• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Google ‘99.9%’ Certain To Shut Down Google.cn

March 15, 2010

Views: 7,099

[ad]

There’s been a lot of controversy with China recently, a lot of which we have documented here. With the Aurora attacks targeting Google too and the attack code originating from China Google stopped censoring it’s Google.cn search engine and is now almost certainly pulling out of China.

The latest report from the financial times is that Google can’t reach an agreement with the Chinese authorities so it looks like Google.cn will be shut down.

I guess the hope is that even if they shut down the search engine they will still be able to continue business operations in China as they have a good base there. They could suffer some pretty heavy losses if China pushes them out of the country completely.

Google is now “99.9 per cent” certain it will shut down its Chinese search engine, according to a report citing “a person familiar with the company’s thinking.”

The Financial Times reports that the web giant has drawn up detailed plans for closing Google.cn, saying the company’s discussions with Chinese authorities reached an impasse. The news came hours after a Chinese minister warned Google that it would “have to bear the consequences” if it stopped censoring results on Google.cn.

On January 12, after alleged Chinese hackers pilfered some sort of intellectual property from the company, Google announced it had decided to “no longer” censor search results in China, saying it would spend “the next few weeks” in talks with the government to determine “the basis on which we could operate an unfiltered search engine within the law, if at all.” As it discusses the issue with multiple Chinese ministries, the company continues to censor results in accordance with local law, but it has postponed the release of two Google-branded Android phones in China and suspended the use of Google mobile apps on all Android handsets from Chinese carriers.

Google was pretty brave to stop censoring search results as they surely know how strong China stands on such issues. Without a doubt they were already prepared for the repercussions and ready to close down the search engine.

It seems like a real danger however that Google may have to cease operations in China entirely with the employees of the search giant fearing reprisals from the Chinese government.

As with most stories it might just be a drama over nothing and they’ll work it out, but honestly speaking with the Chinese government involved…I don’t see a pleasant ending in sight.

Echoing comments Eric Schmidt made the first week in March, The FT says that a decision on the matter could come soon, but the pink ‘un also says the web giant may “take some time” to actually follow through with the closure and find ways of ensuring that local employees are protected from action by the government.

According to The FT’s sources, Google wants to continue running its other operations in the country, but apparently, some company execs feel that may not be possible, fearing government reprisals for the closure of Google.cn.

With its January 12 blog post, Google seemed to indicate it may leave the country entirely. “We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China,” the post read. But at one point, CEO Eric Schmidt told The FT: “It’s very important to know we are not pulling out of China…We have a good business in China. This is about the censorship rules, not anything else.”

They are playing hardball too though delaying the launch of 2 android based devices for the Chinese market and suspending the use of Android apps on all Chinese carriers.

China is somewhat of a captive market though, they are not so into Google, Facebook and MSN like the rest of the world..they use their own tools like Baidu, QQ and chinese language based social networking sites.

Either way something is going to go down and I’m pretty sure it involves Google clearing out of China.

Source: The Register

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Legal Issues, Privacy Tagged With: china, google



Reader Interactions

Comments

  1. d347hm4n says

    March 15, 2010 at 11:26 am

    How about the western internet cuts the Chinese off, then they will see how damaging their censorship is. We need their manufacturing, but we can do without their internet. There is nothing web based in china that we in the west will miss.

    The only thing we will miss are communications with friends and colleagues in china.

  2. InfomationWarlord says

    March 16, 2010 at 5:33 am

    good thinking d347hm4n!
    its very rate I need a chinese site, and the translations are terrible anyway, would certainly through a spanner in the works for the chinese hackers too.
    But we should remember that nothing is impossible, they WILL still STEAL our hard earned trade-secrets and research to play catch-up with the west.

    But it would be interesting to see just how much the worlds botnets shrink AND where in the world would the spam originate from then?

    Also who would the the other cyber-offensive nations blame all the attacks on? N. Korea anyone?

    But yeah, cut them off.. the internet is a free realm of infomation sharing, not to be abused by power hungry communists who only want to suppress their people further.

  3. Paul says

    March 19, 2010 at 12:14 am

    The UK is starting its regime of censorship: http://news.bbc.co.uk/1/hi/uk_politics/8569750.stm
    The bill is aimed at internet piracy, however it enables the government start blocking access to websites. This is just of the start of things to come.
    To make matters worse is they don’t understand the technology, “block bittorrents because they are evidently advertising illegal material”. What about the torrents that are evidently advertising legal material?

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 330

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 627

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 572

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 608

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 463

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 692

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,298,160)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,106)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,640)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,691)
  • Password List Download Best Word List – Most Common Passwords (933,528)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,172)
  • Hack Tools/Exploits (673,301)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,185)

Search

Recent Posts

  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy