{"id":46896,"date":"2023-10-18T21:28:49","date_gmt":"2023-10-18T10:28:49","guid":{"rendered":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=46896"},"modified":"2023-10-18T21:28:49","modified_gmt":"2023-10-18T10:28:49","slug":"chinas-shaking-down-tech-companies-to-steal-your-data","status":"publish","type":"post","link":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=46896","title":{"rendered":"China\u2019s \u201cshaking down\u201d tech companies to steal your data"},"content":{"rendered":"<p>(Tom: I received this in an emailed newsletter. No shortage of risks in a digital world. Seems the old saw &#8220;knowledge is power&#8221; cuts both ways. [Pardon the pun.])<\/p>\n<p>ByteDance is a China-based tech company. They own several smartphone apps but are best known as the parent company of TikTok.<\/p>\n<p>Now, I don\u2019t have to tell you about the dangers of TikTok, there has been plenty written and recorded about that.<\/p>\n<p>Yet, ByteDance and any tech company operating in China have to face new challenges in the way they handle cyber security.<\/p>\n<p>China has imposed a law that requires tech companies to report software flaws to the government.<\/p>\n<p>Companies must report the flaw within 48 hours, and it has to be reported before it\u2019s fixed (there is an obvious sinister intent to this law, which I\u2019ll talk about in a moment).<\/p>\n<p>In the case of ByteDance, the company provided the government with \u201csuper user\u201d credentials, giving the government unlimited access to user data.<\/p>\n<p>Which means, the Chinese government was able to collect the data of any and all U.S.-based users, estimated at over 150 million U.S. TikTok users.<\/p>\n<p>There is a lot more to this law than meets the eye. So, here are a few reasons why this law could affect users in the U.S.<\/p>\n<p>State-sponsored hacking:<\/p>\n<p>There is (obviously) a reason the government wants the information on the flaw before it\u2019s fixed&#8230;<\/p>\n<p>It allows government hackers to get into the database and extract data. This is especially scary for foreign-made software.<\/p>\n<p>And as you\u2019ve already seen, it\u2019s not just Chinese citizens that will be compromised.<\/p>\n<p>The Chinese government could infiltrate the software and its users who could be anywhere in the U.S.<\/p>\n<p>So, if you use any software that is made in China you should pay close attention if the company is ever hacked.<\/p>\n<p>If there is a security flaw it\u2019s not just hackers you need to worry about, you have to assume the Chinese government has the data as well.<\/p>\n<p>Collected vulnerabilities:<\/p>\n<p>It\u2019s no secret that the Chinese government has massive cyber hacking operations.<\/p>\n<p>While the Chinese hackers are good at what they do they aren&#8217;t perfect.<\/p>\n<p>But now they\u2019ll have access to the latest security flaws from tech companies around the world.<\/p>\n<p>By getting information on security issues that tech companies are facing, the hackers are essentially being given blueprints for hacking operations in the future.<\/p>\n<p>So, if there was a hacking method the Chinese hackers missed or overlooked, they would learn about it from the tech companies being forced to self-report.<\/p>\n<p>Foreign companies also comply:<\/p>\n<p>There are plenty of U.S. companies that have offices and operations in China.<\/p>\n<p>But even though these companies are not based in China they are still required to follow the law \u2013 it&#8217;s the cost of doing business there.<\/p>\n<p>There have been reports that some foreign tech companies have already started complying with the law.<\/p>\n<p>They\u2019ve had to open their software to the Chinese government and its hackers, these companies have no choice unless they want to leave China.<\/p>\n<p>Which means, even if a company is based in the U.S, it still may be forced to share security flaws with the Chinese government or be shut out of doing business there.<\/p>\n<p>This intrusive Chinese law, and forced compliance, requires you to be even more vigilant when it comes to your security online.<\/p>\n<p>That\u2019s why I continue to use a simple, proven method to keep my personal and private information shielded from prying eyes and hackers.<\/p>\n<p>Jason Hanson<\/p>\n<p>Editor, Black Bag Confidential<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(Tom: I received this in an emailed newsletter. No shortage of risks in a digital world. Seems the old saw &#8220;knowledge is power&#8221; cuts both ways. [Pardon the pun.]) ByteDance is a China-based tech company. They own several smartphone apps but are best known as the parent company of TikTok. Now, I don\u2019t have to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=46896\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;China\u2019s \u201cshaking down\u201d tech companies to steal your data&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-46896","post","type-post","status-publish","format-standard","hentry","category-general-interest"],"_links":{"self":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/46896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46896"}],"version-history":[{"count":1,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/46896\/revisions"}],"predecessor-version":[{"id":46897,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/46896\/revisions\/46897"}],"wp:attachment":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=46896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=46896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}