Connect with us
Lithuanian Defense Ministry reveals secret censoring functions in Xiaomi smartphones Lithuanian Defense Ministry reveals secret censoring functions in Xiaomi smartphones

Security

Lithuanian Defense Ministry reveals secret censoring functions in Xiaomi smartphones

Published

on

The Ministry of Defense urged citizens to stop using smartphones Huawei P40 5G and Xiaomi Mi 10T 5G.

Ministry of Defense of Lithuania published the results of the security audit of popular models of 5G smartphones made in China and recommended that its citizens stop using at least two of the three models studied.

Defense Ministry experts examined smartphones OnePlus 8T 5G, Huawei P40 5G and Xiaomi Mi 10T 5G. According to Deputy Defense Minister Margiris Abukevičius, the choice fell on these models, since they had previously been identified “by the international community as posing a certain security threat.”

During the audit, experts did not find anything suspicious about the OnePlus 8T 5G, but a number of problems were identified in the Huawei P40 5G and Xiaomi Mi 10T 5G.

The most questions from the Ministry of Defense were caused by a smartphone manufactured by Xiaomi. In particular, experts have identified a secret censoring module in it, capable of detecting and censoring 449 keywords and phrases written in both Chinese characters and Latin. These words and phrases refer to the “sick” topics for the Chinese government – “Free Tibet”, “Voice of America”, “Democratic Movement”, “Longing Taiwan Independence”, etc.

The module is deactivated on the territory of Lithuania and other EU countries. However, a function was discovered in the smartphone that allows Xiaomi to turn on the module at any time without the user noticing.

In addition, experts have identified another problem – the device sends encrypted SMS messages to the Xiaomi servers every time its owner uses the Xiaomi Cloud service. Experts were unable to decrypt the message, and it was not possible to find out its contents. After sending, the message is hidden from the owner of the device.

Moreover, it was found that the smartphone collects up to 61 data points about the device and its owner through the Mi Browser app and sends them to the Google Analytics account and servers in China.

During the audit, experts also identified a problem in the Huawei P40 5G model. According to them, the smartphone redirected users looking for various applications to their malicious alternatives.

Click to comment

Leave a Reply

Your email address will not be published.

Security

17-year-old hacker who allegedly leaked GTA 6 gameplay videos online arrested in UK

Published

on

17 year old hacker who allegedly leaked GTA 6 gameplay videos online

London police today announced the capture of a 17-year-old teenager suspected of cybercrime in Oxfordshire. At the moment, it is only reported that the arrested person is in custody.

17-year-old hacker who allegedly leaked GTA 6 gameplay videos online arrested in UK

The police declined to say what caused the arrest, but a number of facts indicate that this particular teenager, associated with the Lapsus$ hacker group, previously hacked into Uber, and recently posted screenshots and videos of GTA 6 gameplay on the Web.

In March, Bloomberg wrote that the person believed to be behind several major network hacks was a 16-year-old teenager whose home is in Oxfordshire. Uber wrote on its blog after the hack: “We believe this attacker (or attackers) is associated with a hacker group called Lapsus$, which is becoming more and more active.” A hacker who posted a GTA 6 video online claimed responsibility for the attack on Uber in forum posts.

Recall, yesterday it became known that the FBI joined the investigation into the hacking of Uber and the publication of GTA 6 materials online.

Continue Reading

Gaming

The security specialist was able to “hack” the PS5 through the same vulnerability that he used to jailbreak the PS4

Published

on

The security specialist was able to hack the PS5 through

Security specialist Andy Nguyen was able to bypass the protection of the PS5 game console and “hack” it using an old vulnerability that he also used on the PS4. It concerns the features of the exFAT file system in Sony’s implementation. In 2020, Nguyen managed to jailbreak his PS4 using the same vulnerability. As a result, the specialist received full access to the system core.

The security specialist was able to

The researcher suggested that during the transition from FreeBSD9 to FreeBSD11, the patch that closed the vulnerability somehow stopped working or was removed during the upgrade. The specialist has already reported the vulnerability to the company, which paid him $10,000. The same amount Nguyen received for the same vulnerability on PS4.

The PlayStation hack allows the user to install emulators of other consoles, play pirated versions of games, and also unlock some features that are not normally available to users.

At the same time, Nguyen explained that the error he discovered was just one of a chain of errors required for a full PlayStation 5 jailbreak. To date, the newest console has not been hacked.

Continue Reading

Phones

Only pin code, only hardcore. Locking a smartphone with a fingerprint reduces its security, says Group-IB digital forensics specialist

Published

on

Only pin code only hardcore Locking a smartphone with a

Group-IB digital forensics specialist Igor Mikhailov told the Prime agency why you should not use a fingerprint on your phone.

According to him, locking a smartphone with a fingerprint reduces its security, as the fingerprint can be copied. In addition, it is possible to unlock the gadget with someone else’s fingerprints, especially on devices with an old sensor.

Only pin code, only hardcore.  Locking a smartphone with a fingerprint reduces its security, says Group-IB digital forensics specialist

The most secure way to unlock a smartphone, according to Mikhailov, is to use complex passwords. He advised to turn off the fingerprint login and leave only the pin code.

As for unlocking a smartphone by face, Apple’s Face ID system is the most reliable, but even its enthusiasts managed to deceive with photos and masks of the owners.

Continue Reading

Most Popular