This article is within the scope of WikiProject China, a collaborative effort to improve the coverage of China related articles on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
To fill out this checklist, please add the following to the template call: | B1 <!-- Referencing and citations --> = y/n | B2 <!-- Coverage and accuracy --> = y/n | B3 <!-- Structure --> = y/n | B4 <!-- Grammar and style --> = y/n | B5 <!-- Supporting materials --> = y/n
This article is within the scope of WikiProject Google, a collaborative effort to improve the coverage of Google and related topics on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Oppose merge. Interestingly this phrase has become an important part of the 2010 Chinese Internet culture (see zh:中国网络流行语 Chinese Internet slangs) and definitely warrants its own article. A merger proposal in the Chinese Wikipedia has received an overwhelming amount of support for keeping the article the way it is . The phrase has certainly gained enough popularity here in China for it to be kept on Wikipedia, if not in the West. We have many other individual entries for Chinese Internet slangs that are as popular as this or even less popular, for example "Cao Ni Ma", "10 Mythical creatures", "was suicided" (zh:被自杀), "bullying honest horse" (欺实马), "doing push-up" (俯卧撑), "crab - harmony" (河蟹), "thunder" (雷), "getting soy sauce" (zh:打酱油), "囧", "Very good very mighty", "Very erotic very violent" etc.. --Givesaved (talk) 11:34, 18 January 2010 (UTC)
RE: Your argument does not warrant. Clearly the Wikipedia policies on WP:RELIABLE SOURCES, WP:NOTABILITY and WP:VERIFIABILITY outweigh the "need to have these wonderful memes in Wikipedia". As of now, there are zero sources in this article. A google run brings zero that can be considered as reliable. Policy states that blogs and forums are not WP:RS, they are 粪都不如. Without reliable sources, you cannot verify notability. Policy is policy, my friend. I have no idea how things work on Chinese Wikipedia, but policy is strictly enforced on this Wikipedia. Also not that Wikipedia is WP:NOT a DEMOCRACY, as stated by policy, and therefore your argument of consensus strictly based on numbers is null and void. Wikipedia does not revolve around !votes, but strict policy and sourced material. -- 李博杰 | —Talkcontribsemail 01:50, 19 January 2010 (UTC)
I was just responding to your argument above that the topic is not "worthy", not that it's not "notable". Besides I was not utilising the "tyranny of the majority" either; stating that an overwhelming majority exists was simply for illustrating the point that many people do consider the topic to be "worthy" enough to be kept separate; by "many people" I mean many of the people who are actually living in that "environment". As for notability, this may not be as well-known in the English-language media as the Chinese media; Googling the Chinese phrase yields 200,000+ ghits (in a week!) many of which clearly satisfy the "reliable source" and "significant coverage" criteria.
谷歌退出中国催生网络新词“非法献花” - Google's (possible) exit from China hastens the emergence of the new Internet slang "Illegal flower tribute"
全球各地纷纷对 Google 进行“非法献花” - People from around the world voluntarily paying "illegal flower tribute" to Google (Google.org.cn)
Comment: Well, by all means, apply them to the article, where fitting. -- 李博杰 | —Talkcontribsemail 06:09, 19 January 2010 (UTC)
Oppose merge: Google Results 1 - 10 of about 610,000 for Illegal flower tribute. (0.32 seconds)
Like Grass Mud Horse and Jia Junpeng and other internet memes, in time Illegal flower tribute will become a popular internet catch phrase. In fact, Jia Junpeng like Grass Mud Horse are both non-existence in real life. If these two articles can have stay as wiki, so can Illegal flower tribute. Arilangtalk 21:39, 19 January 2010 (UTC)
In time is the key phrase here. Wikipedia is not a crystal ball or some type of "you heard it here first" website. GraYoshi2x►talk 22:13, 21 January 2010 (UTC)
Support' merge: I think this article is too small and exclusive.
