6.8 KiB
While GitHub did not find sufficient information to determine a valid anti-circumvention claim, we determined that this takedown notice contains other valid copyright claim(s).
One or more repositories in this DMCA takedown notice has been processed in accordance with GitHub's prohibition on sharing unauthorized product licensing keys, software for generating unauthorized product licensing keys, and/or software for bypassing checks for product licensing keys.
You can learn more in GitHub's Acceptable Use Policies.
Are you the copyright holder or authorized to act on the copyright owner's behalf?
Yes, I am authorized to act on the copyright owner's behalf.
Are you submitting a revised DMCA notice after GitHub Trust & Safety requested you make changes to your original notice?
No
Does your claim involve content on GitHub or npm.js?
GitHub
Please describe the nature of your copyright ownership or authorization to act on the owner's behalf.
As the company's [private], I have received formal authorization from the company to represent it in exercising its copyright and other intellectual property rights. This authorization includes, but is not limited to, taking legal actions to protect the company's copyrights, handling infringement cases, and negotiating and signing agreements with third parties regarding copyright matters when necessary. This authorization ensures that I have the legal rights and obligations to protect the company's legal interests and intellectual property security while performing my duties.
Please provide a detailed description of the original copyrighted work that has allegedly been infringed. If possible, include a URL to where it is posted online.
The copyrighted work in question pertains to our company's proprietary software, specifically designed for the Blued platform. This software incorporates sophisticated encryption measures intended to secure user data and ensure the integrity of the application's functionalities. The alleged infringement involves a tool known as "BluedHook," which employs technological means and the Xposed framework to circumvent our software’s encryption protocols. By doing so, BluedHook enables unauthorized modifications to the application, thereby compromising our business interests and violating our copyright. These modifications could potentially allow alterations to user functionalities and unauthorized access to sensitive information, directly infringing upon our intellectual property rights and damaging our commercial interests. If available, you can view the details of our original software and its intended security features at https://www.blued.cn/getapp/730043/a66880/android
What files should be taken down? Please provide URLs for each file, or if the entire repository, the repository’s URL.
https://github.com/lack21115/BluedHook
Do you claim to have any technological measures in place to control access to your copyrighted content? Please see our Complaints about Anti-Circumvention Technology if you are unsure.
Yes
What technological measures do you have in place and how do they effectively control access to your copyrighted material?
In response to the question about the technological measures in place to control access to your copyrighted material, the following can be highlighted based on our adoption of Tencent Cloud services:
Encryption and Security: We utilize Tencent Cloud's robust data security measures, which include encryption of data both at rest and in transit. This ensures that all content, including copyrighted material, is securely stored and protected from unauthorized access.
Access Control: We enforce strict access controls through Tencent Cloud's integrated management systems. These controls ensure that only authorized personnel have access to sensitive data, including copyrighted content. Specific permissions and roles are defined to restrict access to sensitive resources.
Data Governance and Compliance: Leveraging tools like Tencent Cloud's data governance platforms, we ensure compliance with various data protection laws and regulations. This includes regular audits and monitoring to ensure the integrity and security of copyrighted materials.
Advanced Technologies Integration: With the integration of advanced technologies such as AI and big data analytics provided by Tencent Cloud, we can further enhance the monitoring and protection of our copyrighted content. These technologies aid in detecting and responding to potential infringements or unauthorized access attempts.
These measures collectively help in maintaining a high level of security and control over our copyrighted materials, aligning with industry standards and regulatory requirements
How is the accused project designed to circumvent your technological protection measures?
BluedHook uses decompilation techniques and the Xposed framework to crack the software’s encryption measures.
Have you searched for any forks of the allegedly infringing files or repositories? Each fork is a distinct repository and must be identified separately if you believe it is infringing and wish to have it taken down.
We have conducted a thorough search and have not discovered any forks of the allegedly infringing files or repositories. Therefore, at this time, there are no additional distinct repositories that need to be identified or addressed in relation to this matter.
Is the work licensed under an open source license?
No
What would be the best solution for the alleged infringement?
Reported content must be removed
Do you have the alleged infringer’s contact information? If so, please provide it.
No
I have a good faith belief that use of the copyrighted materials described above on the infringing web pages is not authorized by the copyright owner, or its agent, or the law.
I have taken fair use into consideration.
I swear, under penalty of perjury, that the information in this notification is accurate and that I am the copyright owner, or am authorized to act on behalf of the owner, of an exclusive right that is allegedly infringed.
I have read and understand GitHub's Guide to Submitting a DMCA Takedown Notice.
So that we can get back to you, please provide either your telephone number or physical address.
[private]
[private]
Please type your full legal name below to sign this request.
[private]