Hacker News new | past | comments | ask | show | jobs | submit login

When you prevent somebody from accessing what is out there, they release their own. The problem with that?? Well, only they mastered it since it was developed with local tech, by the time the goods are sent worldwide, you are blindfolded.

Still, I would never buy a Chinese tech device, you are buying a surveillance system to allow its government to spy on you.




> I would never buy a Chinese tech device, you are buying a surveillance system to allow its government to spy on you.

There is no public evidence that Chinese consumer tech has ever been used to spy for the Chinese government. None. Meanwhile, the USA has been caught running mass surveillance programmes like PRISM and tapping the phones of its own allies. That is confirmed. And yet it is the USA making the most noise, spreading fear about Chinese tech. People only seem to worry when the device doesn’t have a US brand on it. You can be a patriot, but don’t be naïve. Believing unproven claims while ignoring confirmed facts is not critical thinking.



The sources are anonymous US government personnel who refuse to give any details, so nothing can be verified. Anybody can make baseless accusations.


Wait until you learn how many off-the-shelf consumer devices contain a wifi capable microcontroller like the esp8266 and dont need or declare wifi capabilities...


O you sweet summer child, think of why there is no public evidence on Chinese espionage while you can easily rattle off a laundry list of Western espionage programs and you'll realise your mistake: China is a closed society without public inquiry while most of the West hangs its dirty laundry out for all to see and comment upon. Look under the cover of that Xiongmai camera, that Huawei base station or those Chinese inverters and you'll find plenty of remote access and control facilities which no doubt were left there purely by accident.


That sounds clever, but it dodges the core issue. You're treating suspicion as proof. Yes, China is less open, but that doesn't justify assuming guilt without evidence. Both Western and Chinese tech have had security flaws - whether truly accidental or not is up for debate. As you mentioned, Xiongmai cameras had hardcoded credentials and poor default security, and Huawei routers have had vulnerabilities - like many western alternatives. But none of these have been proven to be intentional or used for state spying.

In contrast, the West has been caught with INTENTIONAL backdoors - many of which have been directly linked to government and intelligence services. Juniper firewalls had a secret access mechanism tied to compromised cryptography. Trustwave issuing subordinate certificates to facilitate MitM snooping on all TLS traffic. Netgear and Cisco devices including undocumented public-facing remote access features. These were not speculative or theoretical. They were discovered, documented, and in some cases quietly patched without disclosure.

None of these were revealed out of transparency. They were found by researchers or whistleblowers. If there is no public evidence against Chinese devices, there is no case. Assuming intent without proof is not analysis. It is projection.

And let’s not ignore the obvious: many of these devices are manufactured in the same Chinese factories. But once a US brand name is stamped on the box, the fear seems to vanish. Somehow, they stop being a threat...



  > Still, I would never buy a Chinese tech device, you are buying a surveillance system to allow its government to spy on you.
i would tend to agree in general, but more and more this seems less the sole domain of chinese tech the way things are going (though maybe im just paranoid)


> you are buying a surveillance system to allow its government to spy on you

And yet the audit of the Huawei routers fond no backdoors.


> you are buying a Chinese surveillance system to allow the Chinese government to spy on you

ftfy




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: