Huawei has been secretly funding research in America after being blacklisted

Chinese tech giant Huawei has been secretly funding research in America despite being blacklisted, as reported by Bloomberg. The cutting-edge research is happening at universities, including Harvard, and the money is being funneled through an independent Washington-based research foundation, along with a competition for scientists.

Bloomberg found that Huawei was the sole funder of a research competition that has awarded millions of dollars since 2022 and attracted hundreds of proposals from scientists. Some of these scientists are at top US universities that have banned researchers from working with the company.

What’s the big deal? The fear is that this research could lead to innovations that give China a leg up with regard to both defense contracting and commercial interests, according to Kevin Wolf, a partner at the business-focused law firm Akin who specializes in export controls. Optica, the foundation behind all of this, has posted online that it is interested in “high-sensitivity optical sensors and detectors," among other categories of research.

“It’s a bad look for a prestigious research foundation to be anonymously accepting money from a Chinese company that raises so many national security concerns for the US government,” said James Mulvenon, a defense contractor who has worked on research security issues and co-authored several books on industrial espionage.

It’s worth noting that this money funneling operation doesn’t look to be illegal, as research intended for publication doesn’t fall under the purview of the ban. Huawei operates similar competitions in other parts of the world, though openly. People who participated in the US-based research competition didn’t even know that Huawei was involved, believing the money to come from Optica. The competition awards $1 million per year and Optica didn’t give any indication that Huawei was supplying the cash.

A Huawei spokesperson told Bloomberg that the company and the Optica Foundation created the competition to support global research and promote academic communication, saying that it remained anonymous to keep from being seen as a promotion of some kind. Optica’s CEO, Liz Rogan, said in a statement that many foundation donors “prefer to remain anonymous” and that “there is nothing unusual about this practice.” She also said that the entire board knew about Huawei’s involvement and that everyone signed off on it. Bloomberg did note that the Huawei-backed competition was the only one on Optica’s website that didn’t list individual and corporate financial sponsors.

Huawei has been wrapped in a web of US restrictions these past several years. We can’t buy the vast majority of Huawei products in America, as the company’s been effectively banned. This all started in 2019 when President Trump signed an executive order that banned the sale and use of telecom equipment that posed “unacceptable" risks to national security. At the time, Trump said that “foreign adversaries” were exploiting security holes that would eventually lead to "potentially catastrophic effects.” Wait, Trump used the words “potentially catastrophic effects?” Wild.

To that end, the company has faced numerous claims that it installs backdoors in networks for the purpose of data theft, though there’s no proof of actual theft and the company denies the accusations. Huawei has also been accused of employing Chinese spies to influence an investigation and documents seem to indicate Huawei’s involvement in China’s surveillance efforts.

Some expected President Biden to reverse Trump’s executive order when it expired in 2021, but he headed in the opposite direction. Not only does the order stand, but Biden signed a law that blocked Huawei from obtaining an FCC license and he banned American investments in China’s high tech industries. We aren’t cozying up to China anytime soon, so Huawei will continue to be persona non grata on this side of the pond (the company still does booming business in Europe.)

This article originally appeared on Engadget at https://www.engadget.com/huawei-has-been-secretly-funding-research-in-america-after-being-blacklisted-182020402.html?src=rss

The European Union will reportedly open a new investigation into Meta over election policies

The European Union is getting ready to launch a new investigation into Meta over its handling of election-related content, according to a new report in The Guardian. Details of the investigation could be announced “later this week,” but European officials are reportedly concerned about “deceptive advertising and political content.”

According to the Financial Times, the EU has also raised concerns about Russia’s “efforts to undermine upcoming European elections” and other foreign interference campaigns. The EU is set to hold parliamentary elections in June. If the company is found to have run afoul of the Europe’s Digital Services Act, it could be hit with large fines.

