Risk
7/2/2009
01:22 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

China's Green Dam 'Definitely' Coming

The controversial requirement that PCs in China come with the Green Dam Web filter may have been postponed, but the rule will be implemented, a Chinese official insists.

Celebrations following the Chinese government's last minute decision to delay its requirement that all PCs sold in the country come with Web filtering software known as Green Dam may be premature.

An unidentified Ministry of Industry and Information Technology official on Thursday told China Daily that it is only a matter of time before the rule get implemented. "The government will definitely carry on the directive on Green Dam," he reportedly said.

Such sentiment belies the notion that China has backed down. Indeed, when Western democracies like Australia, Britain and Germany all support forms of Web site filtering to protect children and silence hate speech, China can hardly be expected to do any less.

And China's recent introduction of new rules imposing content tracking requirements on sexual health sites and limiting the redemption of virtual currencies, not to mention its condemnation of Google for displaying porn links, demonstrates that the government's enthusiasm for such restrictions isn't a passing fad.

Indeed, the Green Dam software is already widely installed in schools and Internet cafes despite its well-documented security problems.

That's not to say resistance is futile. Rebecca MacKinnon, assistant professor at the Journalism & Media Studies Center at the University of Hong Kong, sees the events of the past few weeks as a sign that both industry and individuals can influence Chinese government policy, particularly on matters of information and technology that affect people across the country.

"The Green Dam episode proves yet again that when companies respond to critics by saying things like: 'it's beyond our control if we want to do business in China' or 'there's nothing we can do or we will get kicked out,' that is a huge pile of, well, equine excrement," she said in a blog post on Thursday.

Google, Microsoft, and Yahoo, among other technology companies, have all made the argument they must obey the law in countries where they do business, particularly in the context of China. Yet when faced with a law that would harm their businesses by forcing insecure and allegedly infringing software upon consumers, the tech industry managed -- with the help of the U.S. government and Internet users in China -- to postpone the implementation of that law.

The message for businesses is don't be spineless.

"Ethical business practices that demonstrate respect for users' and customers' interests and rights -- despite a very difficult regulatory environment -- will serve companies better in the long run," said MacKinnon. "A roll-over-and-play-dead policy is no way to build a brand's reputation in China or anywhere else."

Black Hat is like no other security conference. It happens in Las Vegas, July 25-30. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida, Co-founder, CEO & CTO, Uplevel Security,  9/18/2017
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.