Connect with us

Communication

Apple Consents to Product Security Audits from Chinese Government

Published

on

Apple has reportedly agreed to allow China’s State Internet Information Office to run security audits on Apple products sold in China. While the exact nature of the security checks is unknown, it’s suggested that Chinese state officials and security experts will be granted access to iOS and OS X source code.

// -- Discuss and ask questions in our community on Workplace.

Apple CEO Tim Cook met with China’s information office director Lu Wei back in December. Cook reportedly told Wei,

There were rumors that Apple built back doors in its devices, and let third parties have data and access those devices, but that was never true and that we would never do that in the future either.

This statement echoes Cook’s open letter on privacy where he states, “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services.” However, Wei responded to Cook by saying,

// -- Become a yearly Platinum Member and save 69 USD. Click here to change your current membership -- //

It doesn’t matter what you say, you should let our internet safety department do a safety assessment. We need to reach our own conclusions to put the consumer at ease.

China to Audit Apple Products’ Security, Cause for Concern?

Apple Consents to Product Security Audits from Chinese Government

Tim Cook shaking hands with Lu Wei

The historically secretive Apple has always been very protective of its products’ source code. However, with over 1.3 billion people, China is a huge market for many western companies, especially Apple. As a result, Apple appears to have bowed to pressure from the Chinese government to allow the state to run security checks on Apple products, or else risk future business in the country.

China has frequently criticised American technology companies about security, citing concerns about US backdoors after Edward Snowden’s revelations about the NSA. While Chinese state officials claim to have consumers in mind, trying to protect them from possible US surveillance, China is notorious for its own internet surveillance and censorship. As a result, many privacy advocates have expressed concern over Apple handing over so much detail about its products to the Chinese government.

Percy Alpha, the pseudonymous founder of GreatFire.org, stated, “Handing over source code [would] mean that the Chinese government will know exactly how an Apple software works.” With detailed knowledge of how iOS and OS X work behind the scenes, the Chinese government could find it easier to find vulnerabilities and exploit them, targeting both Chinese citizens and Apple product users worldwide. Back in October, Chinese hackers, possibly sponsored by the government, launched a man-in-the-middle attack targeting iCloud users in China.

However, not everyone believes that China’s security audit will have such drastically negative consequences. After all, the exact nature of the security checks is unknown, and Apple may not actually offer as much information to China as analysts speculate. Apple has already displayed its opposition to government surveillance by enabling stronger encryption in iOS 8 that not even the FBI can bypass.

Featured image from Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

I've always been interested in the latest stuff in science and technology, and I'm currently a freshman undergraduate electrical engineering student at the University of Texas at Austin.




Feedback or Requests?

Communication

San Bernadino iPhone Case: Major Press Agencies Are Suing the FBI

Published

on

The Associated Press, Gannett, and VICE Media are suing the FBI to know more details about the agency’s hack of the San Bernadino killer’s iPhone.

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

5 stars on average, based on 2 rated postsP. H. Madore has covered the cryptocurrency beat over the course of hundreds of articles for Hacked's sister site, CryptoCoinsNews, as well as some of her competitors. He is a major contributing developer to the Woodcoin project, and has made technical contributions on a number of other cryptocurrency projects. In spare time, he recently began a more personalized, weekly newsletter at http://ico.phm.link




Feedback or Requests?

Continue Reading

Communication

Toward Unbreakable Quantum Encryption for Everyone

Published

on

Hacked recently covered the efforts of the Chinese government to build unbreakable quantum communication networks. According to analysts, quantum communications networks are so expensive that they could have a “recentralizing effect,” enabling states to recover the ground that they have lost to decentralizing digital technologies. But what if ultra-secure quantum cryptography could be made available to everyone at low cost?

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Giulio Prisco is a freelance writer specialized in science, technology, business and future studies.




Feedback or Requests?

Continue Reading

Communication

The Chinese Quantum Satellite QUESS: Toward Unbreakable Quantum Networks

Published

on

One year ago Hacked covered the race between the US and China to develop “military super-powers” by harnessing quantum science, and noted that Chinese scientists were developing quantum communication satellites that support unbreakable encryption. A few weeks ago, China launched its first quantum satellite.

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Giulio Prisco is a freelance writer specialized in science, technology, business and future studies.




Feedback or Requests?

Continue Reading

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending