Caporegime
- Joined
- 9 Nov 2009
- Posts
- 25,342
- Location
- Planet Earth
yes I had read most of the commitee report (that I also linked earlier) it's more about their 5G s/w process, than, evaluating characteristics of their phones
to ensure there was no hardware backdoor.
ARM or a 3rd party would have to perfrom formal verification that the secure code execution modules, going onto the phone soc had not been modified versus the original specification and behavoural description ... but I have not seen mention of such a process ... so much easier at least for high security commerical companies and security services just to say no Huawei in their environment.
[ the wiki leaks document on Gamma the Uk company used for surveillance makes intereresting reading https://wikileaks.org/spyfiles/docs/GAMMA-2011-NewsQ1-en.pdf
just the banality of it ]
edit - afterthought, given all the monitoring china conducts for it's own population, a phone backdoor has to be the easiest solution - listened to an article about their face recognition, setting off alarms if 'undesirables' arrived at the train station or outside schools.
China does not need any hardware backdoors in its local equipment as it controls the whole software ecosystem over there,and its not like they are exactly hiding what they are doing.
If GCHQ is not finding these backdoors,I think its becoming more and more hearsay at least at present. It wouldn't surprise me if similar concerns were made about Japan and South Korea decades ago either,and it will be the case if you use any countries equipment for infrastructure. If anything it should be standard practice to check any imported equipment,even if it is for shoddy engineering which could be exploited by criminals and I would be more concerned with that aspect of certain Chinese equipment TBH!
![Stick Out Tongue :p :p](/styles/default/xenforo/vbSmilies/Normal/tongue.gif)
I am surprised it took the Chinese threat for us to start looking more closely at equipment. I thought this should be standard operating practice.
It might be a thing for even stuff like phones to be shipped as bare hardware,so the OSes can be installed over here,to mitigate any chance of dodgy software being installed in the countries of origin.
It also has been shown by various leaks the NSA are involved in a ton of spying with details of the tools released,to the extent of the NSA installing backdoors on Cisco routers,and that the German government was spied on by US intelligence agencies. The problem,is we don't really know what all the US companies are doing either,and as a European,maybe we need to be thinking of more European centric platforms,instead of using Chinese,American,South Korean,etc stuff.
People are using unsafe platforms like Facebook which are being data mined by companies. This is hardware agnostic,meaning any platform can be compromised as its the user installing the software.
Palantir technologies and Cambridge Analytica worked on data mining Facebook:
https://en.wikipedia.org/wiki/Palantir_Technologies
https://www.cnbc.com/2018/03/27/pal...ytica-on-the-facebook-data-whistleblower.html
Who are they data mining facebook and other social media for?? The highest bidder,which could mean anybody,be it a private company or any country around the world.
WhatsApp was hacked by an Israeli company:
https://www.timesofisrael.com/israeli-company-nso-group-suspected-of-hacking-whatsapp/
Again,who for??
Its is easier to compromise social media platforms. Do you know that even "loyalty cards" are used for data mining customers?? Apparently changes in health,etc can be confirmed by looking at changes in what you buy. Plus any Google product is data mining your whole existence,and that data is being sold on,apparently just for better marketing of products. But we don't know the extent of what is happening and whether third parties can exploit this.
Epic games is 40% owned by the Chinese giant Tencent,so again we don't know if the EGS is being data mined either??
Last edited: