Language Selection

English French German Italian Portuguese Spanish

China fights to control the net

Filed under
Web

A CHINESE government threat to close down unregistered websites has convinced just 430,000 to make themselves known at the Information Ministry - suggesting that most of the country's estimated 4 million web loggers, or bloggers, are choosing to stay out in the cold.

"There's a bit of a chill blowing through right now," said Duncan Clark, managing director of Beijing-based media consultancy BDA China. The campaign for registration is "obviously an effort to impose control" on web activities, said Mr Clark, who has moved his website offshore to avoid the regulators.

Li Xinde should be more worried than most.

The freelance investigative journalist is gaining fame for his site, www.yuluncn.com, which targets official corruption. The site, known in English as Chinese Public Opinion Surveillance Net, was shut down last year when it carried pictures of the allegedly corrupt vice-mayor of a major Chinese city on his knees apparently begging not to be exposed.

The official was arrested soon afterwards and awaits trial on accusations of stealing $530,000. But the woman who first accused him, and whom he allegedly tried to kidnap and intimidate, has already been sentenced to five years in prison in a case Li believes was mounted in revenge by the vice-mayor's government cronies.

But Li says his site was shut down only because the vice-mayor's younger brother worked in the Public Security Bureau. "We'll register according to the regulations. Similar websites by my friends have all passed registration so far. I don't think anyone will tell us not to post corruption-fighting content."

By confining his writings to factual exposures of corruption, and never questioning the party's rule, Li minimises his risks. He is a Communist Party member. He believes he has the support not just of the general public, but of the party too. In an anonymous Beijing hotel room with his tools of trade - an IBM laptop and a digital camera - he says they share the same aims.

"There are many people (with grievances) who go around from department to department without result, and they come to me very upset and scolding the party loudly," he said.

"I tell them, 'If you believe in the party, tell me what happened. if you don't believe in the party don't tell me, because everything that follows depends on the party for a solution'."
Li lives by the creed of "publish or perish", keeping one step ahead of corrupt local officials by working quickly and in secret, travelling in and out of places before he can be detained by the local officials he specialises in exposing. "I could not do what I do without the internet," he says.

The site gets an average of 15,000 hits a day. Even if he does have tacit official backing, Li's activities are highly risky. He claims no one is immune from his attention, yet he must also know that he will be abandoned to his fate the moment his investigations sail too close to the true centres of party power.

Full Article.

More in Tux Machines

Open Source platforms to now help students

The technical institutes in the State are now asked to use free and open-source software developed by a team, headed by the Ministry of Human Resource Development (MHRD). The MHRD has also promoted their FOSSEE (Free and Open Source Software for Education) projects which uses tools so that students can easily use them. Recently, the MHRD made a decision that FOSSEE should be promoted amongst the student community so they can aim at reducing dependency on proprietary software in educational institutions. The MHRD Minister Ramesh Pokhriyal Nishank too took to twitter urging students to use FLOSS tools in various languages to meet academic and research requirements. Read more

today's howtos

  • A guided tour of Linux file system types

    While it may not be obvious to the casual user, Linux file systems have evolved significantly over the last decade or so to make them more resistant to corruption and performance problems. Most Linux systems today use a file system type called ext4. The “ext” part stands for “extended” and the 4 indicates that this is the 4th generation of this file system type. Features added over time include the ability to provide increasingly larger file systems (currently as large as 1,000,000 TiB) and much larger files (up to 16 TiB), more resistance to system crashes and less fragmentation (scattering single files as chunks in multiple locations) which improves performance.

  • Testing the Linux Malware Detect.
  • Kushal Das: Remember to mark drive as removable for tails vm install

    If you are installing Tails into a VM for testing or anything else, always remember to mark the drive as a removable USB drive. Otherwise, the installation step will finish properly, but, you will get errors like the following screenshot while booting from the drive.

  • How to Set DNS Nameservers on Ubuntu 18.04

Security Leftovers

  • NSA Researchers Talk Development, Release of Ghidra SRE Tool

    The National Security Agency released its classified Ghidra software reverse-engineering (SRE) tool as open source to the cybersecurity community on April 4. NSA researchers Brian Knighton and Chris Delikat shared how Ghidra was built and the process of releasing it at Black Hat 2019. Ghidra is a framework developed by the NSA’s Research Directorate for the agency’s cybersecurity mission. It’s designed to analyze malicious code to give security pros a better understanding of potential vulnerabilities in their networks and systems.

  • Linux Is Being Hit with Zero-Day Exploits/ Zero-Day Attacks [Ed: This is not news. If you have a system that is unpatched for months, despite many warnings, it is a risk, no matter the OS/kernel.]

    It was once the popular opinion that Linux was immune to zero-day exploits. However, even before the Equifax exploit, vulnerabilities were found in Linux distributions like Fedora and Ubuntu. In particular, back in 2016, a security researcher discovered that you could exploit a Linux system by playing a specific music file. Then, in 2017, a group of attackers used Struckshock vulnerability to carry on the attack on Equifax. These zero-day attacks are Advanced Persistent Attacks that exploit recently discovered vulnerabilities. Read on to learn more about what are zero-day exploits and how they can affect a Linux system.

  • Intel, Google, Microsoft, and Others Launch Confidential Computing Consortium for Data Security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use.

  • Intel, Google, Microsoft, and others launch Confidential Computing Consortium for data security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use. Established by the Linux Foundation, the organization plans to bring together hardware vendors, developers, open source experts, and others to promote the use of confidential computing, advance common open source standards, and better protect data. “Confidential computing focuses on securing data in use. Current approaches to securing data often address data at rest (storage) and in transit (network), but encrypting data in use is possibly the most challenging step to providing a fully encrypted lifecycle for sensitive data,” the Linux Foundation said today in a joint statement. “Confidential computing will enable encrypted data to be processed in memory without exposing it to the rest of the system and reduce exposure for sensitive data and provide greater control and transparency for users.”

Linux-driven modules to showcase new MediaTek AIoT SoCs

Innocomm is prepping an “SB30 SoM” with the new quad -A35 MediaTek i300 followed by an “SB50 SoM” with an AI-equipped, octa-core -A73 and -A53 MediaTek i500. Both modules ship with Linux/Android evaluation kits. Innocomm, which has produced NXP-based compute modules such as the i.MX8M Mini driven WB15 and i.MX8M powered WB10, will soon try on some MediaTek SoCs for size. First up is an SB30 SoM due to launch in October that will run Linux or Android on MediaTek’s 1.5GHz, quad-core, Cortex-A35 based MediaTek i300 (MT8362) SoC. In November, the company plans to introduce an SB50 SoM based on the MediaTek i500 (MT8385). Read more