Previously, Apple was prohibited from disclosing that it was receiving legal demands for the information. However, now that it is permitted to do so, it has also raised the standard for compliance.
Last week, it was revealed that legal demands were being made to Apple and Google to provide details of the notifications that were sent to persons of interest in the legal investigations. While both companies were meeting the demands, they were not allowed to disclose that it was actually happening.
The facts were then made public through an open letter by a senator.
Push notifications can still disclose a lot of information, even though they prevent third parties from seeing the content of end-to-end encrypted conversations, such as those sent over iMessage.
Consider, for instance, a message exchange between a Chinese whistleblower and a US journalist exposing violations of human rights. The push data indicates that the source and journalist had a lengthy back-and-forth conversation yesterday, and a report on the abuses was released today.
Apple swiftly verified the allegation and added these events to its transparency reporting once the open letter released them from legal constraints on publicizing the practice.
Although "foreign" countries were mentioned in the open letter, it was widely assumed that US law enforcement was also requesting the same information. The Washington Post has reported that the data aided in the investigation of Capitol riots, among other incidents, confirming this.
Google held these demands to a higher legal standard than Apple did.
Apple provided the push notification data on the basis of a subpoena, whereas Google needed a court order to do so. Law enforcement agencies can issue subpoenas without judicial oversight; that is, they can demand data on their own, based only on their own determination that it is necessary. In contrast, a court order necessitates that a judge evaluate and accept the demand after reviewing the supporting documentation.
Apple has amended its instructions for law enforcement organizations to clarify that in order to obtain push notification data, a judge must approve a court order or search warrant.
Eight North Korean agents have also been sanctioned by the agency for aiding in the evasion of sanctions and promoting their nation's WMD development.
The current measures are apparently a direct response to the Democratic People's Republic of Korea's (DPRK) purported launch of a military reconnaissance satellite on November 21 in an attempt to hinder the DPRK's ability to produce revenue, obtain resources, and obtain intelligence to further its WMD program.
"Active since 2012, Kimsuky is subordinate to the UN- and U.S. designated Reconnaissance General Bureau (RGB), the DPRK's primary foreign intelligence service," the Department of Treasury stated. "Malicious cyber activity associated with the Kimsuky advanced persistent threat is also known in the cybersecurity industry as APT43, Emerald Sleet, Velvet Chollima, TA406, and Black Banshee."
The OFAC, in August 2010, linked Kimsuky to North Korea's primary foreign intelligence agency, the Reconnaissance General Bureau.
Kimsuky’s operations mostly consist of stealing intelligence, focusing on foreign policies and national security concerns regarding the Korean peninsula and nuclear policy.
One of the most notable high-profile targets of the North Korea-based cyberespionage group includes the compromise of South Korea’s nuclear reactor operator in 2018, Operation STOLEN PENCIL against academic institutions in 2018, Operation Kabar Cobra against South Korean government organizations and defense-related agencies in 2019, and Operation Smoke Screen the same year.
Kimsuky was responsible for targeting at least 28 UN officials and several UN Security Council officials in their spear-phishing campaign conducted in August 2020. The cyberespionage group also infiltrated infiltrated South Korea's Atomic Energy Research Institute in June 2021.
In September 2019, the US Treasury Department imposed sanctions on the North Korean hacker groups Lazarus, Bluenoroff, and Andariel for transferring money to the government of the nation through financial assets pilfered from global cyberattacks against targets.
In May, OFAC also declared sanctions against four North Korean companies engaged in cyberattacks and illegal IT worker schemes intended to raise money for the DPRK's weapons of mass destruction (WMD) programs.
The database, on the other hand, has been released in a popular cybercrime forum, Breach Forums.
It is significant to note that USDoD is the same hacker who compromised the FBI's InfraGard security platform last year, revealing 87,000 members' personal information.
In a post on Breach Forums, the hacker verified that web scraping was used to access the most recent LinkedIn information. Web scraping is a software-driven, automated process that extracts data from websites, usually with the purpose of obtaining certain information from web pages.
As revealed by Hackread, the leaked data included publicly available information regarding the victims’ LinkedIn profiles, such as full names and profile bios. While this data also contains millions of email addresses, the hackers could not get hold of the passwords.
Email addresses from senior US government officials and organizations are exposed in the leak. Email addresses from other international government agencies have also been found.
After analyzing more than 5 million accounts in the database, Troy Hunt of HaveIBeenPwned came to the conclusion that the data was a combination of information from other sources, including fraudulent email addresses and public LinkedIn profiles. Troy notes that the individuals, businesses, domain names, and a large number of email addresses are real, even though some of the information may be anecdotal or largely made up.
"Because the conclusion is that there’s a significant component of legitimate data in this corpus, I’ve loaded it into HIBP[…]But because there are also a significant number of fabricated email addresses in there, I’ve flagged it as a spam list which means the addresses won’t impact the scale of anyone’s paid subscription if they’re monitoring domains," Hunt explained.
This however was not the first time when the LinkedIn information was being leaked online by threat actors. A similar case happened back in April 2021, where 2 scrapped LinkedIn databases went on sale with 500 million and 827 million records. Also, in June 2021, a hacker sold a LinkedIn database that contained information about around 700 million users.
The notification, released on Thursday, lists several contributing causes, including rising LNG exports from the United States, shifts in the global crude oil supply chain favoring the United States, continued Western pressure on Russia's energy supply, and China's reliance on imported oil.
The alert, however, did not mention any particular advanced persistent threat (APT) group linked with China or Russia, nor did it cite any cybersecurity incident targeting critical infrastructure. Instead, it makes general mention of how appealing U.S. networks are to foreign hackers and cautions recipients that Chinese and Russian hackers are always looking to examine important systems and improve their capabilities to exploit vulnerabilities they find.
According to Brian Harrell, former assistant secretary for infrastructure protection at the Department of Homeland Security and now an energy sector executive, “Utilities see probing and low-level attempted attacks every day by the Russians and PRC.”
These low-profile attacks help hackers to get an insight into the important aspects of specific systems like where a target has open ports or determine potential firewall restrictions. “China doesn’t make a lot of noise, but the small localized intrusions are helping build their network attack capabilities, likely for future use[…]There’s no doubt that the energy sector is on the front lines of malicious cyber-activity right now as China preps the battlefield,” Harrell added.
As the notification suggests, Chinese hackers have exploited certain US entities by conducting “post-exploitation activity with generic reconnaissance commands using ‘live off the land’ tools.”
“Living off the land,” certainly means an attacker is exploiting tools or features that are already present in the target environment. For instance, sneaky varieties of ransomware like WannaCry and LockBit have covered their tracks and survived inside a network by using a default Windows binary, an existing piece of operating system code.
The warning states that state-backed Chinese hackers have been targeting common vulnerabilities since 2020, in order to, “target US and allied networks and software/hardware companies to steal intellectual property and develop access into sensitive networks to include critical infrastructure, defense industrial base sectors, and private sector organizations.”
However, the FBI declined to comment on the notification.
The notification further highlights how the Russian invasion of Ukraine altered the world's energy supply chain, citing Western sanctions as a "significant driver" of recent changes in the LNG supply chain. According to the notification, the modification will probably lead to an increase in Russian hackers' targeting of the American energy sector.
In 2022, 74% of Europe’s LNG imports originated in the U.S. the notification said, noting that the US was able to meet European LNG demand.
It also added that since 2016, Russian hackers have targeted state agencies and several US-based critical infrastructure sectors by, “staging targets networks as pivot points and malware repositories when targeting their final intended victims.”
However, organizers of this year’s DEF CON hacker convection (concluding this Sunday) spent as much time over the physical safety of the security researchers hacking into the devices.
The researchers who examine electoral equipment for vulnerabilities have come under growing intimidation and harassment since former President Donald Trump's effort to annul the 2020 election.
In order to protect these researchers, the organizers of the conference’s ‘Voting Village’ hacking event apparently appointed undercover security consultants. Additionally, they shifted the entire event to a side room so as to monitor the activities more closely and instructed their roughly two dozen volunteers on what to do in the event in case any agitators turned up.
The measures provide a little glimpse into a trend in the landscape of voting security in the US. Election officials, poll workers, and security researchers will eventually be forced to think more carefully about physical safety and take a variety of additional safeguards as a result of the increase in threats caused by disinformation.
According to Catherine Terranova, one of the organizers of the Voting Village, last year’s DEF CON witnessed certain troubling incidents, however minor. For an instance, a conspiracy theorist apparently set the alarm bells off during the event. Also, a group of people who appeared to be committed to advancing election denialism also attended the event the previous year and harassed a few of the Voting Village speakers.
