Feeds

Kaspersky plans source code reveal to avoid Huawei's fate

Chinese giant has 'grey areas' but politics the reason for ban says AV's party boy

The Power of One eBook: Top reasons to choose HP BladeSystem

Eugene Kaspersky thinks Huawei's products contain “some doors, they are not back doors, but somewhere in-between”, but that overall “there is nothing really wrong with Huawei”. The Russian security supremo is nonetheless taking steps to ensure his company doesn't experience the same less-than-welcoming reception Huawei has found in the US market.

Kaspersky offered his opinion to Vulture South yesterday. Kaspersky breezes into Australia most years and behaves an awful lot like a Russian Richard Branson, putting on a stunt of some sort for the press*, revealing extra-curricular adventures (a trip to Antarctica with horrifying instagram-over-satphone charges) and offering plenty of knowing winks that hint at his history of association with Russia's security apparatus and unusual proximity to the digital underground.

Throw in the big hair and he puts on quite a show, making him a source of quotable quotes (he's adopted the term “SCADAgeddon” coined by local provocateur Stilgherrian to describe a likely outcome of online warfare) but also not quite ever appearing entirely serious.

How much weight to place then, on Kaspersky's claims of grey areas in Huawei products?

“We are not going to detect Huawei software as malicious,” he said. “And it is not just Huawei that has this grey area in their products. There was a very famous story about Sony rootkits,” he pointed out, before adding that he feels Huawei's troubles in the USA and beyond can be attributed to the detection of some suspicious behaviour in its products and the knowledge of those issues being politicised.

Kaspersky didn't want to talk politics, but did say his company is alive to the fact it can hurt his its prospects.

“In the USA, Australia and Western Europe we are facing similar issues of trust,” he said, and outlined plans to address those issues before they fester.

“We are entering the United States and we are about to have second backup and compiling systems in the States,” he said. “US citizens will have access to source code and we will be very open to disclose the source code in case of requests.”

Eugene Kaspersky in Sydney

Eugene Kaspersky, some moderately-famous bridge and an inconvenient light

“We need to prove that we are from the other side of the world, but you can trust us, and we will do our best to confirm it and to prove it. If we have any questions like Huawei questions about our technology, we will explain it to you, we will prove there is nothing wrong in our products and technologies.”

His tone while detailing those plans? Deadly serious and delivered with all the weight of a CEO with his eye on growth. But also, as seems always to be the case with Kaspersky, also with an eye on the next party. ®

*2012 saw Kaskpersky invite media to play paintball. At the end of the session he declared “I kill so many journalist today”. Given the fate of some members of the profession in his home nation, it was hard to know just what he meant by the remark. This year access to the man was offered in a waterside restaurant with stunning views of Sydney Harbour Bridge.

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.