Posted by: tristar3research | May 20, 2009

China Employing Advanced Network Control Software on opensource code

New Secure Chinese-controlled operating system ALSO Made in China:
Booyah! Credit due to The Dark Visitor !

So… There has been a lot of hype about the supposedly secure made-in-China OS called Kylin, from the Dark Visitor. I’d like to take a moment of your time to explain the backstory and provide some of the details that I was able to find out after downloading it and taking it for a spin. This all started with a May 12 Washington Post article titled “China blocks US from cyber warfare” by Bill Gertz.  The article starts off with a compelling bit:

China has developed more secure operating software for its tens of millions of computers and is already installing it on government and military systems, hoping to make Beijing’s networks impenetrable to U.S. military and intelligence agencies.

Operating license? Windows or Linux! Youre Under Arrest! (After You Pay Me!)

Operating license? Windows or Linux! You're Under Arrest! (After You Pay Me!)

I found this to be very interesting because it was the first time I had ever heard about this effort.  I was aware of Red Flag linux and Asianux but hadn’t heard of any made-in-China operating systems designed for security.  I was intrigued for sure and suprised to find out that the operating system can be downloaded in two iso files from  It took about four days to complete both of the downloads and about ten minutes to install in a VM. For a more complete back story, check out this article by Jonathan D. Abolins.

Mr. Tim Thomas at Dartmouth

UPDATE:  The author of this article makes a slight mistake on the title of Tim’s book calling it, Fighting the Virtual Dragon.  The title is Decoding the Virtual Dragon. Mr. Thomas has done extensive research into PLA cyber warfare and is the best in the business on PRC strategy.

Understanding China’s strategic approach to cyber warfare is essential to defending the United States from hackers, Timothy Thomas, an analyst at the Foreign Military Studies Office at Fort Leavenworth in Kansas, said in a lecture on Tuesday in the Haldeman Center. The anonymous nature of cyber attacks often complicates cyber defense, Thomas said in the lecture.

Dartmouth lecture on cyber warfare


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s


%d bloggers like this: