Feeds

Microsoft cops to webcode theft

Blames 'Chinese vendor'

Internet Security Threat Report 2014

Microsoft has admitted that its new Chinese microblogging service used webcode pilfered from a similar service popular elsewhere in Asia.

On Monday, as reported by The Reg, Asian microblogging site Plurk accused Microsoft China of pilfering its code for a new social-networking feature known as Juku on the Chinese MSN site.

Monday night, Microsoft announced that it had removed the offending feature as it investigated the charges, and now, Microsoft has admitted that the code was indeed lifted from Plurk.

That said, Microsoft puts the blame on an unnamed partner:

On Monday, December 14, questions arose over a beta application called Juku developed by a Chinese vendor for our MSN China joint venture. We immediately worked with our MSN China joint venture to investigate the situation.
The vendor has now acknowledged that a portion of the code they provided was indeed copied. This was in clear violation of the vendor's contract with the MSN China joint venture, and equally inconsistent with Microsoft’s policies respecting intellectual property.

Microsoft's statement also notes that it would suspend its new social-networking feature "indefinitely."

But Plurk isn't entirely mollified. "Microsoft has used this 'independent vendor' strategy to try and absolve itself of responsibility for deliberate actions undertaken by them as recently as last month," a company spokesman tells The Reg. That would be the ImageMaker incident, when Microsoft was forced to remove a Windows 7 media and administration tool from the Microsoft Store site after a violation of the GPL. Microsoft did indeed blame a third party, and it later open sourced the tool.

Speaking with The Reg, Plurk questions whether today's statement from Microsoft is just more spin. "It just appears to be a stop-gap measure, damage-control measure, and we have a very hard time believing, given the size and scope of the undertaking, that there was no active involvement or development taking place directly within Microsoft itself on this service," the company said.

"While they have temporarily shut the site down, it appears some of the lifted code still appears to be on the club.msn.cn site", citing this chunk of code as "just one example."

Clearly, some wrinkles still need to be ironed out in the resolution of the Plurk/Microsoft dust-up. As Microsoft said in its statement: "We are obviously very disappointed, but we assume responsibility for this situation. We apologize to Plurk and we will be reaching out to them directly to explain what happened and the steps we have taken to resolve the situation." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?