Huawei Devices trigger a Google Warning

Huawei Concerns Continue

Having been essentially banned from any form of collaboration with the Chinese technology giant Huawei since May of last year, Google has restricted the access of any new Huawei devices to the American owned Play Store.

Also prohibiting the preload or download of all of Google’s apps, including Gmail, Maps, and YouTube amongst others, the addition of Huawei to the US’s ‘Entity List’ had been just one incident in the increasingly long list of security concerns and measures regarding the Chinese multinational.

Sideloading

Within this context comes a new warning from Google, cautioning users from attempting to ‘sideload’ apps from less than reputable sources. ‘Sideloading’ refers to the manual installation of app files found online; by going outside of an official app store, users are putting themselves at risk of compromised software and potentially ‘tampered with’ apps.

“Due to government restrictions, Google’s apps and services are not available for preload or sideload on new Huawei devices”

Tristan Ostrowski, Android & Play Legal Director

Wishing for users to not only avoid malware from their platform, Google’s warning explicitly discourages Huawei users attempting to download their software from unofficial websites or suspicious sources.

In a statement, Google noted that their work with Huawei only extends to ensure security updates to Huawei devices available prior to the government regulations. Any device made post-May 2019, will not have ‘Play Protect certification’, and are thus not permitted to utilise any Google apps or services.

Ongoing Huawei Security Concerns

These continued warnings come at a time when concerns over the security of Huawei products continue to dominate technology discussions, particularly regarding the international development of 5G infrastructure.

The Google statement comes just shy of a month after the UK announced that Huawei will be playing a role in its 5G network development, despite protestation from Washington.

Following a great deal of pressure from US lawmakers, including Attorney General William Barr, to consider alternative firms, the UK defied expectations in allowing Huawei a ‘limited role’ in future 5G development.

With China having a long history of corporate and state espionage, many of the fears and suspicions regarding these technology firms stem from the role that the Chinese state can play in decisions made by ‘private’ enterprise.

Under China’s cybersecurity law, the state is understood to have the ability to demand companies share their data with them, whilst also having a potentially significant role in key operational decision making.

With the UK’s membership in the 5-Eyes intelligence sharing alliance, the concern of many is how the Chinese state could use its technology firms to leverage and undermine foreign intelligence.

Although the influence of Huawei and China continues to grow on the world stage, Washington, and by proxy American firms, remain resistant to the information security threat that the technology company potentially poses.

Security Awareness for your Organisation

Enjoyed our blog? Learn more about how Hut Six can help improve you security awareness with training and simulated phishing. Start a free trial now, or book a meeting with one of our experts.

Featured

Data Protection Act Compensation

How Much Compensation for Breach of Data Protection Act?

How Much Compensation for Breach of Data Protection Act? Your Data Rights and Right to Compensation. Blog by Hut Six Security.

What is Phishing?

What is Phishing? In Computer Technology - It’s a Number 1 Threat

Phishing is a number one cyber threat, and awareness training is required to ensure all employees realise it's a business-critical matter.

Phishing Basics

What Does Phishing Mean in Computer Terms?

What does phishing mean in computer terms? The understanding of this term is at the core of Information Security awareness. Blog by Hut Six Security.

Protecting your Digital Information

How to Keep Information Secure on a Computer - the Easy Way

Protecting data on your computer in 5 steps: Password Protection, VPNs, Anti-virus, Software Updates and Security Awareness.

Phishing Texts or SMSs

How to Block Phishing Texts

Knowing How to Block Phishing Texts is vital to personal information security in the 21st century. Blog by Hut Six Security.

Security in the UK Education Sector

Information Security Attacks Threaten the UK Education Sector

How do Information Security Attacks threaten the UK Education Sector? Blog by information security awareness training provider Hut Six Security.

Cloud Storage Security

Is Information Stored in the Cloud Secure?

There remains concerns about the overall security of storing and processing information in the cloud. Is Information Stored in the Cloud Secure?

Data Breaches 2019

The Biggest Data Breaches and Hacks of 2019

The Biggest Data Breaches and Hacks of 2019: As a new year begins, it's time to begin reflecting on what has been observed. Blog by Hut Six

Google Chrome Password Security

Google Chrome Goes for Gold in Password Security

Google Chrome introduces new password safety features. Cybersecurity blog by Information Security awareness training provider Hut Six.

Pseudonymisation in GPDR

What is Pseudonymisation?

What is pseudonymisation, and why it important to GDPR compliance? Blog from information security awareness training provider Hut Six.

Speak to us about your Cyber Awareness