Feeds

Security holes poked in Chinese compulsory PC filter plan

Green Dam it all

5 things you didn’t know about cloud backup

Plans to mandate the use of a particular brand of censorware software in China pose a grave security risk, security watchers and net privacy activists warn.

All PCs shipped to China from July 1 2009 onwards will be required to bundle a locally brewed application called Green Dam Youth Escort in order to prevent access to "harmful content". The parental control/censorship software, developed by Jinhui Computer System Engineering, will be used to block access to porn as well as politically sensitive content, in conjunction with server-side and ISP-level filters (the so-called Great Firewall of China) already in place.

By creating a software monoculture the Chinese authorities are creating a risk that a vulnerability in the software, providing it was serious enough to allow remote code injection, could be used to create a huge botnet. More subtle flaws might also be used to create targeted attacks on government computers - a factor that is unlikely to pass unnoticed down at the NSA.

And the whole exercise might be of limited use anyway, because early versions of the software work only IE or Google Chrome on Windows. According to collaborative tests, carried out in China and summarised by Global Voices here, the software fails to work with Firefox. The software - already widely deployed in China - is incompatible with Mac or Linux machines.

Other reported problems include suggestions that the Green Dam Youth Escort is a resource hog, might be high maintenance when it comes to applying upgrades, and has been found to inadvertently block course-related material in schools.

Questions are also being asked about the costs of the software, estimated as costing 41m Yuan in the first year.

Isaac Mao, a research fellow at Harvard University's Berkman Center for Internet and Society, has uncovered other problems with the software. Communications between the systems at Jinhui and client PC running its Green Dam Youth Escort are unencrypted, leaving the door open for man in the middle attacks and clickstream snooping. It could be the system is designed this way to allow the Chinese government to monitor its citizens.

However, Green Dam maintains that its software is "only a filter", the BBC (citing reports in the official Chinese media last year) reports. ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?