Xiaomi Amends Cloud Messaging Service After Privacy Scare

Xiaomi Amends Cloud Messaging Service After Privacy Scare

Roughly a week ago, Finland’s F­Secure started investigating claims that Xiaomi was sending essential data under the radar from its MIUI ­powered phones back to the main Xiaomi servers in China. As it turned out the claims were not unsubstantiated and touched upon the worst fears of consumers who were bothered by the fact that their privacy was put on the line by yet another telecom company. Though F­Secure’s brand new Redmi 1s Hugo_BarraXiaomi manufactured smartphone does not add any cloud accounts to its program, yet the device sent back the carrier name,  phone number, IMEI (device identification technology), additional numbers saved in the phone book, and even personal text messages data back to Beijing. Many users were put off by the incident due to the fact that the data shared from their devices was not encrypted, which means that the phone specifications could be known to one and all alike. In the midst of this brewing controversy, the Chinese company is making efforts to put the derailed train of their market reputation back on track.

The most-valiant damage control efforts were made by Vice President (VP) Hugo Barra, who took to the social media to clear the air regarding the issue.

Policy Gone Awry

Xiaomi is a mobile manufacturer company that believes in delivering quality products and easy ­to­ use internet services. Per the policy of the company, the data handled by the servers is not uploaded nor is any private information stored in any database without first seeking the permission of the user.

MIUI Cloud Messaging

Cloud messaging is offered by Xiaomi that is supported by MIUI operating system. This particular service gives the advantage to MIUI users by enabling them to exchange free­of­cost text messages with each other. This is achieved by routing messages through IP instead of relying upon the carrier’s SMS portal. The Official Story Xiaomi’s VP Barra took to the social media and put in his best effort to educate the general public about the real story behind the controversy. He said that the data link in question was an important part of MIUI’s cloud messaging service that played its role by deciding whether the consumers’ text messages could be channeled through the internet for free.

Unfortunately for Xiaomi, this feature was enabled by default that led to the data being channeled back to Beijing.

The mistake has been made right after users were told that new devices or factory ­restored ones should be manually activated to use the cloud messaging service. What this means is that user data would not be transferred covertly to Beijing anymore. In addition, the latest updates made to the old devices would ensure that the phone numbers being sent to the servers are encrypted if the users want to continue using the MIUI’s cloud messaging feature instead of opting for the SMS delivery system.

Other Important Queries

The entire episode still left some questions unanswered in the minds of consumers. For instance, wasn’t the company supposed to encrypt all information during the device manufacturing stage per the privacy policies adopted by all companies dealing in the field of communication? The blame for this lapse in the phone’s security had to be taken by Xiaomi’stop officials because errors like these could virtually destroy the standing of the company in a competitive global market. Since this mistake has been made by other renowned communication companies in the past as well, Xiaomi also deserves a second chance.

Moreover, the VP of the company has admitted to the mistake and provided a lengthy but transparent explanation for the unfortunate mistake.

It is pertinent also to mention here that the MIUI does seek public data on request from Xiaomi servers at different time intervals. The data that is shared mostly includes company stored everyday greeting messages and MIUI OTA notifications about latest updates, which is essentially the non personal data that doesn’t threaten the privacy of consumers using the device.

By Rachael Dane,  Stealthmate

Stealthmate provides comprehensive list of monitoring features for mobile phones and computers. These features range from basic internet monitoring to advanced features like email monitoring and logging of all popular Chat Messangers. 

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as technology related infographics and comics.

NEWS

CIOs Cutting Through the Hype and Delivering Real Value from Machine Learning, Survey Shows 

CIOs Cutting Through the Hype and Delivering Real Value from Machine Learning, Survey Shows 

New survey reveals progressive CIOs tap machine learning to solve everyday work problems SANTA CLARA, Calif. – October 17, 2017– A ...
New IDC Spending Guide Forecasts Nearly $120 Billion in Worldwide Spending on Security Products and Services in 2021

New IDC Spending Guide Forecasts Nearly $120 Billion in Worldwide Spending on Security Products and Services in 2021

FRAMINGHAM, Mass., October 19, 2017 – Worldwide spending on security-related hardware, software, and services is forecast to reach $119.9 billion in ...
Toyota to test self-driving, talking cars by about 2020

Toyota to test self-driving, talking cars by about 2020

TOKYO (Reuters) - Toyota Motor Corp (7203.T) on Monday said it would begin testing self-driving electric cars around 2020, which ...

CONTRIBUTORS

Data Breaches: Incident Response Planning - Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning - Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last ...
The Next Wave of Cloud Computing: Artificial Intelligence?

The Next Wave of Cloud Computing: Artificial Intelligence?

Cloud Computing and Artificial Intelligence Over the past few years, cloud computing has been evolving at a rapid rate. It ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Academia is on the Ropes but is Reluctant to Change. Why are Most of Them Digital Dinosaurs?

Academia is on the Ropes but is Reluctant to Change. Why are Most of Them Digital Dinosaurs?

“Moving a university is like moving a cemetery—you can’t expect any help from the inhabitants,” says Barb Oakley, Ph.D. Higher ...
If Not Managed Correctly, The Cloud Can Cost An Organization

If Not Managed Correctly, The Cloud Can Cost An Organization

Cloud Application Management When organizations implement cloud applications, they do so as a means to be more efficient and in ...
Security Audits, Cyberattacks and other Potential Front Line Issues

Security Audits, Cyberattacks and other Potential Front Line Issues

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other ...
Big Data Career Opportunities

Big Data Analytics Career Job Opportunities

Big Data Career Opportunities With the inception of Big Data, we have witnessed a data revolution around us.  Big data ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...

SPONSORS

AT&T Pinpoints 4 Key Elements To Achieving Security With The Internet of Things

AT&T Pinpoints 4 Key Elements To Achieving Security With The Internet of Things

Internet of Things Security The Internet of Things (IoT) is rapidly becoming a part of many of our business processes, ...
Scale your Windows Azure application

Understanding The Importance Of A Flexible Hybrid Cloud Solution

Flexible Hybrid Cloud Solution The cloud computing revolution continues to gather pace, and more and more businesses are coming on-board ...
Has Cybersecurity Become Too Reactive in this Day and Age?

Has Cybersecurity Become Too Reactive in this Day and Age?

Cybersecurity Too Reactive? Cybersecurity today has become far too reactive. The constant innovation of hackers has meant that defenses are ...

GET READY FOR CLOUD MICROSERVICES

So, is microservices the answer? What are the pitfalls? Is this the path you really want to lead your company down?

On November 8 at 2:30 p.m. ET, join hosts JP Morgenthal, Steve Prentice and Kalyan Ramanathan for a vibrant and interactive online discussion specifically about the pitfalls of microservices, including management, sprawl, and decomposition – and how to avoid them.

JP