. 24/7 Space News .
CYBER WARS
China propaganda app fraught with security concerns: report
By Eva XIAO
Beijing (AFP) Oct 17, 2019

A widely downloaded Chinese propaganda app that quizzes users on Communist Party heroes and military achievements may be "studying them right back" through data collection and potential security breaches, an internet freedom campaign group says.

The app -- called "Xuexi Qiangguo" or "Study to make China strong" -- has accumulated 130 million users since its launch by the Communist Party's propaganda arm in January, according to state media in August.

Marketed as an education tool, it awards points for sharing articles and watching videos such as speeches by Chinese President Xi Jinping.

But the Open Technology Fund (OTF) -- a US government-funded group that campaigns for internet freedom -- says users also provide a plethora of data to the app, including location and emails.

OTF contracted the independent German tech firm Cure53 to study the app.

While the Communist Party advertises it as "a way for citizens to prove their loyalty and study their country, the app's maintainers are studying them right back", OTF wrote on its website.

The app's terms and conditions also say users may have to hand over more personal information -- such as fingerprints and ID numbers -- depending on the features or third-party tools they want to access.

The Chinese government has come under increasing scrutiny for high-tech surveillance -- from facial recognition-enabled security cameras to apps used by police to extract personal information from smartphones at checkpoints.

And though "Study to make China strong" is an education app, Cure53 said it contains code that could run "arbitrary commands" -- reminiscent of a backdoor -- on certain phones.

The app "maintains a level of access that no app would normally have over a user's device", said OTF.

- 'Intrusive app' -

The investigation, which was conducted in August, only looked at the Android version of the app, partly because of its market dominance, said Sarah Aoun, the group's director of technology.

OTF is considering tackling the iOS version -- which runs on Apple iPhones -- next, Aoun told AFP.

"This is just another way of expanding that digital control through a very intrusive app that is being pushed onto its citizens," said Aoun.

The Communist Party's propaganda arm, which is responsible for the app, did not respond to AFP's request for comment.

Dozens of provincial and county governments across the country reportedly held workshops to promote the app earlier this year.

Chinese journalists will also have to use the app for online press accreditation exams later this month and November, said a notice last week from the State Council, China's cabinet.

"It is unusual to see so much data gathered for an education app," said Jane Manchun Wong, who reverse-engineers apps for security vulnerabilities and unreleased features.

"It's like reading a book about the great nation but the book somehow searches your home," she told AFP.

The app also scans for 960 applications -- including gaming, travel and chat apps -- appearing as if "attempting to find which popular apps are installed on the phone", said Cure53's report.

- 'Creepy code' -

A spokesperson at DingTalk, an enterprise chat platform that was used to build the app, told AFP that it had "no 'backdoor code' or scanning issues".

But OTF said users' data and their phones could be further jeopardised if the code that "amounts to a backdoor" runs successfully.

Currently, this code only affects phones where users have installed software that gives them "superuser" privileges -- such as the ability to modify the device's code.

But apps can also abuse this level of privilege to take over a user's device.

"The code they found is creepy", Baptiste Robert, a French security researcher, told AFP -- but cautioned against the use of the word backdoor.

The investigation also found "no evidence" that the code was used during testing, with Cure53 concluding that "further investigation" was needed to determine how it was used.

The code "can raise suspicion," Robert said, but to conclude that there is "vast espionage from China is complicated".


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being there;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Monthly Supporter
$5+ Billed Monthly


paypal only
SpaceDaily Contributor
$5 Billed Once


credit card or paypal


CYBER WARS
Rapidly patching legacy software vulnerabilities in mission-critical systems
Washington DC (SPX) Oct 16, 2019
There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on - from transportation systems to electric grids to industrial equipment. Much like commercial or personal computing devices, these systems utilize embedded software to execute and manage their operations. To fix certain security vulnerabilities, commercial and personal devices must undergo frequent updates, and are replaced every few years - or on occasion, more frequently ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Luca powers up for a spacewalk

'One small nibble for man': 3D printer makes meat in space

Raytheon to help Jet Propulsion Lab explore the universe

Humans will not 'migrate' to other planets, Nobel winner says

CYBER WARS
U.S. Army to deploy hypersonic missiles by 2023

Space and Missile Systems Center completes summer launch campaign; with small launchers next focus

Aerojet Rocketdyne teams with NASA to develop novel rocket engine technology

NASA and SpaceX hope for manned mission to ISS in early 2020

CYBER WARS
UK eases sanctions on Moscow to allow activities related to joint space mission to Mars

Curiosity findings suggest Mars once featured dozens of shallow briny ponds

NASA's Mars 2020 rover tests descent-stage separation

NASA's Curiosity Rover finds an ancient oasis on Mars

CYBER WARS
China's rocket-carrying ships depart for transportation mission

China's KZ-1A rocket launches two satellites

China's newly launched communication satellite suffers abnormality

China launches first private rocket capable of carrying satellites

CYBER WARS
OmegA team values partnerships with customer, suppliers

Competition to find business ideas that are out of this world

Call for innovation to advance Europe's lab in space

UK space skills support sustainable development

CYBER WARS
When debris overwhelms space exploitation

Celebrating a mission that changed how we use radar

Unlocking the biochemical treasure chest within microbes

Physicists shed new light on how liquids behave with other materials

CYBER WARS
Liquifying a rocky exoplanet

Scientists observe formation of individual viruses, a first

Were hot, humid summers the key to life's origins?

A planet that should not exist

CYBER WARS
NASA's Juno prepares to jump Jupiter's shadow

Huge Volcano on Jupiter's Moon Io Erupts on Regular Schedule

Stony-iron meteoroid caused August impact flash at Jupiter

Storms on Jupiter are disturbing the planet's colorful belts









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.