Huawei Devices trigger a Google Warning
Huawei Concerns Continue
Having been essentially banned from any form of collaboration with the Chinese technology giant Huawei since May of last year, Google has restricted the access of any new Huawei devices to the American owned Play Store.
Also prohibiting the preload or download of all of Google’s apps, including Gmail, Maps, and YouTube amongst others, the addition of Huawei to the US’s ‘Entity List’ had been just one incident in the increasingly long list of security concerns and measures regarding the Chinese multinational.
Sideloading
Within this context comes a new warning from Google, cautioning users from attempting to ‘sideload’ apps from less than reputable sources. ‘Sideloading’ refers to the manual installation of app files found online; by going outside of an official app store, users are putting themselves at risk of compromised software and potentially ‘tampered with’ apps.
“Due to government restrictions, Google’s apps and services are not available for preload or sideload on new Huawei devices”
Tristan Ostrowski, Android & Play Legal Director
Wishing for users to not only avoid malware from their platform, Google’s warning explicitly discourages Huawei users attempting to download their software from unofficial websites or suspicious sources.
In a statement, Google noted that their work with Huawei only extends to ensure security updates to Huawei devices available prior to the government regulations. Any device made post-May 2019, will not have ‘Play Protect certification’, and are thus not permitted to utilise any Google apps or services.
Ongoing Huawei Security Concerns
These continued warnings come at a time when concerns over the security of Huawei products continue to dominate technology discussions, particularly regarding the international development of 5G infrastructure.
The Google statement comes just shy of a month after the UK announced that Huawei will be playing a role in its 5G network development, despite protestation from Washington.
Following a great deal of pressure from US lawmakers, including Attorney General William Barr, to consider alternative firms, the UK defied expectations in allowing Huawei a ‘limited role’ in future 5G development.
With China having a long history of corporate and state espionage, many of the fears and suspicions regarding these technology firms stem from the role that the Chinese state can play in decisions made by ‘private’ enterprise.
Under China’s cybersecurity law, the state is understood to have the ability to demand companies share their data with them, whilst also having a potentially significant role in key operational decision making.
With the UK’s membership in the 5-Eyes intelligence sharing alliance, the concern of many is how the Chinese state could use its technology firms to leverage and undermine foreign intelligence.
Although the influence of Huawei and China continues to grow on the world stage, Washington, and by proxy American firms, remain resistant to the information security threat that the technology company potentially poses.
Security Awareness for your Organisation
Enjoyed our blog? Learn more about how Hut Six can help improve you security awareness with training and simulated phishing. Start a free trial now, or book a meeting with one of our experts.
Featured
How Much Compensation for Breach of Data Protection Act?
How Much Compensation for Breach of Data Protection Act? Your Data Rights and Right to Compensation. Blog by Hut Six Security.
What is Phishing? In Computer Technology - It’s a Number 1 Threat
Phishing is a number one cyber threat, and awareness training is required to ensure all employees realise it's a business-critical matter.
What Does Phishing Mean in Computer Terms?
What does phishing mean in computer terms? The understanding of this term is at the core of Information Security awareness. Blog by Hut Six Security.
How to Keep Information Secure on a Computer - the Easy Way
Protecting data on your computer in 5 steps: Password Protection, VPNs, Anti-virus, Software Updates and Security Awareness.
How to Block Phishing Texts
Knowing How to Block Phishing Texts is vital to personal information security in the 21st century. Blog by Hut Six Security.
Information Security Attacks Threaten the UK Education Sector
How do Information Security Attacks threaten the UK Education Sector? Blog by information security awareness training provider Hut Six Security.
Is Information Stored in the Cloud Secure?
There remains concerns about the overall security of storing and processing information in the cloud. Is Information Stored in the Cloud Secure?
The Biggest Data Breaches and Hacks of 2019
The Biggest Data Breaches and Hacks of 2019: As a new year begins, it's time to begin reflecting on what has been observed. Blog by Hut Six
Google Chrome Goes for Gold in Password Security
Google Chrome introduces new password safety features. Cybersecurity blog by Information Security awareness training provider Hut Six.
What is Pseudonymisation?
What is pseudonymisation, and why it important to GDPR compliance? Blog from information security awareness training provider Hut Six.