EU officials are also “particularly concerned” about Meta’s plan to shut down CrowdTangle in August. The tool has been widely used by researchers and fact checkers for years to study how content spreads across Facebook and Instagram. Dozens of researchers and fact-checking groups signed an open letter to the company last month saying that shutting down the tool ahead of dozens of global elections would be a “direct threat” to election integrity efforts around the world.

“We have a well-established process for identifying and mitigating risks on our platforms,” a Meta spokesperson told Engadget in a statement. “We look forward to continuing our cooperation with the European Commission and providing them with further details of this work.”

Elsewhere, the EU is also investigating Meta over its ad-free subscription plan available to European users. That investigation, which could last up to a year, will look into whether the social media company has violated Europe’s Digital Markets Act, by not offering users a “real alternative” to opt out of data collection.

This article originally appeared on Engadget at https://www.engadget.com/the-european-union-will-reportedly-open-a-new-investigation-into-meta-over-election-policies-174818594.html?src=rss

The European Union will reportedly open a new investigation into Meta over election policies

The European Union is getting ready to launch a new investigation into Meta over its handling of election-related content, according to a new report in The Guardian. Details of the investigation could be announced “later this week,” but European officials are reportedly concerned about “deceptive advertising and political content.”

According to the Financial Times, the EU has also raised concerns about Russia’s “efforts to undermine upcoming European elections” and other foreign interference campaigns. The EU is set to hold parliamentary elections in June. If the company is found to have run afoul of the Europe’s Digital Services Act, it could be hit with large fines.

EU officials are also “particularly concerned” about Meta’s plan to shut down CrowdTangle in August. The tool has been widely used by researchers and fact checkers for years to study how content spreads across Facebook and Instagram. Dozens of researchers and fact-checking groups signed an open letter to the company last month saying that shutting down the tool ahead of dozens of global elections would be a “direct threat” to election integrity efforts around the world.

“We have a well-established process for identifying and mitigating risks on our platforms,” a Meta spokesperson told Engadget in a statement. “We look forward to continuing our cooperation with the European Commission and providing them with further details of this work.”

Elsewhere, the EU is also investigating Meta over its ad-free subscription plan available to European users. That investigation, which could last up to a year, will look into whether the social media company has violated Europe’s Digital Markets Act, by not offering users a “real alternative” to opt out of data collection.

This article originally appeared on Engadget at https://www.engadget.com/the-european-union-will-reportedly-open-a-new-investigation-into-meta-over-election-policies-174818594.html?src=rss

Budget doorbell camera manufacturer fixes security issues that left users vulnerable to spying

Eken Group has reportedly issued a firmware update to resolve major security issues with its cheap doorbell cameras that were uncovered by a Consumer Reports investigation earlier this year. The cameras in question pair with the Aiwit app and are sold under a slew of brand names, including Eken, Tuck, Fishbot, Rakeblue, Andoe, Gemee and Luckwolf. During its tests, the watchdog found that the unencrypted cameras could expose sensitive information like home IP addresses and Wi-Fi networks, and allow outside parties to access images from a camera’s feed using its serial number. Now, Consumer Reports says the issues have been fixed — just make sure you update your devices.

Devices from those brands should now reflect a firmware version of 2.4.1 or higher, which would indicate they’ve received the update. Consumer Reports says its own samples got the update automatically, but it can’t hurt to double check in your settings considering the risks (that is, if you haven’t tossed the cameras out already). The publication says it’s confirmed that the update fixes the security problems. Eken also told Consumer Reports that the two doorbell cams it had rated with the “Don’t Buy” label — the Eken Smart Video Doorbell and Tuck Sharkpop Doorbell Camera — have been discontinued.

These doorbell cameras, which were sold on popular ecommerce platforms including Amazon, Walmart and Temu but since appear to have been pulled, also lacked the proper labeling required by the FCC. The company told Consumer Reports it will add these IDs to new products moving forward. Following its tests of the update, Consumer Reports has removed the warning labels from its scorecards.