“The day after DEF CON ended last year, I started pouring all of my time and energy into figuring out how to secure this village[…]I said to myself, ‘we are never doing this like this again,” Terranova said.
This is an issue which concerns the government election security officials too.
“Any threat of violence against an election official, poll worker, or anyone else working to safeguard our democracy is completely unacceptable. These folks are members of our communities, and dedicated public servants,” CISA Director Jen Easterly said in a statement.
Voting Village lawmakers will now be introduced with a prototype of a $10 million DARPA-funded open source voting machine, created to mitigate any hacking activities executed to temper with votes.
The project will be headed by Galois, a DARPA awarded government contractor. For a fact, Galois has worked with Microsoft in developing ElectionGuard, a software for voting machines to verify ballots.
The Galois machine reads votes on paper and scans them to ensure that they are legitimate. It will have a secure CPU that Galois developed that is geared to fend off common attacks that other voting machines were vulnerable to in prior Voting Villages.
Galois aims to provide the first voting system that hackers at Defcon will be unable to break, but in both years that the Voting Village has existed, hackers have been able to find one or the other vulnerabilities. However, even if hackers do discover flaws in the prototype, which its designers anticipate happening, it is still a win-win situation.
"There's an ambition that this demonstration will not have vulnerabilities comparable to what's in the room[…]But of course, the point of the exercise is to learn. If they do find flaws, it helps the researchers put on a different thinking cap and adjust their work over the next 2.5 years while this project continues," Joe Kiniry, a principal scientist at Galois, explained in an interview.
Marketers of these companies have been pin pointing locations these groups are originating from, warning users of these ‘advanced persistent threat’ groups (APTs). The groups have majorly been tracked back to Russia, China, North Korea and Iran.
Russia’s most popular cyber company Kaspersky were made to investigate its own employees when several staff members’ mobile phones begin distributing their information to some shady parts of the internet.
"Obviously our minds turned straight to spyware but we were pretty sceptical at first[…]Everyone's heard about powerful cyber tools which can turn mobile phones into spying devices but I thought of this as a kind of urban legend that happens to someone else, somewhere else," said chief security researcher Igor Kuznetsov.
Igor came to the conclusion that his intuition had been correct and that they had in fact discovered a sizable sophisticated surveillance-hacking effort against their own team after painstakingly analyzing "several dozen" infected iPhones. Apparently, the attackers had found a way to infect iPhones by simply sending an iMessage, that after installing malware to devices, deleted itself from the device.
In the operation to tackle the issue, the victims’ phone contents were tracked back to the hackers at regular intervals. This included messages, emails, pictures, and even access to cameras and microphones.
Once the issue was solved, on being asked, Kaspersky did not tell the origin of the attack, saying they are not interested “in from where this digital espionage attack was launched.”
The incident raised concerns of the Russian government. Russian security agencies released an urgent advisory the same day Kaspersky reported their discovery, claiming to have "uncovered a reconnaissance operation by American intelligence services carried out using Apple mobile devices.”
The bulletin even accused Apple of being involved in the campaign, however the conglomerate denied the accusation. Neither did the firm in question, the US National Security Agency (NSA), comment on the accusations.
In addition to this, the US Government issues a statement with Microsoft last month, confirming that the Chinese state-sponsored hackers have been found “lurking inside energy networks in US territories”.
In response to this, China denied the accusations saying the "story was a part of a disinformation campaign" from the Five Eyes countries – the UK, Australia, Canada and New Zealand.
Chinese Foreign Ministry official Mao Ning added China's regular response: "The fact is the United States is the empire of hacking."
But as with Russia, China now appears to be taking a more assertive stance in criticizing Western hacking.
According to China Daily, China’s official news source, the foreign government-backed hackers are currently the biggest threat to the nation's cyber security.
Additionally, the Chinese company 360 Security Technology included a statistic with the warning, stating that it has found "51 hacker organizations targeting China." Requests for comments from the business received no response.
China also charged the US with hacking a government-funded university in charge of space and aviation research last September.
While many would brush off the accusation of China, there might could be some truth to it.
According to researchers, there are reasons why the western hacking groups never come to light. We are listing some of these reasons below:
Casepoint offers legal advice for governmental organizations, businesses, and law firms in litigation, investigations, and compliance. The company has a number of well-known clients, including the U.S. Department of Defense (DoD), Marriott Hotels, the Securities and Exchange Commission (SEC), the U.S. Courts, and the Mayo Clinic.
