Security Experts:

Connect with us

Hi, what are you looking for?


Identity & Access

China Demands Internet Platforms Verify Users’ True Identity

China has ordered the country’s internet platforms to verify users’ true identity before letting them post online content, the latest step by authorities to tighten policing of the web.

China has ordered the country’s internet platforms to verify users’ true identity before letting them post online content, the latest step by authorities to tighten policing of the web.

All social networking sites and discussion forums must “check the real identity” of their users before they can post online content and comments, under new regulations published Friday by the Cyberspace Administration of China.

The platforms will also have to strengthen their oversight over all published information, deleting all illegal content while also alerting authorities to the postings.

The new guidelines take effect October 1.

China already had laws requiring companies to verify a user’s identity but it was applied in a fragmented and incomplete way.

But forcing online posters to identify themselves — which will probably require scanning a government-issued ID as proof of identity — makes it much more difficult to post online anonymously.

China already tightly controls the internet aggressively blocking sites of which it disapproves and curbing politically sensitive online commentary, such as on criticism of the government.

The new regulation was adopted as part of a cybersecurity law that took effect in June, which bans internet users from publishing a wide variety of information.

That covers  anything that damages “national honour”, “disturbs economic or social order” or is aimed at “overthrowing the socialist system”.

The law also requires online platforms to get a license to post news reports or commentary about the government, economy, military, foreign affairs, and social issues.

Since 2013, China has imposed prison sentences on users whose messages are deemed “defamatory”.

But new restrictive measures have multiplied in recent months, ahead of the Communist Party’s autumn congress during which President Xi Jinping is expected to be re-elected.

China has enforced new rules on what is permissible content, with content such as celebrity gossip blogs and online video streaming sites hit by the regulations.

The authorities have also stepped up efforts to clamp down on virtual private networks (VPN), software that allows people to circumvent the Great Firewall.

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...