This article originally appeared on Engadget at https://www.engadget.com/budget-doorbell-camera-manufacturer-fixes-security-issue-that-left-users-vulnerable-to-spying-210705131.html?src=rss

Budget doorbell camera manufacturer fixes security issues that left users vulnerable to spying

Eken Group has reportedly issued a firmware update to resolve major security issues with its cheap doorbell cameras that were uncovered by a Consumer Reports investigation earlier this year. The cameras in question pair with the Aiwit app and are sold under a slew of brand names, including Eken, Tuck, Fishbot, Rakeblue, Andoe, Gemee and Luckwolf. During its tests, the watchdog found that the unencrypted cameras could expose sensitive information like home IP addresses and Wi-Fi networks, and allow outside parties to access images from a camera’s feed using its serial number. Now, Consumer Reports says the issues have been fixed — just make sure you update your devices.

Devices from those brands should now reflect a firmware version of 2.4.1 or higher, which would indicate they’ve received the update. Consumer Reports says its own samples got the update automatically, but it can’t hurt to double check in your settings considering the risks (that is, if you haven’t tossed the cameras out already). The publication says it’s confirmed that the update fixes the security problems. Eken also told Consumer Reports that the two doorbell cams it had rated with the “Don’t Buy” label — the Eken Smart Video Doorbell and Tuck Sharkpop Doorbell Camera — have been discontinued.

These doorbell cameras, which were sold on popular ecommerce platforms including Amazon, Walmart and Temu but since appear to have been pulled, also lacked the proper labeling required by the FCC. The company told Consumer Reports it will add these IDs to new products moving forward. Following its tests of the update, Consumer Reports has removed the warning labels from its scorecards.

This article originally appeared on Engadget at https://www.engadget.com/budget-doorbell-camera-manufacturer-fixes-security-issue-that-left-users-vulnerable-to-spying-210705131.html?src=rss

FCC votes to restore net neutrality protections

The Federal Communications Commission has voted to reinstate net neutrality protections that were jettisoned during the Trump administration. As expected, the vote fell across party lines with the three Democratic commissioners in favor and the two Republicans on the panel voting against the measure.

With net neutrality rules in place, broadband service is considered an essential communications resource under Title II of the Communications Act of 1934. That enables the FCC to regulate broadband internet in a similar way to water, power and phone services. That includes giving the agency oversight of outages and the security of broadband networks. Brendan Carr, one of the Republican commissioners, referred to the measure as an "unlawful power grab."  

Under net neutrality rules, internet service providers have to treat broadband usage in the same way. Users have to be provided with access to all content, websites and apps under the same speeds and conditions. ISPs can't block or prioritize certain content — they're not allowed to throttle access to specific sites or charge streaming services for faster service.

The FCC adopted net neutrality protections in 2015 during the Obama administration. But they were scrapped when President Donald Trump was in office. Back in 2021, President Joe Biden signed an executive order to bring back the Obama-era rules, but the FCC was unable to do so for quite some time. The commission was deadlocked with two Democratic votes and two Republican votes until Anna Gomez was sworn in as the third Democratic commissioner on the panel last September. The FCC then moved relatively quickly (at least in terms of the FCC's pace) to re-establish net neutrality protections.

The issue may not be entirely settled. There may still be legal challenges from the telecom industry. However, the FCC's vote in favor of net neutrality is a win for advocates of an open and equitable internet.

This article originally appeared on Engadget at https://www.engadget.com/fcc-votes-to-restore-net-neutrality-protections-161350168.html?src=rss

Google has delayed killing third-party cookies from Chrome (again)

Google keeps promising to phase out third-party cookies on Chrome but not actually doing it. The company vowed to deprecate cookies back in 2020, pushing the date back to 2023 and then 2024. We did get some traction earlier this year, when Google disabled cookies for one percent of Chrome users, but those efforts have stalled. Now, the company says it won’t happen until next year.

