Feeds

US net nanny ratchets Chinese censorware spat

Stall the PC makers. Then sue

Beginner's guide to SSL certificates

US software maker Solid Oak has beefed up efforts to prevent the distribution of China's "Green Dam" app, continuing to claim that the Far East censorshipware includes code lifted from its own net-filtering tool, Cybersitter.

The Chinese government has decreed that all new machines in the country must ship with the infamous Green Dam. But on Monday, Solid Oak sent "cease and desist" letters to Dell and HP, saying that if the companies bundled the software on machines, they would face claims for damages. Now the net-nanny maker has send similar letters to Sony, Toshiba, Acer, Lenovo, and Gateway.

According to company spokeswoman Jenna DiPasquale, none of these PC manufacturers has responded. "We know that it's not the fault of the US PC manufacturers that this is happening," she tells The Reg. "That's why we have sent cease and desist letters before actually filing a court injunction. We think that's a more polite way to deal with it, considering we're all in the same industry."

Solid Oak also intends to sue the makers of Green Dam, including not only Jinhui Computer System Engineering but also Dazheng Language Knowledge Process Technology Co. Ltd.. "Right now, we're just trying to prevent the Green Dam software from being put on machines," DiPasquale says, indicating it will be sending letters to more manufacturers. "Once we're through with that, we're going to look into a possible lawsuit against the two developers in China."

She says that multiple law firms in China have contacted the company to offer their help with a possible suit.

Green Dam Youth Escort works to identify images, text, and urls visited by net surfers, and if they match blacklisted items, they're blocked. According to The New York Times, Beijing is demanding that the software be loaded on all new machines starting July 1. The package is called Green Dam because Beijing likes to associate a censored internet with greenness.

Solid Oak claims that Green Dam code uses DLLs tagged with the name of its CyberSitter application and actually makes calls back to Solid Oak servers. Open-source types have also noticed that the Chinese smut-filter is using OpenCV code without displaying the proper license. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.