Feeds

More holes open up in Green Dam Youth Escort

US firm claims China stole its filters

Website security in corporate America

A US software firm claims that China's already infamous Green Dam Youth Escort censorship software has liberally lifted code from its own cyber-filtering product.

Solid Oak Software of Santa Barbara claims that the Green Dam package - which Beijing has declared must be installed on all PCs shipped in the People's Republic as part of its great battle against foreign filth - incorporates code from its own Cybersitter program.

The allegedly lifted code includes blacklists and update instructions, as well as a news update file dating back to 2004.

Solid Oak is seeking an injunction against the Chinese developer of Green Dam, Jinhui Computer System Engineering Inc, but its chances of gaining satisfaction must be reckoned to be fairly slim.

So, it's no surprise it is also seeking injunctions against US PC vendors who follow Beijing's directive that any machines they ship in China must carry the software.

"They are stealing proprietary copyrighted material from us, sending it over to the US and saying, 'We want this on all the computers you send us'," Solid Oak president Brian Milburn told Reuters. "Just because we are a small company doesn't make the theft of CyberSitter any less [wrong]."

Milburn told Reuters he had been tipped off via an anonymous email. "We found actual proprietary code areas within the Green Dam program itself which are incredibly suspicious because they use our proprietary encryption methods. There's a lot more to it than just a list of bad words."

Jinhui boss Bryan Zhang told a local paper: "That's impossible."

The code spat is the latest controversy to engulf Green Dam. The launch of the software last week was seen as a thinly-veiled attempt at further political censorship. Researchers quickly claimed to have found flaws which could allow the software to be used to create a giant botnet, sparking even quicker claims that this would be exactly what Beijing wants.

Other tests showed that the software was configured to block political material as well as smut, with Falun Gong and other political terms built into the software, along with mechanisms to stop Chinese using proxy servers to get round the country's Great Firewall. ®

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.