It’s easy to drag Google for this but it’s not entirely in the company’s hands. The tech giant is working closely with the UK’s Competition and Markets Authority (CMA) to ensure that any tools it implements to replace the cookie’s tracking and measurement capabilities aren’t anti-competitive. These tools are known collectively as the Privacy Sandbox and Google says it has to wait until the CMA has had “sufficient time to review” results from industry tests that’ll be provided by the end of June.

Google’s Privacy Sandbox has stirred up some controversy in recent years. The proposed tools have drawn complaints from adtech companies, publishers and ad agencies, on the grounds that they are difficult to operate, don’t adequately replace traditional cookies and give too much power to Google. To that end, the company said that it recognizes “ongoing challenges related to reconciling divergent feedback from the industry, regulators and developers.” This is another reason given for the delay until next year.

The CMA isn’t the only regulatory agency giving the side-eye to the current iteration of these Privacy Sandbox tools. The UK-based Information Commissioner’s Office drafted a report that indicated these tools could be used by advertisers to identify consumers, as suggested by the Wall Street Journal.

Those in the ad industry want to see cookies given the heave-ho, despite complaints about Privacy Sandbox. Drew Stein, CEO of adtech data firm Audigent, told Engadget that it’s time for Google “to deliver on the promise of a better ecosystem” by implementing its plans to eliminate third-party cookies.

The CMA, on the other hand, has indicated a willingness to keep third-party cookies in play, particularly if Google’s solution does more harm than good. Craig Jenkins, the CMA’s director of digital markets, recently said the organization would delay implementation of Privacy Sandbox tools if “we’re not satisfied we can resolve the concerns”, as reported by Adweek. We’ll see what happens in 2025.

This article originally appeared on Engadget at https://www.engadget.com/google-has-delayed-killing-third-party-cookies-from-chrome-again-155911583.html?src=rss

EU’s new right-to-repair rules force companies to repair out-of-warranty devices

The European Union has adopted a right-to-repair directive that will make it easier for consumers to get their devices fixed. The new rules extend a product's guarantee if it breaks under warranty, while obliging manufacturers to repair devices no longer covered. The law still needs to be approved by member nations. 

Devices sold in Europe already offer minimum two-year warranties, but the new rules impose additional requirements. If a device is repaired under warranty, the customer must be given a choice between a replacement or a repair. If they choose the latter, the warranty is to be extended by a year. 

Once it expires, companies are still required to repair "common household products" that are repairable under EU law, like smartphones, TVs and certain appliances (the list of devices can be extended over time). Consumer may also borrow a device during the repair or, if it can't be fixed, opt for a refurbished unit as an alternative.

The EU says repairs must be offered at a "reasonable" price such that "consumers are not intentionally deterred" from them. Manufacturers need to supply spare parts and tools and not try to weasel out of repairs through the use of "contractual clauses, hardware or software techniques." The latter, while not stated, may make it harder for companies to sunset devices by halting future updates

In addition, manufacturers can't stop the use of second-hand, original, compatible or 3D-printed spare parts by independent repairers as long as they're in conformity with EU laws. They must provide a website that shows prices for repairs, can't refuse to fix a device previously repaired by someone else and can't refuse a repair for economic reasons.

While applauding the expanded rules, Europe's Right to Repair group said it there were missed opportunities. It would have liked to see more product categories included, priority for repair over replacement, the right for independent repairers to have access to all spare parts/repair information and more. "Our coalition will continue to push for ambitious repairability requirements... as well as working with members focused on the implementation of the directive in each member state."

Along with helping consumers save money, right-to-repair rules help reduce e-waste, CO2 pollution and more. The area is currently a battleground in the US as well, with legislation under debate in around half the states. California's right-to-repair law — going into effect on July 1 — forces manufacturers to stock replacement parts, tools and repair manuals for seven years for smartphones and other devices that cost over $100.

