tech

EU presents plan for safe 5G amid Huawei suspicions

8 Comments
By WANG ZHAO

The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.

© 2019 AFP

©2024 GPlusMedia Inc.

8 Comments
Login to comment

That's not a plan!

That's a compromise between security (IP & defense) and selling cars and luxury goods to China. Some one will loose regardless, that's how China operate, divide and conquer...if you're one of the country that export cars to China, you're a winner. If not, you'll be a looser, worse if you have a tech or design industry to protect (UK, Finland, Italy).

0 ( +0 / -0 )

What difference does it make if the choice is having your cell phone taped by the Americans or Chinese?

2 ( +2 / -0 )

What difference does it make if the choice is having your cell phone taped by the Americans or Chinese?

the former is a pioneer and very advanced operator, while the latter just joined and still learning the ropes ? lol.

extracted from above article :

But Chinese law obliges telecoms firms to cooperate with its intelligence services, 

extracted from guardian article below :

https://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents

*Programs such as Prism – which operates through legally compelled "partnerships" with major internet companies – allow the NSA to obtain content and metadata on thousands of targets without individual warrants.*

*The NSA also collects enormous quantities of metadata from the fibre-optic cables that make up the backbone of the internet. The agency has placed taps on undersea cables, and is given access to internet data through partnerships with American telecoms companies.*

if the chinese are running some of these networks, the americans will have to ask nicely in mandarin can they do another prism or undersea data tap ? lol.

0 ( +0 / -0 )

YuriOtani:

Exactly. A few years ago, it was proven that America spied on european leaders. Guess they'd rather go with the devil they know.

0 ( +0 / -0 )

Snowden

0 ( +0 / -0 )

Phones don't matter - it's the infrastructure (y'know, the connections where all those phone data travel across)

Ya can have any phone ya want (doesn't matter which) - but he who controls the infrastructure controls your data

0 ( +0 / -0 )

Phones don't matter - it's the infrastructure (y'know, the connections where all those phone data travel across)

That's not exactly true. Encrypted protocols ensure that access to the infrastructure does not provide access to the data being transferred by the infrastructure.

Even this here site is encrypted. While you are transferring the data over the infrastructure, all that can be seen from the infrastructure is the domain name you are trying to access, with an encrypted data packet. And recently you can configure DNS over HTTPS, which encrypts the domain name as well, adding additional layers of privacy.

0 ( +0 / -0 )

That's not exactly true. Encrypted protocols ensure that access to the infrastructure does not provide access to the data being transferred by the infrastructure.

Access is not necessary to control data

Ex: check out when Russia re-routed world's financial data into its own relay

"Russian-controlled telecom hijacks financial services’ Internet traffic - Visa, MasterCard, and Symantec among dozens affected by "suspicious" BGP mishap."

https://arstechnica.com/information-technology/2017/04/russian-controlled-telecom-hijacks-financial-services-internet-traffic/

On Wednesday, large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other financial services companies were briefly routed through a Russian government-controlled telecom under unexplained circumstances that renew lingering questions about the trust and reliability of some of the most sensitive Internet communications.

The hijacking could have allowed individuals in Russia to intercept or manipulate traffic flowing into the affected address space. Such interception or manipulation would be most easily done to data that wasn't encrypted, but even in cases when it was encrypted, traffic might still be decrypted using attacks with names such as Logjam and DROWN, which work against outdated transport layer security implementations that some organizations still use.

Madory said that even if data couldn't be decrypted, attackers could potentially use the diverted traffic to enumerate what parties were initiating connections to MasterCard and the other affected companies. The attacker could then target those parties, which may have weaker defenses.

0 ( +0 / -0 )

Login to leave a comment

Facebook users

Use your Facebook account to login or register with JapanToday. By doing so, you will also receive an email inviting you to receive our news alerts.

Facebook Connect

Login with your JapanToday account

User registration

Articles, Offers & Useful Resources

A mix of what's trending on our other sites