Skip to main content
https://www.highperformancecpmgate.com/rgeesizw1?key=a9d7b2ab045c91688419e8e18a006621

China Could Be Exploiting Internet Security Process to Steal Data, Cyber Experts Warn

Gaming keyboard-chinese hacking group

To access the data of unsuspecting users, the Chinese Communist Party (CCP) could take advantage of a universal authentication process that is believed to be secure but may not actually be, cybersecurity experts warned, although encryption is still the preferred method of protecting digital data and Protection of computers - in some cases, the same digital certificates used for internet authentication allow the Chinese regime to infiltrate and wreak havoc on various computer networks, they said. 

Digital certificates that verify the identity of a digital entity on the Internet. A digital certificate can be compared to a passport or driver's license, according to Andrew Jenkinson, CEO of cybersecurity company Cybersec Innovation Partners (CIP) and author of the book Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber ​​Warfare. 

"Without it, the person or device you are using may not meet industry standards, and the encryption of critical data could be bypassed so that what should be encrypted remains in plain text," Jenkinson told The Epoch Times Used to Encrypt internal and external communications that prevent a hacker, for example, from intercepting and stealing data. But "fake certificates" or invalid certificates can tamper with any data. 

Sense of security, "said Jenkinson. Cybersecurity firm Global Cyber ​​Risk LLC said digital certificates are generally issued by trusted CAs and then the same level of trust is passed on to intermediaries However, there are opportunities for a communist entity, malicious actor, or other untrustworthy entity to issue certificates to other "hideous people" who appear trustworthy but are not, he said.

"If you issue a certificate from a trusted authority, you will trust it," said Duren. "But what the issuer could actually do is pass that trust on to someone who shouldn't be trusted. Duren said he would never trust." a Chinese certification authority for this reason, stating that it is aware of a number of companies that have banned Chinese certificates because they were issued to untrustworthy agencies. 

Jenkinson said that Chinese certification bodies make up a small portion of the overall industry and the certificates they issue are generally limited to Chinese companies and products.

prince a member of chinese hacking group
Prince, a member of the hacking group Red Hacker Alliance who declined to give his real name, uses his computer at their office in Dongguan, Guangdong Province, China, on Aug. 4, 2020. (Nicolas Asfouri/AFP via Getty Images).

 In 2015, certificates from China Internet Network Information Center (CNNIC), the state agency overseeing domain name registration in China, were challenged. Mozilla revoked CNNIC certificates because it knew of unauthorized digital certificates associated with multiple domains. Both Internet companies opposed CNNIC delegating its authority to issue certificates to an Egyptian company that issued the unauthorized certificates. According to Jenkinson, CNNIC certificates were banned because they had "back doors". 

A back door means that [the Chinese certification body] could literally take administrative access and send data back to the mothership, ”he said. Since 2016, Mozilla, Google, Apple and Microsoft have also blocked the Chinese certification authorities WoSign and their subsidiary StartCom due to unacceptable security practices.Vulnerability Despite these bans on Chinese digital certificates in recent years, the CCP has not been deterred and has long-term gambling, Jenkinson said, referring to an alarming discovery by his cybersecurity firm two years ago that it was a multinational consulting firm. 

Digital certificates are typically valid for a few years depending on the certification authority, and a renewal is required to keep them valid and keep the data they are supposed to protect secure, he said. "But in 2019, CIP Chinese discovered certificates that had been valid for 999 years," Jenkinson said. His company made this discovery by researching the laptops of a leading global consulting firm. 

Jenkinson made the company aware of the vulnerability and offered, "They are either incredibly accommodating or complicit," he said, noting that the company's customers include government agencies.This multi-billion dollar company's failure to fix this problem means hundreds of thousands of people could be exposed to Chinese infiltration through the company's lax safeguards, Jenkinson said. The company engages its customers every time someone uses one of its laptops, he said. 

Companies or customers who use the company's services could be held for ransom, they have their intellectual advantages

Comments

Popular posts from this blog

Uber co-founder Garrett Camp steps back from board director role

Uber co-founder Garrett Camp is relinquishing his role as a board director and switching to board observer — where he says he’ll focus on product strategy for the ride hailing giant. Camp made the announcement in a short Medium post in which he writes of his decade at Uber: “I’ve learned a lot, and realized that I’m most helpful when focused on product strategy & design, and this is where I’d like to focus going forward.” “I will continue to work with Dara [Khosrowshahi, Uber CEO] and the product and technology leadership teams to brainstorm new ideas, iterate on plans and designs, and continue to innovate at scale,” he adds. “We have a strong and diverse team in place, and I’m confident everyone will navigate well during these turbulent times.” The Canadian billionaire entrepreneur signs off by saying he’s looking forward to helping Uber “brainstorm the next big idea”. Camp hasn’t been short of ideas over his career in tech. He’s the co-founder of the web 2.0 recommendatio

Drone crash near kids leads Swiss Post and Matternet to suspend autonomous deliveries

A serious crash by a delivery drone in Switzerland have grounded the fleet and put a partnership on ice. Within a stone’s throw of a school, the incident raised grim possibilities for the possibilities of catastrophic failure of payload-bearing autonomous aerial vehicles. The drones were operated by Matternet as part of a partnership with the Swiss Post (i.e. the postal service), which was using the craft to dispatch lab samples from one medical center for priority cases. As far as potential applications of drone delivery, it’s a home run — but twice now the craft have crashed, first with a soft landing and the second time a very hard one. The first incident, in January, was the result of a GPS hardware error; the drone entered a planned failback state and deployed its emergency parachute, falling slowly to the ground. Measures were taken to improve the GPS systems. The second failure in May, however, led to the drone attempting to deploy its parachute again, only to sever the line

ProtonMail logged IP address of French activist after order by Swiss authorities

ProtonMail , a hosted email service with a focus on end-to-end encrypted communications, has been facing criticism after a police report showed that French authorities managed to obtain the IP address of a French activist who was using the online service. The company has communicated widely about the incident, stating that it doesn’t log IP addresses by default and it only complies with local regulation — in that case Swiss law. While ProtonMail didn’t cooperate with French authorities, French police sent a request to Swiss police via Europol to force the company to obtain the IP address of one of its users. For the past year, a group of people have taken over a handful of commercial premises and apartments near Place Sainte Marthe in Paris. They want to fight against gentrification, real estate speculation, Airbnb and high-end restaurants. While it started as a local conflict, it quickly became a symbolic campaign. They attracted newspaper headlines when they started occupying prem