Vishal Rajpara, the CTO and co-founder of Casepoint, released a statement in which he declined to confirm but otherwise did not seem to refute rumors that the ALPHV ransomware gang was responsible for the attack. BlackCat, the Russia-based ransomware gang claims to have stolen two terabytes of confidential data from Casepoint, which included data from the US government and “many other things you have tried so hard to keep,” the gang stated.
Some of the data stolen, according to TechCrunch, included private information from a Georgia-based hospital, a legal document, a state-sponsored ID and an internal document apparently issued by the FBI. However, the FBI is yet to confirm the allegations made by TechCrunch.
Following Casepoint’s acknowledgment of the investigation, ALPHV updated on the issue in a statement published on May 31. The firm also shared what seems to be the login details for the company’s software.
Rajpara published a statement on the issue, saying “Casepoint remains fully operational and have experienced no disruption to our services[…]the third-party forensic firm that we have engaged is currently running scans and deploying advanced endpoint detection monitoring tools and will be looking for signs of suspicious activity.” “We are early on in our investigation and are committed to keeping our clients informed as we learn more.”
However, Rajpara declined to comment on whether the business has technological resources to identify the data that was accessed or exfiltrated or whether it has been contacted by the ALPV ransomware organization with any communications, such as a ransom demand.
The ALPHV gang has previously claimed to have attacked NextGen Healthcare, a U.S.-based maker of electronic health record software, and Ring, a video surveillance firm owned by Amazon. Despite the hackers' denials that they were connected to the gang, data obtained from Western Digital was also hosted on ALPHV's leak site.
Some other known victims of the ALPHV gang include Bandai Namco, Swissport, and the Munster Technological University in Ireland.
Kennedy officially declared his 2024 presidential bid last month. He stated that the Federal Deposit Insurance Corporation (FDIC) and the Securities and Exchange Commission (SEC) have "no authority to wage an extra-legal war on crypto that leaves major banks as collateral damage."
Kennedy cited an article by Ellen Brown titled "How the War on Crypto Triggered a Banking Crisis," in which Brown makes a "strong case" that a government-sponsored campaign against the digital assets sector was responsible for several historic bank failures in March, including Silicon Valley Bank, Signature Bank, and Silvergate Bank.
It is debatable whether there is a coordinated attempt to remove cryptocurrency from the American financial system. According to Barney Frank, an ex-congressman who served on the board of directors of Signature Bank, “the institution was shut down to send an anti-crypto message.” These assertions were later denied by a New York regulator.. On May 2, Kennedy criticized Biden on May 2 for calling the US banking system "safe and sound.” “Today, bank stocks are crashing. The American people deserve more than glib assurances and perception management,” he tweeted.
Following this, on May 3, he criticized the Biden administration's proposed tax on crypto mining. An environmental lawyer, Kennedy called the proposed 30% tax on energy used by crypto miners "a bad idea" He said mining's energy use was a concern (though somewhat overstated), stating, “The environmental argument is a selective pretext to suppress anything that threatens elite power structures, Bitcoint for example.”
Days after Kennedy's anti-CBDC comments, the Federal Reserve clarified its position, stating that the FedNow payments system, which Kennedy claimed to equate with a CBDC, is neither a digital currency nor a replacement for cash.
While some Democrats, such as Elizabeth Warren, have repeatedly criticized cryptocurrency and made it a centerpiece of their political platforms, others, such as New York City Mayor Eric Adams, have been outspoken in their support for the emerging asset class.
The US Department of Justice confirmed the issue and charged Denis Gennadievich Kulkov, a citizen of Russia, for being involved in operating a fraudulent credit card checking business that brought in tens of millions of dollars.
The underground service Try2Check, which Kulkov is believed to have founded in 2005, quickly gained enormous popularity among online criminals engaged in the illicit credit card trade and enabled the suspect to earn at least $18 million in bitcoin.
Apparently, Try2Check leveraged the unnamed company’s “preauthorization” service, whereby a business, such as a hotel, requests that the payment processing firm preauthorizes a charge on a customer’s card to confirm that it is valid and has the necessary credit available. Try2Check impersonated a merchant seeking preauthorization in order to extract information about credit card validity.
The services were used by individuals dealing with both the bulk purchase and sale of credit card credentials and were required to check the percentage of valid and active credit cards, including dark web markets like Joker's Stash for card testing.