Support Merge: Does not warrant it's own article, it ties in directly to Operation Aurora, the cyberattacks that originated in China. —Preceding unsigned comment added by 126.96.36.199 (talk) 10:39, 21 January 2010 (UTC)
No this doesn't tie in directly to Operation Aurora. It has become synonymous to "anything that is deemed illegal by the Chinese authority" or "anything that reflects the spontaneous wishes from ordinary citizens" . --Givesaved (talk) 11:13, 22 January 2010 (UTC)
Support merge - Non-notable topic and relies extensively on WP:OR. This isn't even a meme yet; there's a difference between it and a fad. GraYoshi2x►talk 22:15, 21 January 2010 (UTC)
How is it "non-notable"? And proof for "this isn't even a meme yet"? --Givesaved (talk) 11:13, 22 January 2010 (UTC)
Oppose merge - More than enough examples exist in both English and Chinese to establish "Illegal Flower Tribute" as a stable and relevant meme. --Xero (talk) 22:01, 27 January 2010 (UTC)
Can someone with more knowledge than me fix the introduction? Particularly is not clear, that
Google was attacked as well. (In the introduction is written: "Google disclosed the attack" that doesn't mean automatically that it was a victim as well)
What are the correlation between the attack, the IE vulnerability and Google departure from China.
Reading the introduction they seems to me three independent facts. Possibly because I don't have any other background information beside what is written in the article. --Dia^ (talk) 14:05, 22 January 2010 (UTC)
The weaknesses exploited had been around in IE for many years, but they required some work (by the Chinese hackers) to be made useful. It seems some of the deficiencies (all major software that's being updated will contain weaknesses, that's simply inevitable: the main reason we don't see thousands of Linux exploits and viruses is because hacking Linux is considered much less prestigious among the guys specializing in malicious code) had been around since 1993, Microsoft admitted that much, and thus they predate any version of Explorer. That could imply the weakness was inherent in the Windows kernel code, or a layer close to it., Though of course MS deny that. Strausszek (talk) 07:03, 23 January 2010 (UTC)
One belligerent was certainly Communist China. But I am not at all sure that the other side was the USA. This was an operation against various companies, and people within China. It appears to have been a combined attack on domestic dissidents and an foreign intelligence operation. It was certainly not an operation solely against the USA, as the intro suggests.188.8.131.52 (talk) 04:54, 27 April 2014 (UTC)
"On February 19th 2010, a security expert investigating the cyber-attack on Google, has claimed that the people behind the attack were also responsible for the cyber-attacks made on several Fortune 100 companies in the past one and a half years. They have also tracked the attack back to it's point of origin, which seems to be two Chinese schools.As highlighted by The New York Times, both these schools have ties with the Chinese search engine Baidu, a rival of Google China."
1. Is the source itproportal a good source?
2. I performed a google news search: "james mulvenon google attack fortune 100", and the only result is "itproportal". It's seems it's not widely reported. Most other news sources I checked do not mention "the people behind the attack were also responsible for the cyber-attacks made on several Fortune 100 companies".Now wiki (talk) 21:12, 19 February 2010 (UTC)
Since I find it a bit odd that the second school mentioned, a vocational school, has any ties to Baidu or the government?
I cant even seem to be able to find a link to or even that article at all in New York Times stating that "As highlighted by The New York Times, both these schools have ties with the Chinese search engine Baidu, a rival of Google China." 184.108.40.206 (talk) 10:45, 5 March 2010 (UTC)
Though the counter arguments mentioned in the source I posted first could be worth adding to the article? 220.127.116.11 (talk) 16:22, 5 March 2010 (UTC)
Interested to read the following: Researchers have created attack code that exploits the vulnerability in Internet Explorer 7 (IE7) as well as in the newest IE8—even when Microsoft's recommended defensive measure (Data Execution Prevention (DEP)) is turned on. This piece of information proves that IE6 isn't the only version that is vulnerable and that upgrading to IE7 or IE8 could prove to be futile especially if one is running XP or only upgrading to IE7.
Note the lack of any reference confirming this "prrof". Apart from that, this blurs the facts making it sounds as though all versions of IE on all platforms could have been exploited by the Aurora attack. Unless I remember incorrectly the only versions vulnerable to Aurora were IE6 on XP. There is enough misinformation out there on security already without adding to it like this. I would suggest the paragraph should be removed unless it is corrected with supporting references, and clarified as to levels of vulnerability. —Preceding unsigned comment added by 18.104.22.168 (talk) 20:42, 23 September 2010 (UTC)
The German, Australian, and French governments consider all versions of Internet Explorer vulnerable or potentially vulnerable. <--- Australia is not mentioned in either of those articles. Why does this sentence therefore mention Australia without a reference that says that? --1337Garda (talk) 02:53, 22 May 2012 (UTC)