Feeds

Beijing to Washington: Ratted-out routers not welcome here

China announces vendor 'vetting' plan to keep out snoopware-infested kit

Choosing a cloud hosting partner with confidence

China has taken revenge on the USA for its Huawei ban and router-ratting actions alleged by Edward Snowden, by announcing a new “vetting” process for foreign technology providers.

The news emerged in Xinhua, a party-controlled Chinese news organ that reports State Internet Information Office spokesperson Jiang Jun as saying “For a long time, governments and enterprises of a few countries have gathered sensitive information on a large scale, taking the advantage of their monopoly in the market and technological edge.”

"They not only seriously undermine interests of their clients but also threaten cyber security of other countries."

China will therefore step in and vet vendors that aspire to sell within its borders to safeguard not only its own interests, but the world's!

Stories like this don't appear in Xinhua as a result of cunning digging by its staff. That this one mentions Edward Snowden makes the conclusion China is retaliating to recent reports the NSA is touching-up US-made networking kit before export near-irresistible.

The USA has vetted foreign kit itself for years, a practice most infamously expressed in its 2012 decision to block Huawei from selling some kit stateside. China has protested that ban but has not retaliated … until now.

As the secretive Trans-Pacific Partnership treaty shows, the USA is keenly aware foreign policy can be a way to enhance the wealth-and-job-creation prospects of its domestic industries. China deciding to vet foreign vendors – presumably with an unbiased, transparent, consistent and predictable process – means the USA has a challenge to ensure the world's new economic colossus remains open to its economic citizens.

Perhaps a review of the Huawei ban might win favourable treatment for US companies? Or are we headed for a situation in which great powers simply decide not to trust sensitive products made by their geopolitical rivals? ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.