By using Try2Check services, the defendant duped a well-known U.S. payment processing company whose systems were used to execute the card checks, in addition to credit card holders and issuers.
The services have now been dismantled following a collaborative measure taken by the US Government and partners in Germany and Austria, including units in the Austrian Criminal Intelligence Service, the German Federal Criminal Police Office (B.A.), the German Federal Office for Information Security (B.S.), and the French Central Directorate of the Judicial Police (DCPJ).
"Try2Check ran tens of millions of credit card checks per year and supported the operations of major card shops that made hundreds of millions in bitcoin in profits[…]Over a nine-month period in 2018, the site performed at least 16 million checks, and over a 13-month period beginning in September 2021, the site performed at least 17 million checks," the DOJ stated.
In addition to this, the US State Department in partnership with the US Secret Service has offered a $10 million reward through the Transnational Organized Crime Rewards Program (TOCRP) for anyone who can help find Kulkov, who is currently a resident of Russia. If found guilty, Kulkov will face a 20-year-imprisonment.
"The individual named in today's indictment is accused of operating a criminal service with immeasurable reach to fund further illicit activity with global impact[…]Thanks to the cooperation and dedication of our global law enforcement community, Try2Check can no longer serve as a vehicle for continued criminal activity or illicit profits," said U.S. Secret Service Special Agent in Charge Patrick J. Freaney.
On Thursday, US cybersecurity agency CISA and US Food and Drug Administration FDA released separate advisories to alert organizations of the vulnerabilities affecting the Universal Copy Service (UCS) component used by a number of Illumina's genetic sequencing devices.
The vulnerability flaw, identified as CVE-2023-1968 enables remote access to a vulnerable device via the internet without the need for a password. If exploited, hackers may be able to compromise devices and cause them to generate false, changed, or nonexistent results.
The advisories also include a second vulnerability, CVE-2023-1966, which is rated 7.4 out of 10 for severity. The flaw might provide hackers access to the operating system level, where they could upload and run malicious programs to change settings and access private information on the impacted product.
The FDA claimed it was unaware of any actual attacks that exploited the flaws, but it did issue a warning that a hacker might use them to remotely control a device or change its settings, software, or data, as well as remotely access the user's network.
“On April 5, 2023, Illumina sent notifications to affected customers instructing them to check their instruments and medical devices for signs of potential exploitation of the vulnerability,” states the FDA in its notification.
The products from Illumina that are vulnerable include iScan, iSeq, MiniSeq, MiSeq, MiSeqDx, NextSeq, and NovaSeq. These products, which are used all around the world in the healthcare industry, are made for clinical diagnostic use when sequencing a person's DNA for different genetic diseases or research needs.
According to Illumina spokesperson David McAlpine, Illumina has “not received any reports indicating that a vulnerability has been exploited, nor do we have any evidence of any vulnerabilities being exploited.” Moreover, he declines to comment on whether the company has technical resources that could detect exploitation, nor did he specify the number of devices affected by the vulnerability.
Illumina CTO Alex Aravanis in a LinkedIn post mentions that the company detected the flaw as part of routine efforts to examine its software for potential flaws and exposures.
“Upon identifying this vulnerability, our team worked diligently to develop mitigations to protect our instruments and customers[…]We then contacted and worked in close partnership with regulators and customers to address the issue with a simple software update at no cost, requiring little to no downtime for most,” Aravanis said.
Bytedance, the Chinese company that owns TikTok, has long insisted that it does not exchange data with the Chinese government and that it does not store any of its data there.
The company alleges that the app is independently managed and refutes claims that it collects more user data than other social media sites. However, many countries tend to have erred on the side of caution when it comes to the platform and their ties to China.
We are listing the countries and regions that have either imposed a partial or a complete ban on TikTok:
India imposed a ban on TikTok along with several other Chinese apps like messaging app WeChat in 2020, following concerns over user privacy and cybersecurity.
The ban was implemented shortly after a clash between Indian and Chinese troops in a military dispute on the Himalayan border, which resulted in the death of 20 Indian soldiers and injured dozens. The corporations were given the chance to respond to inquiries about privacy and security requirements, but the ban was rendered permanent in January 2021.
Following a warning issued by the FBI that TikTok presented a threat to national security, Taiwan banned the app from the public sector in December 2022. Chinese-made software, including apps like TikTok, its Chinese version Douyin, or Xiaohongshu, a Chinese lifestyle content app, is not permitted to be used on government equipment, including smartphones, tablets, and desktop computers.
