Feeds

More holes open up in Green Dam Youth Escort

US firm claims China stole its filters

Next gen security for virtualised datacentres

A US software firm claims that China's already infamous Green Dam Youth Escort censorship software has liberally lifted code from its own cyber-filtering product.

Solid Oak Software of Santa Barbara claims that the Green Dam package - which Beijing has declared must be installed on all PCs shipped in the People's Republic as part of its great battle against foreign filth - incorporates code from its own Cybersitter program.

The allegedly lifted code includes blacklists and update instructions, as well as a news update file dating back to 2004.

Solid Oak is seeking an injunction against the Chinese developer of Green Dam, Jinhui Computer System Engineering Inc, but its chances of gaining satisfaction must be reckoned to be fairly slim.

So, it's no surprise it is also seeking injunctions against US PC vendors who follow Beijing's directive that any machines they ship in China must carry the software.

"They are stealing proprietary copyrighted material from us, sending it over to the US and saying, 'We want this on all the computers you send us'," Solid Oak president Brian Milburn told Reuters. "Just because we are a small company doesn't make the theft of CyberSitter any less [wrong]."

Milburn told Reuters he had been tipped off via an anonymous email. "We found actual proprietary code areas within the Green Dam program itself which are incredibly suspicious because they use our proprietary encryption methods. There's a lot more to it than just a list of bad words."

Jinhui boss Bryan Zhang told a local paper: "That's impossible."

The code spat is the latest controversy to engulf Green Dam. The launch of the software last week was seen as a thinly-veiled attempt at further political censorship. Researchers quickly claimed to have found flaws which could allow the software to be used to create a giant botnet, sparking even quicker claims that this would be exactly what Beijing wants.

Other tests showed that the software was configured to block political material as well as smut, with Falun Gong and other political terms built into the software, along with mechanisms to stop Chinese using proxy servers to get round the country's Great Firewall. ®

The essential guide to IT transformation

More from The Register

next story
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
China hopes home-grown OS will oust Microsoft
Doesn't much like Apple or Google, either
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Fast And Furious 6 cammer thrown in slammer for nearly three years
Man jailed for dodgy cinema recording of Hollywood movie
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?