For years, the use of insecure smart home appliances and other Internet-connected devices has resulted in personal data leaks. Many smart devices require users’ location, contact details or access to cameras and microphones to set up, which expose people’s personal information, but are unnecessary to use the product. As a result, data breaches and security incidents continue to emerge worldwide through smartphone apps, smart speakers, TVs, air fryers and robot vacuums.
Last week, another major data breach was added to the list: Mars Hydro, a Chinese company that makes Internet of Things (IoT) devices such as LED grow lights and the software to control them remotely. Jeremiah Fowler, a cybersecurity researcher at vpnMentor, on Feb. 12 reported that Mars Hydro had left 1.17 terabytes of non-password-protected data containing 2.7 billion records online, including users’ Wi-Fi network names, Wi-Fi passwords, Internet protocol addresses and device IDs.
The exposed data appeared to belong to users of the company’s Mars Pro smartphone app, even though Mars Hydro’s privacy notices on Apple’s App Store and Google Play state that the app does not collect user data, Fowler said. Within hours of notifying Mars Hydro, the database was no longer publicly available, but it is uncertain how long it was left unprotected or if unauthorized parties had accessed it, he said. The incident demands further investigation to get a full picture of users’ exposure, he said, adding that the issue yet again raises concerns over the security and privacy of IoT devices.
The Mars Hydro incident comes as Chinese start-up DeepSeek’s artificial intelligence (AI) chatbot was recently found to have transferred user data to ByteDance Ltd, TikTok’s parent company, which prompted many countries to ban public-sector entities from using DeepSeek or suspend downloads of the Chinese app. In Taiwan, the Ministry of Digital Affairs on Jan. 31 said that government agencies would be prohibited from using DeepSeek, but it remains unclear if the ministry would restrict public use of the service if it contravenes data protection laws.
Concerns over data leaks and hacking from Chinese software and devices have grown in the past few years. Security experts warn that apps from Chinese e-commerce sites such as AliExpress and Temu, as well as China-made IP cameras, smart speakers and robot vacuums, have data security vulnerabilities. They say risks stem from potential backdoors embedded during manufacturing or coding to weaken encryption methods and provide gateways for cyberattacks.
Make no mistake: Concerns over data breaches also exist for devices made by non-Chinese vendors. However, the issue with products made in China or by Chinese-owned companies is that the Chinese Communist Party, with no democratic oversight, could exploit such information for surveillance or intelligence-gathering purposes, posing national security threats. In addition, most countries generally require businesses to obtain consent from users before collecting their personal information. Unfortunately, some Chinese services do not inform users or bypass this requirement when collecting personal data.
In November last year, the Ministry of Digital Affairs acknowledged the importance of IoT information security as such devices become more popular. It said that regardless of the country of origin or the type of device, user data could be collected and become a potential security risk. It added that it would launch information security labels for IoT devices sold in Taiwan and propose data protection guidelines for device makers. In the meantime, users can take simple steps to mitigate potential risks, such as changing default passwords, restricting the access software and devices have to personal information, stopping data sharing, monitoring device activity and turning off devices when not in use.
Trying to force a partnership between Taiwan Semiconductor Manufacturing Co (TSMC) and Intel Corp would be a wildly complex ordeal. Already, the reported request from the Trump administration for TSMC to take a controlling stake in Intel’s US factories is facing valid questions about feasibility from all sides. Washington would likely not support a foreign company operating Intel’s domestic factories, Reuters reported — just look at how that is going over in the steel sector. Meanwhile, many in Taiwan are concerned about the company being forced to transfer its bleeding-edge tech capabilities and give up its strategic advantage. This is especially
US President Donald Trump’s second administration has gotten off to a fast start with a blizzard of initiatives focused on domestic commitments made during his campaign. His tariff-based approach to re-ordering global trade in a manner more favorable to the United States appears to be in its infancy, but the significant scale and scope are undeniable. That said, while China looms largest on the list of national security challenges, to date we have heard little from the administration, bar the 10 percent tariffs directed at China, on specific priorities vis-a-vis China. The Congressional hearings for President Trump’s cabinet have, so far,
The US Department of State has removed the phrase “we do not support Taiwan independence” in its updated Taiwan-US relations fact sheet, which instead iterates that “we expect cross-strait differences to be resolved by peaceful means, free from coercion, in a manner acceptable to the people on both sides of the Strait.” This shows a tougher stance rejecting China’s false claims of sovereignty over Taiwan. Since switching formal diplomatic recognition from the Republic of China to the People’s Republic of China in 1979, the US government has continually indicated that it “does not support Taiwan independence.” The phrase was removed in 2022
US President Donald Trump, US Secretary of State Marco Rubio and US Secretary of Defense Pete Hegseth have each given their thoughts on Russia’s war with Ukraine. There are a few proponents of US skepticism in Taiwan taking advantage of developments to write articles claiming that the US would arbitrarily abandon Ukraine. The reality is that when one understands Trump’s negotiating habits, one sees that he brings up all variables of a situation prior to discussion, using broad negotiations to take charge. As for his ultimate goals and the aces up his sleeve, he wants to keep things vague for