Skip to main content

Russia May Require PC, Phone Vendors to Preload Apps

The Russian government is already working on its own version of the internet. Now, it may be preparing to deploy its own customized spyware applications as a mandatory component of the service. The Russian Parliament is debating a bill that would require all electronic equipment sold in Russia to carry specific Russian apps and services. The bill would apply to all electronic equipment in specific device categories, like smart TVs, computers, and smartphones.

The goal of the bill is to “protect the interests of Russian Internet companies and will reduce the abuse by large foreign companies, working in the field of information technology,” ZDNet reports. If the bill passes, the Russian government will publish a list of electronic devices expected to be covered, along with a list of software that must be preloaded on them. Vendors that refuse to comply will be subject to repeated fines and eventually banned.

The official explanation for this is that Russia wants to protect its local tech scene and foster Russian technical competitiveness. There may well be truth to this. Russia does not view itself as particularly aligned with the West’s vision of governance or internet governance and it may indeed wish to feed the distinctive Russian nature of its own tech industry. Forcing Western companies to ship Russian software will undoubtedly boost software revenues.

Of course, the Russian government also might be mandating the installation of certain software so it can backdoor these applications and be guaranteed full access to the underlying device. Then again, it’s not clear the Russian government would even need to take this step. Why bother to backdoor an application when you have a legal agreement with the company requiring it to hand over the full account data of any person upon demand? Why go to the trouble of creating a detectable backdoor when you can use deep packet inspection to watch what people do online? Why bother performing all of the data monitoring yourself if you can require corporations to monitor it for you and send regular reports on problematic users?

The NSA was perfectly willing to bug Google data cables to spy on the information the company exchanged between its own private server farms, alongside a number of other dubious behaviors. It seems unlikely that Russian intelligence services are more principled in their respect for user privacy or individual rights. If approved, the bill will enter force on July 1, 2020. The bill is expected to pass, having already gathered the support of all the major Russian political parties.

Now Read:



Udimi - Buy Solo Ads from ExtremeTechExtremeTech https://ift.tt/2pWiNn5
via IFTTT

Comments

Popular posts from this blog

9 VCs in Madrid and Barcelona discuss the COVID-19 era and look to the future

Spain’s startup ecosystem has two main hubs: Madrid and Barcelona. Most observers place Barcelona first and Madrid second, but the gap appears to close every year. Barcelona has benefitted from attracting expats in search of sun, beach and lifestyle who tend to produce more internationally minded startups. Madrid’s startups have predominantly been Spain or Latin America-focused, but have become increasingly international in nature. Although not part of this survey, we expect Valencia to join next year, as city authorities have been going all-out to attract entrepreneurs and investors. The overall Spanish ecosystem is generally less mature than those in the U.K., France, Sweden and Germany, but it has been improving at a fast clip. More recently, entrepreneurs in Spain have moved away from emulating success in pursuit of innovative technologies. Following the financial crisis, the Spanish government supported the creation of startups with the launch of FOND-ICO GLOBAL, a €1.5 billi...

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Information Technology Blog - - Emulating USB Dongle – Introducing HASP Dongle Emulator Software - Information Technology Blog Over the years the methods used by software developers and producers to limit the amount of users to a specific number in a licensing agreement have become more complex.  The aim of copy protection is to protect the intellectual rights and financial investment of the individual developers and manufacturing companies.   A way of getting around this protection is to reproduce the media through which you can deliver the application to other users,  meaning that the software can be replicated far in excess of that specified in the license. One of the most common methods has been to use hardware keys or dongles which will enable the user to activate an application, unlocking its full functionality without using a device.  In addition, it offers good protection against attempts to pirate the software. In this article, we will look at th...

Advantages and Disadvantages of using Vouchers in eCommerce

Information Technology Blog - - Advantages and Disadvantages of using Vouchers in eCommerce - Information Technology Blog To decide whether vouchers and coupons are the right tool to add to your online marketing strategy, it is essential that you consider the benefit and the cost of using coupons. In this article, we will use Gtech coupon marketing strategy as an example a successful coupon strategy.  Also check out these great books on coupon codes for ecommerce . Advantages of Using Coupons Increase Sales This is the obvious benefit. Coupons serve to increase sales especially for high ticket items such as luxury gadgets. Gtech discount codes is a good example as Gtech quality is reflected on the price of both the Gtech eBike and Gtech AirRam. In order to boost sales, the company releases 10% off offers certain times of the year when online sales would normally be low. Enlarge Email List Acquiring a customer can be expensive in terms of advertising and marketing. If yo...