Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
China Government Privacy Security

Chinese Mobile App Companies Are a National Security Risk, Says a Top Democrat (cnet.com) 76

Chinese mobile app companies pose the same national security risk to the US as telecom giants like Huawei and ZTE, Sen. Mark Warner said in an interview. From a report: Recent US legislation largely banned Huawei and ZTE from use by the government and its contractors, due to concerns about surveillance and other national security risks. Now Warner, the top Democrat on the Senate Intelligence Committee, is signaling that Chinese app developers may face similar scrutiny from lawmakers, corporate America, and the intelligence community.

Warner's comments follow a recent BuzzFeed News report that popular apps from China's Cheetah Mobile and Kika Tech were exploiting user permissions to engage in a form of ad fraud. Eight Android apps with more than 2 billion total downloads were said to be engaging in a form of app-install ad fraud. Google subsequently removed two of the apps from the Play store and said it continues to investigate. Cheetah and Kika deny engaging in app-install fraud. "Under Chinese law, all Chinese companies are ultimately beholden to the Communist Party, not their board or shareholders, so any Chinese technology company -- whether in telecom or mobile apps -- should be seen as extensions of the state and a national security risk," Warner said in an interview this week with BuzzFeed News.
Further reading: Sen. Warner calls for US cyber doctrine, new standards for security.
This discussion has been archived. No new comments can be posted.

Chinese Mobile App Companies Are a National Security Risk, Says a Top Democrat

Comments Filter:
  • How do we know that the Chinese have not put some machine/hardware level malware in the Apple phones electronics ?

    • by SuperKendall ( 25149 ) on Friday December 07, 2018 @03:06PM (#57767094)

      Lots of people (including myself) spend a lot of time with all iPhone networking traffic going through web proxies. We'd especially notice some odd connections going off to China...

      • We'd especially notice some odd connections going off to China

        No you wouldn't. Those crafty devils are hiding data BETWEEN the bits where you don't normally look. Durn Fernegners!

      • Huawei has a big office in Santa Clara, CA. They're so damn secretive over there most employees don't know what projects are done in their own building.

      • Comment removed based on user account deletion
      • by Phylter ( 816181 )
        You're assuming that they don't have an OS level piece that allows their traffic to bypass VPN. In the world of cybersecurity just assume anything is possible.
        • by Rob Riggs ( 6418 )
          Sure... like only leaking data when the phone is connected to a certain rogue LTE nodes...
    • by Kohath ( 38547 ) on Friday December 07, 2018 @04:06PM (#57767524)

      How do we know that the Chinese have not put some machine/hardware level malware in the Apple phones electronics ?

      You know this kind of thing doesn't happen, right? There are hundreds of millions of iPhones. So you'd need an enormous, industrial level conspiracy to get extra hardware in them. And all it would take to unravel the biggest espionage operation in world history is for one person to find one strange thing with one phone. The iPhone is the world's most scrutinized product.

      It's not even believable enough for a movie script.

      • whats wrong with starting a conspiracy theory ?
        lets have some fun

        • by Kohath ( 38547 )

          whats wrong with starting a conspiracy theory ?
          lets have some fun

          It's not fun. People believe that shit and then don't get their kids vaccinated and then their kids die of measles. People believe all kinds of false or exaggerated stories and they make their lives and the lives of the people around them worse.

      • by geek ( 5680 )

        Except its not really a conspiracy. This is why Huawei is banned for gov use in the USA. The NSA and CIA have been found to tamper with US equipment in customs on its way to other nations. China has done the same a number of times.

        Phones may be different but there is a lot of history of this with other tech.

        • by Kohath ( 38547 )

          Yeah, it's possible to tamper with a few devices. It isn't possible to tamper with a few hundred million devices.

      • The CIA did precisely this to the Soviet Union during the Cold War. It's not a stupid conspiracy theory. It is absolutely believable because it really happened. Why do you think the CIA is shouting so loudly about this?
  • by Anonymous Coward

    Is the National Security Risk for (Pick Your Nation).

    Maybe when politicians realize that, and start pressuring companies to produce hardware that is end-user or institution controlled and managed, we will finally have some real security that will be immune to the threat of 'chinese mobile apps' or any other corporate apps (like microsoft, facebook, google, yandex, apple (even if they claim otherwise), etc. All of whom have the same or even more invasive levels of access to personal data, before handing over

  • Only an idiot downloads without checking more about the source. Sadly, many do it.
  • Buying paid reviews is common. And it's blatantly obvious, e.g., when one of my apps gets a review with a comment, it tends to be a sentence or two in length; most of the competitive apps in my space have pages of three-word, five star reviews, clustered together. Google does not appear to care. Most tend to be from a single particular country.

    It's also worth noting that using the Google Play Store is NOT ALLOWED in China. So when you're a developer there doing this kind of stuff, you're 100% guaranteed

  • to any other nation than US.
    And maybe even to US.

  • Pointing fingers to others while you yourself are much better at it.... The US shouldn't be such hypocrites as rhey do it themselves much worse to other countries and to their own citizens...
  • With a proper security model, suspect Android downloads could be sandboxed with permissions to do SFA, and all the IP endpoints it initiates could be thoroughly logged.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...