Risk
7/2/2009
01:22 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

China's Green Dam 'Definitely' Coming

The controversial requirement that PCs in China come with the Green Dam Web filter may have been postponed, but the rule will be implemented, a Chinese official insists.

Celebrations following the Chinese government's last minute decision to delay its requirement that all PCs sold in the country come with Web filtering software known as Green Dam may be premature.

An unidentified Ministry of Industry and Information Technology official on Thursday told China Daily that it is only a matter of time before the rule get implemented. "The government will definitely carry on the directive on Green Dam," he reportedly said.

Such sentiment belies the notion that China has backed down. Indeed, when Western democracies like Australia, Britain and Germany all support forms of Web site filtering to protect children and silence hate speech, China can hardly be expected to do any less.

And China's recent introduction of new rules imposing content tracking requirements on sexual health sites and limiting the redemption of virtual currencies, not to mention its condemnation of Google for displaying porn links, demonstrates that the government's enthusiasm for such restrictions isn't a passing fad.

Indeed, the Green Dam software is already widely installed in schools and Internet cafes despite its well-documented security problems.

That's not to say resistance is futile. Rebecca MacKinnon, assistant professor at the Journalism & Media Studies Center at the University of Hong Kong, sees the events of the past few weeks as a sign that both industry and individuals can influence Chinese government policy, particularly on matters of information and technology that affect people across the country.

"The Green Dam episode proves yet again that when companies respond to critics by saying things like: 'it's beyond our control if we want to do business in China' or 'there's nothing we can do or we will get kicked out,' that is a huge pile of, well, equine excrement," she said in a blog post on Thursday.

Google, Microsoft, and Yahoo, among other technology companies, have all made the argument they must obey the law in countries where they do business, particularly in the context of China. Yet when faced with a law that would harm their businesses by forcing insecure and allegedly infringing software upon consumers, the tech industry managed -- with the help of the U.S. government and Internet users in China -- to postpone the implementation of that law.

The message for businesses is don't be spineless.

"Ethical business practices that demonstrate respect for users' and customers' interests and rights -- despite a very difficult regulatory environment -- will serve companies better in the long run," said MacKinnon. "A roll-over-and-play-dead policy is no way to build a brand's reputation in China or anywhere else."

Black Hat is like no other security conference. It happens in Las Vegas, July 25-30. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.