Great Firewall of China (contd.)

From Technology Review

BEIJING (AP) — New rules by a Chinese government-backed Internet group maintain strict controls over the country’s bloggers, requiring them to register with their real names and identification cards.

The guidelines from the Internet Society of China, a group made up of China’s major Internet companies, contradict state media reports this week claiming that China was considering loosening registration requirements for bloggers to allow anonymous online journaling.

The society’s new draft code of conduct seen on its Web site Wednesday says Web log service providers must still get their users’ real names and contact information.

Critics say the requirement violates a blogger’s right to freedom of expression and puts them at risk of punishment or imprisonment if they post controversial opinions about politics, religion or other issues.

The society’s proposed code of conduct for blog service providers comes in addition to already existing government regulations that govern China’s Internet. The country’s official Internet watchdog banned anonymous Web site and blog registration in 2005.

Online bulletin boards and blogs are the only forum for most Chinese to express opinions before a large audience in a society where all media are state-controlled.

China has the world’s second-biggest population of Internet users after the United States, with 137 million people online. It also has some 20 million blogs, according to government figures…

How blogging changes the journalistic interview

Jeff Jarvis had a thoughtful piece about the impact of blogging on journalistic interviewing. Excerpt:

Scott Rosenberg, founder of Salon.com, responded on his blog: “But mostly, it’s because reporters hope to use the conversational environment as a space in which to prod, wheedle, cajole and possibly trip up their interviewee. Any reporter who doesn’t admit this is lying, either to his listener or to himself.” Rosenberg extends his conspiracy theory to argue that phoners “have the additional advantage of (usually) leaving no record, giving journalism’s more malicious practitioners a chance to distort without exposure, and its lazier representatives an opportunity to goof without fear.”

Well, I say there’s a better way. The asynchronous email interview allows the subject to actually think through an answer – and, again, if information is the goal, what’s the harm in that? If the reporter has time to edit the words to be more accurate and articulate, why shouldn’t the source? Putting the exchange in writing also puts it on the record so no one can claim misquotation. Of course, quotes may still be taken out of context, but the solution to that is the link: why shouldn’t any quote in a story link to its place in the fuller interview? There’s the context.

I spent an hour yesterday doing an email interview and found it much more satisfactory than the conventional audio or TV version.

Another use for Twitter

From Ethan Zuckerman

When I saw Alaa a few weeks ago in Doha, the first thing he did was grab my computer, log into Twitter and, as he put it, “let everyone know I’m still alive.” This is a good thing to do when you’re an activist who routinely gets detained or arrested. Alaa’s Twitter feed includes updates for his compatriots every time he goes to the police or to a demonstration so he can let people know where he is… and if they don’t here from him, perhaps they need to reopen the FreeAlaa blog.

Twitter is also potentially useful for activists organizing a demonstration, as it’s a lightweight mass-SMS sending system, which lets you warn your fellow activists where the police are and what path they should take. Probably not the purpose the designers had, but an excellent use nevertheless.

What the attacks on Estonia have taught us about online combat

Good piece in Slate by Cyrus Farivar…

The Estonia case also shows how easy it is to cause massive panic on a shoestring budget. All you need to deploy a cyberattack is some malicious software, a bunch of zombie computers distributed around the world, and an Internet connection. Sure, you may need to pay for a “professional-grade” botnet—a network of computers that have been surreptitiously infected to run nefarious software. But surely that costs orders of magnitude less than the price of heavy artillery, battleships, and nuclear submarines.

Perhaps the most telling lesson here is how difficult it is to catch the perpetrators of online terrorism. Covering one’s fingerprints and footprints online is relatively simple, compared with getting rid of physical evidence. IP addresses can be spoofed, and an attack that appears to come from one place may actually originate somewhere else. As such, the Kremlin (or anyone else) can plausibly deny that they had anything to do with the attacks, even if the Estonians’ server logs show that the attacks first originated from Moscow. If the Russians don’t want to hand over data or documents—or even pick up the phone, for that matter—there’s not much that Estonia, or anyone else, can do to figure out the real story…

Spam still increasing, but users are less bothered by it

That just about sums up the latest Pew survey.

The volume of spam is growing in Americans’ personal and workplace email accounts, but email users are less bothered by it.

Spam continues to plague the internet as more Americans than ever say they are getting more spam than in the past. But while American internet users report increasing volumes of spam, they also indicate that they are less bothered by it than before. Users have become more sophisticated about dealing with spam; fully 71% of email users use filters offered by their email provider or employer to block spam. Users also report less exposure to pornographic spam, which to many people is the most offensive type of unsolicited email. Spam has not become a significant deterrent to the use of email, as some observers speculated it might when unsolicited email first began flooding users’ inboxes
several years ago. But it continues to degrade the integrity of email. Some 55% of email users say they have lost trust in email because of spam.

Full report here.

Blog valuations (contd.)

I blogged recently about the Cyberwire valuation of this and various friends’ websites. One I forgot to feed into the calculating machine was Ray Corrigan’s splendid blog about IP madness. Ray, however, fed it in and was delighted to discover that his blog is worth over $70 million. I’m ashamed to say that I thought he was making this up, so I repeated the calculation just now.

The result? Ray’s site is apparently worth $76,785,151. I expect he’s already ordered that yacht. Couldn’t happen to a nicer guy.

Teaching done right

Cory Doctorow has been teaching an undergraduate course at the University of Southern California called ‘PWNED: Everyone on Campus is a Copyright Criminal’. The class was open to anyone on or off campus, and lectures were podcasted. The students edited a class blog and were expected to improve Wikipedia posts relevant to the class. For the end of semester, each student turned in a final project that related the course material to their lives and major areas of study.

In this post Cory highlights some of the projects. “From the class discussions and one-on-ones”, he writes,

I knew I had a really amazing bunch on my hands, but I was absolutely gobsmacked by the incredible quality of the final projects. From founding a record label to conducting public polls to writing guidelines for journalists to interviews and classroom materials, my students did me better than proud.

I encouraged my students to do work that would be of use to the world at large. I hate the idea of the usual college final paper, which the student doesn’t want to write, the prof doesn’t want to read and no one else wants to ever see. Instead, I challenged them to produce useful work that the world could benefit from, and they met and exceeded the challenge…

Worth reading in full. Wonderful stuff. Cory is a genius.

Quote of the day

Lecturer: What’s the difference between ignorance and apathy?

Class: Zzzzzzzz…..

Lecturer: Oh come on — surely someone knows the difference!

Bored student: I don’t know and I don’t care.

From a talk given by Jeremy Hunt MP at the launch of the Open University’s Ethics Centre.

Google bans essay writing adverts

From BBC NEWS

Google is to ban adverts for essay writing services – following claims that plagiarism is threatening the integrity of university degrees.

About time, too. Stand by for squeals of protest from purveyors of bespoke essays to clueless undergraduates.