SlideShare a Scribd company logo
1 of 3
AN ARTICLE:
Is Tiktok a tool for Chinese spies?
In the hands of a normal person, Tiktok was pronounced as a legitimate entertainment for American
families. The domination of the app in American society is truly tremendous in certain ways, most of the
teenagers are joyful when making a content as the times goes by.
A new allegation was spark as the trump administration scrutinize the app as malicious and potentially
held a enormous of data that may expose the children or even adults to CCP. Tiktok was owned by
controversial company “ByteDance”. The app collects fingerprints and biometrics that may compose a
sensitive data that will expose americans privacy. The company ByteDance have a mysterious
connection to CCP (Chinese Communist Party) that may potentially cause an eruption to the privacy of
every living members of the app.
Most human rights and anti-CCP movement warn about the use of Chinese application because of
privacy espionage and collecting sensitive data that may directed to millions of people or even American
people. Most of Chinese company are directed making a secret negotiation, in certain ways that we
can’t totally understand because of secrecy of these companies.
In recent reports the Biden Administration can potentially revoke the Trump era sanctions to these
“malicious” companies and can spark a controversy. Recently, Microsoft and Oracle light a candle to buy
the company but, this ended quickly when Bytedance attempt to cancel the deal because of internal
issues about the policy. The Biden administration attempt is outright concerning in certain levels that it
can escalate to a massive spread of espionage. It can also, devalued the rule of law in privacy and policy
act of United States of America.
In between September 2021, the Chinese company accessed the data vault in United States. This
lingering issue is concerning and can be potentially undermines the data sharing policy in US. In report
of Buzzfeed news, the data was transferred by engineer of the company and monitor the flow of US
data, which the staff was not independently authorized to access.
Data accessing in china was a normal act because of the law in china that permits the official of chinse
communist party to access the sensitive data according by their own standard. But, they denied this
important allegation and shift blame the issue. Most of the companies in China have these problems
that endanger certain countries. Example of it is the use of Huawei phone that spy the user in a critical
way, also the network Huawei that accessed the data of customers in severe ways.
Most of the country that ties with chinse technology are entitled in tremendous of problems that
endangered the national security in sever manner. Unites States of America know the potential atrocity
and banned the use of Huawei 5g networks that secretly passing the peoples data in communist china’s
lair. Some countries in Asia and Africa was compromised by china and control their economic
transaction and crippling the human rights in a higher way.
Most of the cases of human rights violation was always finger pointing with china’s business and
economic plan. The disturbing human slavery was in highest level in China, even the pandemic structs
china’s economy. Also, the pandemic response may also acknowledge as “disgusting” because of china’s
response to it.
Chinese companies weaponizing application and software is not new to the market. In google play store,
the amount Chinese application is unthinkable and expanding due to higher demands of games and
applications. In new reports the Byte Dance company popular game Mobile Legends generated $317.7
million across the globe and potentially increase due to amounts of player. The aggressive response to
online games is due to COVID-19 lockdowns that struct million or even billion of people to stay home.
The boredom was pronouncing and strike to millions of people, these generated a tremendous number
of users of social media platforms and online games.
The high demands of online chat were also proclaiming and the video chats applications was ramping
into users every day. Mostly people use the chinses app Zoom to connect each other which also
blacklisted to be potential chinses spies’ tool. In reports of financial times, a man named Mr. Jin pass a
complaint to Department of Justice that detailed surveilling and disrupting of Chinese cops in the
meeting. This create a smoking reason to Zoom meeting was a potential tool for Chinese police that can
reach beyond china.
It triggers a question that “Is Chinese app can prosecute a human person outside China?” the question
was linger in some bigger people and remain a mystery until a conclusion and prevention of United
States of America filled to investigate some cases of abuse of authority of CCP abroad. It also sparks a
investigation through some nation that ties with china and also a friend of china in economic and
bilateral relationship. In other point, the Chinese in media is almost a severe and dangerous unregulated
due to connection in internal support to CCP. It also lingers in American media and continue to pounder
lies in a level that we didn’t see before.
Most of chinse software are symbolizing a great danger to democracy and freedom of a nation. It leaves
a mark that need to be abrasively wash to prevent a rise of radicalism or even communism into to
government roots. These proves that fighting communism are always in the table and a glimpse of
tomorrow world. The media and writer must acknowledge the certain topic to provide a good
information for all the people that need a reliable media sources and reliable freedom to think in
according to 1st
amendment. These brings a unification of mind and talented ideology to be the greatest
by standard in the future and ongoing plans for surfacing a new civilization. The greatest knowledge may
only be acquired in the freedom of every human in this world. Even, the lingering bias may occur the
world will always benefit to certain mementos that every human is equal. In the end, the chinse
espionage to American people is blatant and need to be actioned by the law.
SUPPORT ME:
https://www.buymeacoffee.com/dyokimura6

