dmca/2017/2017-12-06-DJI.md

6.8 KiB
Исходник Ответственный История

December 5, 2017
GitHub, Inc.
88 Colin P. Kelly Jr. St.
San Francisco, CA. 94107

To Whom It May Concern,

We have read and understand GitHub's Guide to Filing a DMCA Notice.
It has come to our attention that some of our confidential and proprietary information has been posted on your website by unauthorized parties. These information has not been and would not be posted online by us, and includes but is not limited to our code related to our internal systems and confidential information of our websites. For your better reference, we would list the description of infringed information respectively below.
Material infringing our copyright appears in the repositories below. We have searched for the forks of the infringing repositories and files, and the forks are also listed below.
As the copyright owner of the infringed information, we requests that the users identified above remove all infringing content from their repositories.
We have a good faith belief that use of the copyrighted materials described above on the infringing web pages is not authorized by the copyright owner, or its agent, or the law. We have taken fair use into consideration.
We swear, under penalty of perjury, that the information in this notification is accurate and that we are the copyright owner, or are authorized to act on behalf of the owner, of an exclusive right that is allegedly infringed.

  1. Infringed URL: https://github.com/MAVProxyUser/green

Solution: Take down the whole repository.

Description:

Leaked code of our official website from our software engineer. The repository contains sensitive AWS S3 and Lambda information, and our AWS access keys could be found in https://github.com/MAVProxyUser/green/blob/master/tasks/image-pre-process/process-flow/bin/lambda.js and https://github.com/MAVProxyUser/green/blob/master/tasks/gulp-static.js.

  1. Infringed URL: https://github.com/MAVProxyUser/ploadervice_API_EDI_CLS-1.5

Solution: Take down the whole repository.

Description: Leaked code of our MES project. This is a private project but be mistakenly put on public GitHub repository.

  1. Infringed URL:

a) https://github.com/zhencang/XXAll/blob/master/%E7%9B%B8%E6%9C%BA/XXCamara/XXCamara/camera/GPUExtern/GPUImageCustomFastUploadDataSource.h

b) https://github.com/zhencang/XXAll/tree/master/%E7%9B%B8%E6%9C%BA/XXCamara/XXCamara/camera/GPUExtern

c) https://github.com/zhencang/XXAll/tree/master/%E7%9B%B8%E6%9C%BA/XXCamara/XXCamara/OldCamera

d) https://github.com/zhencang/XXAll/tree/master/%E7%9B%B8%E6%9C%BA

e) https://github.com/zhencang/XXAll/tree/master/%E5%86%85%E5%AD%98%E5%88%86%E6%9E%90

Solution: Take down the content in the infringed URL.

Description: Partially offense our copyright. Use our GPU image extension. In the first infringed URL, theres our copyright information stated as ” Copyright (c) 2016年 DJI. All rights reserved.”.

  1. Infringed URL: https://github.com/MAVProxyUser/hanking-PR

Solution: Take down the whole repository.

Description: Leaked code of our private project mistakenly be put on public repository.

  1. Infringed URL:

a) https://github.com/albertqiu/batch_py

b) https://github.com/MAVProxyUser/batch_py

Solution: Take down the whole repository.

Description:

Leaked code of our former engineer's tools for operation and maintenance. The repository also contains several root keys and ip addresses for our company's server. URL for the keys in this repository are(https://github.com/albertqiu/batch_py/blob/master/business/preview/wwwdjicom/hosts, https://github.com/albertqiu/batch_py/blob/master/business/production/wwwdjicom/hosts, https://github.com/albertqiu/batch_py/blob/master/etc/hosts, https://github.com/albertqiu/batch_py/blob/master/business/preview/wwwdjicom/hosts, https:/github.com/albertqiu/batch_py/blob/master/business/production/wwwdjicom/hosts, https:/github.com/albertqiu/batch_py/blob/master/etc/hosts, https://github.com/albertqiu/batch_py/blob/master/etc/keys/iflydji-dev-key.pem, https://github.com/albertqiu/batch_py/blob/master/etc/keys/us-east-djiplus-team-key-production-store.pem, https://github.com/albertqiu/batch_py/blob/master/etc/hosts_bak, f89eb0d702/etc/hosts)

  1. Infringed URL:

a) https://github.com/MAVProxyUser/skypixel_lottery

b) https://github.com/Angdo/skypixel_lottery

c) https://github.com/lukw00/skypixel_lottery

d) https://github.com/rainbows/skypixel_lottery

e) https://github.com/suddy/skypixel_lottery

f) https://github.com/szpnygo/skypixel_lottery

Solution: Take down the whole repository.

Description:

The whole repository is our front-end engineer's leaked code of marking event project. Contain AWS S3 bucket ID and key for our company. The leak is very severe, because theres an AWS access key in these code. (https://github.com/MAVProxyUser/skypixel_lottery/blob/master/www/public/main.js)

  1. Infringed URL:

a) https://github.com/zhangkaka/backup

b) https://github.com/MAVProxyUser/backup

Solution: Take down the whole repository.

Description: The repository is our former employee's tools for operation and maintenance, and contain server address and text message service key for our company. The keys could be found in https://github.com/zhangkaka/backup/blob/master/s3conf.py and https://github.com/zhangkaka/backup/blob/master/sendsms.py.

  1. Infringed URL:

a) https://github.com/chacha923/wdx-before-2017

b) https://github.com/humyue/wdx-before-2017

c) https://github.com/MAVProxyUser/wdx-before-2017

Solution: Take down the whole repository.

Description: Leaked source code of our UTM Server mistakenly be put on public repository.

  1. Infringed URL:

a) https://github.com/wixed/AppiumTurboEasySales

b) https://github.com/RainYang0925/AppiumTurboEasySales

c) https://github.com/xushaominKevin/capinfo-autotest

d) https://github.com/PennyPan717/AutoApp

Solution: Take down the whole repository.

Description:

The repository contains source code of our company. E.g. testing code for DJI Store, Skypixel and Dji Go. The code include testing log and app screenshot, testing username and password. The password could be found in https://github.com/wixed/AppiumTurboEasySales/blob/master/src/test/resources/testng.xml.

  1. Infringed URL: https://github.com/MAVProxyUser/test

Solution: Take down the whole repository.

Description: The repository contains our testing engineer's source code for IOS.

  1. Infringed URL:

a) https://github.com/MAVProxyUser/dji-games

b) https://github.com/zlorenz/dji-games

Solution: Take down the whole repository.

Description: The repository is source code from our marketing department event's private project.

If any inquires regarding this notice, please contact: [private] or [private]
[private]
14th Floor, West Wing, Skyworth Semiconductor Design Building, No.18 Gaoxin South 4th Ave, Nanshan District, Shenzhen, China, 518057.

[private], on behalf of
SZ DJI Technology Company Limited