Technology | Human Rights in China 中国人权 | HRIC Skip to content Skip to navigation

Technology

(Updated August 12, 2014) The State Internet Information Office (国家互联网信息办公室), the top government agency that oversees online content management, issued, on August 7, a set of regulations on mobile instant messaging services—such as WeChat (Tencent), Yixin (NetEase), and Feixin (China Mobile)—...
On January 12, 2010, Google stunned the world with its dramatic announcement that it was reconsidering its business in China in the wake of debilitating cyber-attacks, and furthermore that the company was no longer willing to continue operating a censored search engine in China, Google.cn, launched...
March 24, 2010 1 China Update Let us start with an update on Google’s situation in China. We launched Google.cn, our Chinese search engine, in January 2006 in the belief that the benefits of increased access to information for people in China and a more open Internet outweighed our discomfort in...
HRIC: Can you please introduce Domini Social Investments, and explain more generally what a social investment fund is? Adam Kanzer: Domini Social Investments is a mutual fund manager based in New York. We manage approximately $1 billion for individual and institutional investors. We focus...
Translation by HRIC In August 2007, the Financial Times reported that at least five Chinese Internet entrepreneurs had introduced websites similar to Twitter. This was barely one-and-a-half years after the original Twitter was introduced on March 21, 2006. At present, if a website model has found...
Translation by Wen Huang The Internet has created room for the birth and development of civil society in totalitarian countries. In the past two years, social networking sites, such as Facebook and Twitter, have developed at an amazing speed in non-democratic countries. They have become the...
On March 18, 2010, unknown attackers sent a spear phishing email that appeared to be from Sharon Hom, the Executive Director of Human Rights in China (HRIC), to a variety of organizations and individuals. Leveraging the trust and recognition of HRIC, the attackers’ email encouraged recipients to...
Diverse set of users Works in your country Sustainable network and software development Open design Decentralized architecture Keeps you safe from websites too Does not promise to magically encrypt the entire Internet Fast Easy to get the software and updates Does not promo
Many Internet users are aware that they ought to look for a padlock icon in their web browsers when doing something important online. Some users understand that the padlock is supposed to indicate that their communications are “secure”—confidential and in some sense authentic.
Compiled by HRIC 101 (error 101, HTTP 101): A standard error message indicating that the web browser was unable to communicate with the server. 403 (error 403, HTTP 403) : A standard error message indicating that the server will not allow a user to access the resource requested. 404 (error 404,...

Pages

Subscribe to Technology

Explore Topics

709 Crackdown Access to Information Access to Justice Administrative Detention All about law Arbitrary Detention
Asset Transparency Bilateral Dialogue Black Jail Book Review Business And Human Rights Censorship
Charter 08 Children Chinese Law Circumvention technology Citizen Activism Citizen Journalists
Citizen Participation Civil Society Commentary Communist Party Of China Constitution Consumer Safety
Contending views Corruption Counterterrorism Courageous Voices Cultural Revolution Culture Matters
Current affairs Cyber Security Daily Challenges Democratic And Political Reform Demolition And Relocation  Dissidents
Education Elections Enforced Disappearance Environment Ethnic Minorities EU-China
Family Planning Farmers Freedom of Association Freedom of Expression Freedom of Press Freedom of Religion
Government Accountability Government regulation Government transparency Hong Kong House Arrest HRIC Translation
Hukou Human Rights Council Human rights developments Illegal Search And Detention Inciting Subversion Of State Power Information Control 
Information technology Information, Communications, Technology (ICT) International Covenant on Civil and Political Rights (ICCPR) International Human Rights International perspective International Relations
Internet Internet Governance JIansanjiang lawyers' rights defense Judicial Reform June Fourth Kidnapping
Labor Camps Labor Rights Land, Property, Housing Lawyer's rights Lawyers Legal System
Letters from the Mainland Major Event (Environment, Food Safety, Accident, etc.) Mao Zedong Microblogs (Weibo) National People's Congress (NPC) New Citizens Movement
Non-Governmental Organization (NGO) Olympics Online Activism Open Government Information Personal stories Police Brutality
Political commentary Political Prisoner Politics Prisoner Of Conscience Probing history Propaganda
Protests And Petitions Public Appeal Public Security Racial Discrimination Reeducation-Through-Labor Rights Defenders
Rights Defense Rule Of Law Special Topic State compensation State Secrets State Security
Subversion Of State Power Surveillance Technology Thoughts/Theories Tiananmen Mothers Tibet
Torture Typical cases United Nations Uyghurs, Uighurs Vulnerable Groups Women
Youth Youth Perspective