Feeds

Security holes poked in Chinese compulsory PC filter plan

Green Dam it all

The essential guide to IT transformation

Plans to mandate the use of a particular brand of censorware software in China pose a grave security risk, security watchers and net privacy activists warn.

All PCs shipped to China from July 1 2009 onwards will be required to bundle a locally brewed application called Green Dam Youth Escort in order to prevent access to "harmful content". The parental control/censorship software, developed by Jinhui Computer System Engineering, will be used to block access to porn as well as politically sensitive content, in conjunction with server-side and ISP-level filters (the so-called Great Firewall of China) already in place.

By creating a software monoculture the Chinese authorities are creating a risk that a vulnerability in the software, providing it was serious enough to allow remote code injection, could be used to create a huge botnet. More subtle flaws might also be used to create targeted attacks on government computers - a factor that is unlikely to pass unnoticed down at the NSA.

And the whole exercise might be of limited use anyway, because early versions of the software work only IE or Google Chrome on Windows. According to collaborative tests, carried out in China and summarised by Global Voices here, the software fails to work with Firefox. The software - already widely deployed in China - is incompatible with Mac or Linux machines.

Other reported problems include suggestions that the Green Dam Youth Escort is a resource hog, might be high maintenance when it comes to applying upgrades, and has been found to inadvertently block course-related material in schools.

Questions are also being asked about the costs of the software, estimated as costing 41m Yuan in the first year.

Isaac Mao, a research fellow at Harvard University's Berkman Center for Internet and Society, has uncovered other problems with the software. Communications between the systems at Jinhui and client PC running its Green Dam Youth Escort are unencrypted, leaving the door open for man in the middle attacks and clickstream snooping. It could be the system is designed this way to allow the Chinese government to monitor its citizens.

However, Green Dam maintains that its software is "only a filter", the BBC (citing reports in the official Chinese media last year) reports. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.