Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

China Demands Internet Platforms Verify Users’ True Identity

China has ordered the country’s internet platforms to verify users’ true identity before letting them post online content, the latest step by authorities to tighten policing of the web.

China has ordered the country’s internet platforms to verify users’ true identity before letting them post online content, the latest step by authorities to tighten policing of the web.

All social networking sites and discussion forums must “check the real identity” of their users before they can post online content and comments, under new regulations published Friday by the Cyberspace Administration of China.

The platforms will also have to strengthen their oversight over all published information, deleting all illegal content while also alerting authorities to the postings.

The new guidelines take effect October 1.

China already had laws requiring companies to verify a user’s identity but it was applied in a fragmented and incomplete way.

But forcing online posters to identify themselves — which will probably require scanning a government-issued ID as proof of identity — makes it much more difficult to post online anonymously.

China already tightly controls the internet aggressively blocking sites of which it disapproves and curbing politically sensitive online commentary, such as on criticism of the government.

The new regulation was adopted as part of a cybersecurity law that took effect in June, which bans internet users from publishing a wide variety of information.

That covers  anything that damages “national honour”, “disturbs economic or social order” or is aimed at “overthrowing the socialist system”.

The law also requires online platforms to get a license to post news reports or commentary about the government, economy, military, foreign affairs, and social issues.

Since 2013, China has imposed prison sentences on users whose messages are deemed “defamatory”.

But new restrictive measures have multiplied in recent months, ahead of the Communist Party’s autumn congress during which President Xi Jinping is expected to be re-elected.

China has enforced new rules on what is permissible content, with content such as celebrity gossip blogs and online video streaming sites hit by the regulations.

The authorities have also stepped up efforts to clamp down on virtual private networks (VPN), software that allows people to circumvent the Great Firewall.

Written By

AFP 2023

Click to comment

Expert Insights

Related Content

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Google’s Threat Analysis Group (TAG) has shared technical details on an Internet Explorer zero-day vulnerability exploited in attacks by North Korean hacking group APT37.

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Big-game malware hunters at Volexity are shining the spotlight on a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors...