Skip to main content

China Could Be Exploiting Internet Security Process to Steal Data, Cyber Experts Warn

Gaming keyboard-chinese hacking group

To access the data of unsuspecting users, the Chinese Communist Party (CCP) could take advantage of a universal authentication process that is believed to be secure but may not actually be, cybersecurity experts warned, although encryption is still the preferred method of protecting digital data and Protection of computers - in some cases, the same digital certificates used for internet authentication allow the Chinese regime to infiltrate and wreak havoc on various computer networks, they said. 

Digital certificates that verify the identity of a digital entity on the Internet. A digital certificate can be compared to a passport or driver's license, according to Andrew Jenkinson, CEO of cybersecurity company Cybersec Innovation Partners (CIP) and author of the book Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber ​​Warfare. 

"Without it, the person or device you are using may not meet industry standards, and the encryption of critical data could be bypassed so that what should be encrypted remains in plain text," Jenkinson told The Epoch Times Used to Encrypt internal and external communications that prevent a hacker, for example, from intercepting and stealing data. But "fake certificates" or invalid certificates can tamper with any data. 

Sense of security, "said Jenkinson. Cybersecurity firm Global Cyber ​​Risk LLC said digital certificates are generally issued by trusted CAs and then the same level of trust is passed on to intermediaries However, there are opportunities for a communist entity, malicious actor, or other untrustworthy entity to issue certificates to other "hideous people" who appear trustworthy but are not, he said.

"If you issue a certificate from a trusted authority, you will trust it," said Duren. "But what the issuer could actually do is pass that trust on to someone who shouldn't be trusted. Duren said he would never trust." a Chinese certification authority for this reason, stating that it is aware of a number of companies that have banned Chinese certificates because they were issued to untrustworthy agencies. 

Jenkinson said that Chinese certification bodies make up a small portion of the overall industry and the certificates they issue are generally limited to Chinese companies and products.

prince a member of chinese hacking group
Prince, a member of the hacking group Red Hacker Alliance who declined to give his real name, uses his computer at their office in Dongguan, Guangdong Province, China, on Aug. 4, 2020. (Nicolas Asfouri/AFP via Getty Images).

 In 2015, certificates from China Internet Network Information Center (CNNIC), the state agency overseeing domain name registration in China, were challenged. Mozilla revoked CNNIC certificates because it knew of unauthorized digital certificates associated with multiple domains. Both Internet companies opposed CNNIC delegating its authority to issue certificates to an Egyptian company that issued the unauthorized certificates. According to Jenkinson, CNNIC certificates were banned because they had "back doors". 

A back door means that [the Chinese certification body] could literally take administrative access and send data back to the mothership, ”he said. Since 2016, Mozilla, Google, Apple and Microsoft have also blocked the Chinese certification authorities WoSign and their subsidiary StartCom due to unacceptable security practices.Vulnerability Despite these bans on Chinese digital certificates in recent years, the CCP has not been deterred and has long-term gambling, Jenkinson said, referring to an alarming discovery by his cybersecurity firm two years ago that it was a multinational consulting firm. 

Digital certificates are typically valid for a few years depending on the certification authority, and a renewal is required to keep them valid and keep the data they are supposed to protect secure, he said. "But in 2019, CIP Chinese discovered certificates that had been valid for 999 years," Jenkinson said. His company made this discovery by researching the laptops of a leading global consulting firm. 

Jenkinson made the company aware of the vulnerability and offered, "They are either incredibly accommodating or complicit," he said, noting that the company's customers include government agencies.This multi-billion dollar company's failure to fix this problem means hundreds of thousands of people could be exposed to Chinese infiltration through the company's lax safeguards, Jenkinson said. The company engages its customers every time someone uses one of its laptops, he said. 

Companies or customers who use the company's services could be held for ransom, they have their intellectual advantages



from TechCrunch https://ift.tt/3ASb33F
via IFTTT

Comments

Popular posts from this blog

Apple’s AI Push: Everything We Know About Apple Intelligence So Far

Apple’s WWDC 2025 confirmed what many suspected: Apple is finally making a serious leap into artificial intelligence. Dubbed “Apple Intelligence,” the suite of AI-powered tools, enhancements, and integrations marks the company’s biggest software evolution in a decade. But unlike competitors racing to plug AI into everything, Apple is taking a slower, more deliberate approach — one rooted in privacy, on-device processing, and ecosystem synergy. If you’re wondering what Apple Intelligence actually is, how it works, and what it means for your iPhone, iPad, or Mac, you’re in the right place. This article breaks it all down.   What Is Apple Intelligence? Let’s get the terminology clear first. Apple Intelligence isn’t a product — it’s a platform. It’s not just a chatbot. It’s a system-wide integration of generative AI, machine learning, and personal context awareness, embedded across Apple’s OS platforms. Think of it as a foundational AI layer stitched into iOS 18, iPadOS 18, and m...

Max Q: Psyche(d)

In this issue: SpaceX launches NASA asteroid mission, news from Relativity Space and more. © 2023 TechCrunch. All rights reserved. For personal use only. from TechCrunch https://ift.tt/h6Kjrde via IFTTT

The Silent Revolution of On-Device AI: Why the Cloud Is No Longer King

Introduction For years, artificial intelligence has meant one thing: the cloud. Whether you’re asking ChatGPT a question, editing a photo with AI tools, or getting recommendations on Netflix — those decisions happen on distant servers, not your device. But that’s changing. Thanks to major advances in silicon, model compression, and memory architecture, AI is quietly migrating from giant data centres to the palm of your hand. Your phone, your laptop, your smartwatch — all are becoming AI engines in their own right. It’s a shift that redefines not just how AI works, but who controls it, how private it is, and what it can do for you. This article explores the rise of on-device AI — how it works, why it matters, and why the cloud’s days as the centre of the AI universe might be numbered. What Is On-Device AI? On-device AI refers to machine learning models that run locally on your smartphone, tablet, laptop, or edge device — without needing constant access to the cloud. In practi...