ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label

China Demands Tech Companies to give them Backdoor and Encryption Keys Unknown rwxr-xr-x 0 2/03/2015

Filename China Demands Tech Companies to give them Backdoor and Encryption Keys
Permission rw-r--r--
Author Unknown
Date and Time 2/03/2015
Label
Action
Ethical Hacking Institute in Pune
./Arizona Team

A number of western companies are doing big business in China, but now they may have to pay a huge value for to do so.
























China has introduced strict new banking cyber security regulations on western companies selling technology to Chinese banks. The Chinese government wants backdoors installed in all technologies that imports into the Middle Kingdom for the benefit of Chinese security services.

The latest rules also state that western companies must hand over the Encryption Keys and secret source code as well. The requirements are so absurd that it would be impossible for companies like Apple to comply, which could harm American businesses.

"The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars’ worth of business in China," The New York Times reports.

The new requirements, detailed in a 22-page long document approved late last year, are in response to Edward Snowden’s revelations about the United States National Security Agency’s surveillance activities on Chinese networks.

In May 2014, Chinese government announced that it will roll out a new set of regulations for IT hardware and software being sold to key industries in their country. China have repeatedly blamed U.S. products and criticize that U.S. products are itself threat to national security, as they may also contain NSA backdoors, among other things.

The US Chamber of Commerce and other groups called these new rules by Chinese official "intrusive". They has also called Chinese government for talks on the issue.

"An overly broad, opaque, discriminatory approach to cybersecurity policy that restricts global internet and ICT products and services would ultimately isolate Chinese ICT firms from the global marketplace and weaken cybersecurity, thereby harming China's economic growth and development and restricting customer choice," the paper read.

U.S. businesses fear that the latest regulations by China will effectively shove them out of the world's largest and fastest-growing market. Recently, it was announced that Apple became the biggest smartphone seller in China in the final quarter of last year. The scale of effect could be calculated from this.

Last week, it was revealed that Tim Cook had agreed to "security audits" of its products sold in the country, but Apple has always insisted that it will never allow backdoor access to its products nor compromise the encryption used by its products and services, "and we never will."

However, many firms may not find this demand to meet, due to intellectual property and security concerns. So just wait and watch how other companies respond to this fresh regulations of China demands backdoor access

www.arizonainfotech.com
CEHv8 CHFIv8 ECSAv8 ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan