Hitting back at the US over accusations of censoring content to appease Beijing, Chinese short-video making platform TikTok has said it does not censor content critical of the Chinese government, and that none of its operations are subject to the Chinese law.
Over the past several weeks, TikTok, owned by Beijing-based Bytedance, has been at the centre of public statements by Members of the US Congress and others regarding alleged censorship of content, as well as their data protection practices.
“Let us be very clear: TikTok does not remove content based on sensitivities related to China. We have never been asked by the Chinese government to remove any content and we would not do so if asked. Period. Our US moderation team, which is led out of California, reviews content for adherence to our US policies — just like other US companies in our space,” the company wrote in a blog post on Friday.
US Senators such as Chuck Schumer and Tom Cotton wrote a letter earlier this week to the US intelligence officials asking that they investigate TikTok for possible national security threats.
Talking about data privacy and security, TikTok added: “We store all TikTok US user data in the US, with backup redundancy in Singapore. Our data centres are located entirely outside of China, and none of our data is subject to Chinese law.”
If we blame end-to-end encryption of WhatsApp for the Israeli spyware Pegasus that affected 1,400 select users of the Facebook-owned messaging app globally, including 121 in India, we will be barking up the wrong tree, say experts.
WhatsApp provides end-to-end encryption by default, which means only the sender and recipient can view the messages. But the piece of NSO Group software exploited WhatsApp’s video calling system by installing the spyware via missed calls to snoop on the selected users.
This raised questions about the utility of encryption, which also prohibits security agencies from tracing the origin of messages. Traceability of WhatsApp messages is a key demand that India has put forward.
But security experts have warned that blaming end-to-end encryption for the spyware would not be right.
“WhatsApp as well as other leading instant messaging apps have recently adopted an end-to-end encryption. The encryption process itself is solid, messages that leave your device are encrypted and they stay that way until they reach their final destination,” Yaniv Balmas, Head of Cyber Research, Check Point Software Technologies, told IANS.
“However, on your device, as well as on the receiving device the messages are decrypted so you can read them. A malicious application running on your device can inspect them, change or delete them just as well as you could. So the issue here is not in the applications or in their encryption protocol, but in the environment they are installed in,” Balmas said.
According to leading tech policy and media consultant Prasanto K. Roy, end-to-end encrypted apps (E2EE) do provide security, and messages or calls cannot be intercepted and decrypted en route without enormous computing resources.
“But once anyone can get to your handset, whether a human or a piece of software, the encryption doesn’t matter any more. Because on your handset, it’s all decrypted,” he explained.
“There’s plain text on your screen, and plain audio or video in your camera. The right kind of spyware in your handset can read those messages or even listen in on your phone’s mic to what someone is saying in the room, or see what’s happening around, with the camera.
“If that happens then all apps are affected, not just WhatsApp. The spyware doesn’t care about the app — it just reads the screen. So, the recent incident has not changed the fact that E2EE apps/platforms are secure. Or the fact that spyware on your handset (which has many vectors: this time it was WhatsApp, but it is usually SMS or email) can compromise your entire handset and all its apps,” Roy said.
In his memoir “Permanent Record”, whistleblower Edward Snowden wrote that the Internet is currently more secure now than it was in 2013, especially given the sudden global recognition of the need for encrypted tools and apps.
Snowden, who served as an officer of the Central Intelligence Agency (CIA) and worked as a contractor for the National Security Agency (NSA), rocked the world in 2013 after he revealed that the US was secretly building a way to collect the data of every person in the world, including phone calls, text messages and email.
“Perhaps the most important private sector change occurred when businesses throughout the world set about switching their website platforms, replacing http (Hypertext Transfer Protocol) with the encrypted https (the S signifies security), which helps prevent third party interception of Web traffic,” Snowden wrote.
“The encryption is solid and the algorithms behave as expected, however risks are still there, especially ones that originate from the surrounding operating system, which cannot be controlled or expected by any of the instant messaging software providers,” he said. (IANS)