Feeds

Security holes poked in Chinese compulsory PC filter plan

Green Dam it all

Secure remote control for conventional and virtual desktops

Plans to mandate the use of a particular brand of censorware software in China pose a grave security risk, security watchers and net privacy activists warn.

All PCs shipped to China from July 1 2009 onwards will be required to bundle a locally brewed application called Green Dam Youth Escort in order to prevent access to "harmful content". The parental control/censorship software, developed by Jinhui Computer System Engineering, will be used to block access to porn as well as politically sensitive content, in conjunction with server-side and ISP-level filters (the so-called Great Firewall of China) already in place.

By creating a software monoculture the Chinese authorities are creating a risk that a vulnerability in the software, providing it was serious enough to allow remote code injection, could be used to create a huge botnet. More subtle flaws might also be used to create targeted attacks on government computers - a factor that is unlikely to pass unnoticed down at the NSA.

And the whole exercise might be of limited use anyway, because early versions of the software work only IE or Google Chrome on Windows. According to collaborative tests, carried out in China and summarised by Global Voices here, the software fails to work with Firefox. The software - already widely deployed in China - is incompatible with Mac or Linux machines.

Other reported problems include suggestions that the Green Dam Youth Escort is a resource hog, might be high maintenance when it comes to applying upgrades, and has been found to inadvertently block course-related material in schools.

Questions are also being asked about the costs of the software, estimated as costing 41m Yuan in the first year.

Isaac Mao, a research fellow at Harvard University's Berkman Center for Internet and Society, has uncovered other problems with the software. Communications between the systems at Jinhui and client PC running its Green Dam Youth Escort are unencrypted, leaving the door open for man in the middle attacks and clickstream snooping. It could be the system is designed this way to allow the Chinese government to monitor its citizens.

However, Green Dam maintains that its software is "only a filter", the BBC (citing reports in the official Chinese media last year) reports. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.