in the process,” said Carrillo, who refused to get more specific. McAfee’s Alperovitch said that time stamps in the malware’s command-and-control log files indicated the attacks began in mid-December and ended Jan. 4, when the hackers’ servers were shut down.

In the announcement Tuesday that its corporate network had been hacked and intellectual property stolen, Google said the attacks had been discovered in mid-December. Google also said the attacker tried to access the Gmail accounts of Chinese human rights activists, a move that — along with increasing censorship of the Web by China’s government — has prompted it to reevaluate its business in the country.

Carrillo also provided additional information to the still-sketchy framework of the attack, saying that the exploit of a vulnerability in Microsoft’s Internet Explorer was not the only vector used by the hackers. That seemed to back up Microsoft’s assertion that the IE bug wasn’t the sole cause of the break-ins…… (more details from Computerworld)

Posted in Business, China, Company, Computer, email, Google, Human Rights, Internet, News, Politics, Software, Spyware, Technology, website, World | 1 Comment »

China Faces U.S. Piracy Suit for Web-Filter Software

Posted by Author on January 6, 2010


By Edvard Pettersson and Mark Lee, Bloomberg via businessweek, Jan 6, 2010 –

Jan. 6 (Bloomberg) — China was accused of piracy in a lawsuit filed by a California software maker, which said the Green Dam Youth Escort filtering program installed on personal computers in the country infringes its copyright.

Cybersitter LLC, a closely held company, seeks $2.2 billion in damages in a complaint filed yesterday in federal court in Los Angeles. The company accuses China and computer makers, including Lenovo Group Ltd. and Acer Inc. whose products have included the Green Dam program, of stealing its trade secrets, unfair competition, copyright infringement and civil conspiracy.

“This lawsuit aims to strike a blow against the all-too- common practices of foreign software manufacturers and distributors who believe that they can violate the intellectual property rights of small American companies with impunity without being brought to justice in U.S. courts,” Greg Fayer, a lawyer representing Cybersitter, said in a statement.

Cybersitter said Green Dam, which the Chinese government is promoting on computers sold in the country, illegally copies 3,000 lines of code from its program that was designed to prevent children from viewing pornography and violent Web content. Human rights groups accuse the Chinese government of using Green Dam to curb access to sites it considers politically unacceptable.

Wang Lijian, spokesman for China’s Ministry of Industry and Information Technology, said he couldn’t immediately comment as he hadn’t seen the lawsuit. The agency, which oversees regulation of the country’s technology industry, said in May that all new computers sold in the country must include the Green Dam software, before postponing the order in June……. (more details from Businessweek)

Posted in Business, censorship, China, Computer, Human Rights, Law, News, Politics, Software, Technology, USA, World | 1 Comment »