This week, the US announced that the government authorities have 30 days to delete TikTok from federal devices and systems. The ban is applicable only to state-owned devices. China reacted angrily to the American decision to block TikTok, accusing the United States of abusing its power and stifling foreign companies.
Also, the software is prohibited from being used on official devices in more than half of the 50 U.S. states.
Following the announcement made by the US, Canada announced that the government-issued devices must not use TikTok on Monday, noting that the app could put the devices’ privacy and security at stake. In the future, the employees may as well be restricted to download the application.
TikTok has been banned on employee devices by the European Parliament, European Commission, and EU Council, three of the major EU organizations. The embargo imposed by the European Parliament becomes effective on March 20. It has been advised to lawmakers and staff to uninstall the app from their personal devices.
Since October 2020, Pakistani authorities have briefly banned TikTok at least four times due to worries that the app encourages immoral content.
In 2022, the Taliban leadership in Afghanistan outlawed TikTok and the Chinese game PUBG, citing the need to prevent children from "being misled."
TikTok executives, who successfully escaped having their popular app banned in the US by then-president Donald Trump in 2020, had to deal with a barrage of inquiries every day about the dangers TikTok presented to cyber security. The topic was largely put to rest in 2021 when President Joe Biden overturned Trump's proposal due to various complicated legal challenges.
One could almost hear a sigh of relief from both TikTok and the millions of influencers who rely on the social media app to make a career.
But now, in an ironic nod to the video app's recognizable looping style, we have come full circle. With the stakes even higher now.
Nearly three years prior to Trump's planned ban, TikTok had been downloaded 800 million times worldwide. As of now, 3.5 billion people have downloaded it, according to app analytics company Sensor Tower.
With a rise in geopolitical strain between China and Western Countries, it is clear that the future of TikTok is more at risk than ever.
We are listing some of the prime cyber-security concerns pertaining to TikTok that are continually raised, and how the company addresses them:
TikTok's critics frequently claim that it collects vast amounts of data. It's common to use a cyber-security assessment from Internet 2.0, an Australian cyber business, from July 2022 as proof.
Researchers examined the source code of the app and found evidence of "excessive data harvesting" within it. According to analysts, TikTok gathers information about users' locations, the devices they are using, and the other apps they have installed.
Although, a similar test conducted by Citizen Lab concluded that "in comparison to other popular social media platforms, TikTok collects similar types of data to track user behavior."
Likewise, a report by the Georgia Institute of Technology in January states "The key fact here is that most other social media and mobile apps do the same things."
TikTok's spokeswoman said: "Our community guidelines prohibit misinformation that could cause harm to our community or the larger public, which includes engaging in co-ordinated inauthentic behavior."
In November 2022, FBI Director Christopher Wray told the US lawmakers: "The Chinese government could… control the recommendation algorithm, which could be used for influence operations."
Douyin, a sibling app to TikTok that is exclusively available in China, is heavily censored and purportedly designed to encourage the viral spread of positive and wholesome content, which adds fuel to those worries.
In fact, all social networking sites in China are closely monitored by an army of internet police, who apparently take down content that criticizes the government or instigates political unrest.
As TikTok gained popularity, there were high-profile instances of censorship on the app. For example, a user in the US had her account suspended for denouncing Beijing's treatment of Muslims in Xinjiang; following a ferocious public outcry, TikTok issued an apology and restored the account.
Since then, there have not been many instances of censorship, aside from the contentious moderation choices that all platforms must make.
Although, while comparing TikTok and Douyin, Citizen Lab researchers concluded that the later does not comprise any political censorship.
The Georgia University of Technology analysts also looked for jokes about Chinese Premier Xi Jinping and issues like Taiwan's independence. They came to the following conclusion: "Videos in all of these categories can easily be found on TikTok. Many are popular and widely shared."
Hence comes the entire picture of theoretical fears and risk.
Certain critics deem TikTok as a “Trojan horse,” meaning although it may look harmless, it could potentially be utilized as a powerful weapon in times of conflict.
The app is already banned in India, in an initiative taken against the app and dozens of other Chinese platforms in the year 2020.
Nonetheless, a US ban on TikTok might have a significant effect on the site since allies of the US frequently support such measures.
Moreover, it is worth mentioning that risks are a one-way street. Due to the long-standing restriction on access for Chinese individuals, China need not be concerned about US apps.