This article originally appeared on Engadget at https://www.engadget.com/eus-new-right-to-repair-rules-force-companies-to-repair-out-of-warranty-devices-081939123.html?src=rss

The world’s leading AI companies pledge to protect the safety of children online

Leading artificial intelligence companies including OpenAI, Microsoft, Google, Meta and others have jointly pledged to prevent their AI tools from being used to exploit children and generate child sexual abuse material (CSAM). The initiative was led by child-safety group Thorn and All Tech Is Human, a non-profit focused on responsible tech.

The pledges from AI companies, Thorn said, “set a groundbreaking precedent for the industry and represent a significant leap in efforts to defend children from sexual abuse as a feature with generative AI unfolds.” The goal of the initiative is to prevent the creation of sexually explicit material involving children and take it off social media platforms and search engines. More than 104 million files of suspected child sexual abuse material were reported in the US in 2023 alone, Thorn says. In the absence of collective action, generative AI is poised to make this problem worse and overwhelm law enforcement agencies that are already struggling to identify genuine victims.

On Tuesday, Thorn and All Tech Is Human released a new paper titled “Safety by Design for Generative AI: Preventing Child Sexual Abuse” that outlines strategies and lays out recommendations for companies that build AI tools, search engines, social media platforms, hosting companies and developers to take steps to prevent generative AI from being used to harm children.

One of the recommendations, for instance, asks companies to choose data sets used to train AI models carefully and avoid ones only only containing instances of CSAM but also adult sexual content altogether because of generative AI’s propensity to combine the two concepts. Thorn is also asking social media platforms and search engines to remove links to websites and apps that let people “nudity” images of children, thus creating new AI-generated child sexual abuse material online. A flood of AI-generated CSAM, according to the paper, will make identifying genuine victims of child sexual abuse more difficult by increasing the “haystack problem” — an reference to the amount of content that law enforcement agencies must current sift through.

“This project was intended to make abundantly clear that you don’t need to throw up your hands,” Thorn’s vice president of data science Rebecca Portnoff told the Wall Street Journal. “We want to be able to change the course of this technology to where the existing harms of this technology get cut off at the knees.”

Some companies, Portnoff said, had already agreed to separate images, video and audio that involved children from data sets containing adult content to prevent their models from combining the two. Others also add watermarks to identify AI-generated content, but the method isn’t foolproof — watermarks and metadata can be easily removed.

This article originally appeared on Engadget at https://www.engadget.com/the-worlds-leading-ai-companies-pledge-to-protect-the-safety-of-children-online-213558797.html?src=rss

Proton Mail’s paid users will now get alerts if their info has been posted on the dark web

Proton Mail has introduced Dark Web Monitoring for its paid users, which will keep them informed of breaches or leaks they may have been affected by. If anything's been spotted on the dark web, the feature will send out alerts that include information like what service was compromised, what personal details the attackers got (e.g. passwords, name, etc.) and recommended next steps. At launch, you’ll have to visit the Proton Mail Security Center on the web or desktop to access these alerts, but the company says email and in-app notifications are on the way.

An example of a breach alert from Proton Mail
Proton

Dark Web Monitoring is intended to be a proactive security measure. If you’ve used your Proton Mail email address to sign up for a third-party service, like a social media site, and then hackers steal user data from that service, it would let you know in a timely manner if your credentials have been compromised so you can take action (hopefully) before any harm is done. It seems a fitting move for the service, which already offers end-to-end encryption and has made privacy its main stance since the beginning. Dark Web Monitoring won’t be available to free users, though.

“While data breaches of third-party sites leading to the leak of personal information (such as your email address) can never be entirely avoided, automated early warning can help users stay vigilant and mitigate worse side effects such as identity theft,” said Eamonn Maguire, Head of Anti-Abuse and Account Security at Proton.

This article originally appeared on Engadget at https://www.engadget.com/proton-mails-paid-users-will-now-get-alerts-if-their-info-has-been-posted-on-the-dark-web-100057504.html?src=rss