Huawei, China spying on everybody. Says a Russian.

Jandor

Gawd
Joined
Dec 30, 2018
Messages
673
Every HiSilicon chip from Huawei made for spying. Whenever it's new and may have changed to a more sophisticated way, you cannot trust anything Huawei and furthermore any Chinese company, since they all answer to the Communist Regime and Communist Party interests. Those companies as ruled by founders and inventor or investor are all fake and mostly are a copy of a western company they have spotted to replace on the world market...
This is not Trump, but what a Russian, land of Putin, says:
He is a security researcher, Vladislav Yarmak :
https://www.techspot.com/news/83909...surveillance-devices-use-hisilicon-chips.html
This is very worrying, because China is spying on everybody they can. There are more than 3 millions people known spying everyday on us with plenty of AI computer power (thse are much larger than Google's or Amazon's), on their computers at the Chinese NSA. NSA is a joke compared to what they do. Other will do the dirty job afterwards to plot a blackmailing case against the individual spotted. European Commission and all companies in Europe are under those attacks every day, but European administrations are scared or themselves involved with chinese spies. It's come to that we have 0 trust in European and national administrations in Europe against anything regarding China. Germany is doing everything to protect China's spying on us, Europeans, if China grants German companies privileged access to Chinese market. This is settled.
https://www.bloomberg.com/news/arti...ty-alone-will-define-decision-on-huawei-in-5g
There is a list of the companies using those chips, but you need to look into yours since there is no rule on where to find them since Huawei may have sold it for free as long as China can spy on you.
IP cameras are the most incredible things for spying, since they can spy on you and what you're doing 24/24.
Vladislav Yarmak even tells you how to hack your own gadget with HiSilicon chip inside. If they are older it will work. If they are recent Hisilicon/Huawei may be using a more sophisticated way.
If you have such an object, including smartphones, best thing is to throw them away. Break them so nobody will be use them again.
Spying on you, and knowing everything of you and your kids, will make you vulnerable.
But maybe you're a nothing to hide guy ? Really ? Maybe you're the cousin of a politician or a CEO and China could make use of that, so you'll get under their radar.
 
Last edited:
Is it possible to set a firewall to drop in/out going IP to block the cameras from spying?
 
CN, USA, UK, FR, CAN, AU, NZ, IL (who designs large parts of Intel CPUs but no one says anything because 'our greatest ally' (of what?)) etc etc they all spy on you and will use it for political gain or control. They're all traitorous asshole corporations masquerading as governments, so blaming just China is laughable. Sure they are growing at a larger scale though and that is cause for alarm.
Below is just one Chinese monitoring station for Wechat using keyword triggers.
 
Last edited:
Is it possible to set a firewall to drop in/out going IP to block the cameras from spying?
Yes, it seems there are some ports that could block the obvious spying access. So you need to block them.
It is the ports 9530/TCP (especially on products made after 2017), 9527/TCP, and 23/TCP (used before 2017 and supposedly closed on newer products) as reported in the link I posted. But you should imagine how this is basic protection against older stuff that may receive upgrades, now that it has been widely made public.
CN, USA, UK, FR, CAN, AU, NZ, IL (who designs large parts of Intel CPUs but no one says anything because 'our greatest ally' (of what?)) etc etc they all spy on you and will use it for political gain or control. They're all traitorous asshole corporations masquerading as governments, so blaming just China is laughable. Sure they are growing at a larger scale though and that is cause for alarm.
Below is just one Chinese monitoring station for Wechat using keyword triggers....
USA, UK, FR, CAN, AU, NZ, IL...
We're talking about countries with legal rights and elections, privacy rights, to some degree even in Russia, when this is not the case at all in China and not improving, on the contrary. And China using warlike espionage against normal and peaceful people abroad. So we need to protect ourselves against a country at war against us and not sharing any of our values, even fighting them.
 
Last edited:
For cameras and other IoT devices - whether they are from China or anywhere else - you should really block ALL traffic except on the ports and IPs that they are supposed to be talking to. Better still if you can isolate them on their own layer 2 (their own physical LAN) or at least VLAN isolated with all traffic to/from them through a good firewall set to only allow the known and desired connections open.

It can be fun to log and review some of the blocked traffic. I’ve seen devices from China trying to call home. But I’ve seen the same bad behavior from European devices and from good old American Cisco boxes...
 
Problem is that if they do that say in Europe and they are spying on people, they can be prosecuted on the behalf of anybody all over the world and people will win and justice will look into what they are doing. In the US this is quite true only about US citizen vs US company in the US. But China will laugh at you. But you're quite right. Some routers or network tools try to look into updates, syncing time, test the network on some adress used for that purpose some times not related to the company. So you can look into those adresses if they try to connect. Some of them can be configured to act as you wish and may stop those connections. Every weird connection should be checked. Now, yes about filtering everything except their purpose for IP cams. Problem is that you need to fix very carefully the purpose, because if you want to be alerted of what's going home when you're on a trip connected on some local wifi, you shall filter that out too for security reason or use a very complex relay.
 
Huawei is from a country run by totalitarian party regime which has total control over any company and asset in China. The less of the evil around the easier it is to fight it.
 
you should really block ALL traffic except on the ports and IPs that they are supposed to be talking to
Basic security, computer / network or otherwise: find all of the doors, shut them, then open and monitor the ones that are actually needed.

One of the issues here with IoT is the chasm of different priorities between price sensitivity, which pushes for less expensive technology from say China where applicable and available, and the herculean effort it takes to even apply some semblance of monitoring and control.

I think that there's a tremendous untapped market here for those networking companies that can commoditize layer 1 + 2 + 3 isolation along with effective IPS and HBSS for SMB and consumers.

Put IoT (and other things!) on separate network segments / broadcast domains, media access domains, and subnets, and then run application firewalls between those and the internet, by default.

The trick is to figure out how to do that without breaking everything ;).
 
Back
Top