More Related Content

Similar to AN ARTICLE: Is Tiktok a tool for Chinese spies

The age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaThe age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaGmeconline
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
IPR 2020 Disinformation in Society
IPR 2020 Disinformation in Society IPR 2020 Disinformation in Society
IPR 2020 Disinformation in Society Sarah Jackson
 
IPR 2020 Disinformation in Society Report
IPR 2020 Disinformation in Society ReportIPR 2020 Disinformation in Society Report
IPR 2020 Disinformation in Society ReportSarah Jackson
 
Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10bkawamura
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
The Social Media Presidency #Branded2017
The Social Media Presidency #Branded2017The Social Media Presidency #Branded2017
The Social Media Presidency #Branded2017Oz Sultan
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US DemocracyThe Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US Democracyeholmes80
 
Trump is the "White Hat" Hacker of US Democracy
Trump is the "White Hat" Hacker of US DemocracyTrump is the "White Hat" Hacker of US Democracy
Trump is the "White Hat" Hacker of US Democracyeholmes80
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paperMonica Chan
 

Similar to AN ARTICLE: Is Tiktok a tool for Chinese spies (18)

The age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaThe age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliya
 
E era ir-us-fp
E era ir-us-fpE era ir-us-fp
E era ir-us-fp
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
IPR 2020 Disinformation in Society
IPR 2020 Disinformation in Society IPR 2020 Disinformation in Society
IPR 2020 Disinformation in Society
 
IPR 2020 Disinformation in Society Report
IPR 2020 Disinformation in Society ReportIPR 2020 Disinformation in Society Report
IPR 2020 Disinformation in Society Report
 
Alade
AladeAlade
Alade
 
Group 1 Project
Group 1 Project Group 1 Project
Group 1 Project
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Branded2017 - Oz Sultan
Branded2017  - Oz SultanBranded2017  - Oz Sultan
Branded2017 - Oz Sultan
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
The Social Media Presidency #Branded2017
The Social Media Presidency #Branded2017The Social Media Presidency #Branded2017
The Social Media Presidency #Branded2017
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US DemocracyThe Great White Hack. Trump is the "White Hat" Hacker of US Democracy
The Great White Hack. Trump is the "White Hat" Hacker of US Democracy
 
Trump is the "White Hat" Hacker of US Democracy
Trump is the "White Hat" Hacker of US DemocracyTrump is the "White Hat" Hacker of US Democracy
Trump is the "White Hat" Hacker of US Democracy
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
 

More from Yokimura Dimaunahan

WATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALS
WATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALSWATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALS
WATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALSYokimura Dimaunahan
 
Activity - Deadlocks Banker's algorithm OS
Activity - Deadlocks Banker's algorithm OSActivity - Deadlocks Banker's algorithm OS
Activity - Deadlocks Banker's algorithm OSYokimura Dimaunahan
 
Creating a Montage for PVMGO Commitment Week
Creating a Montage for PVMGO Commitment WeekCreating a Montage for PVMGO Commitment Week
Creating a Montage for PVMGO Commitment WeekYokimura Dimaunahan
 
Activity 4 - Calculate IPv4 Subnets CISCO
Activity 4 - Calculate IPv4 Subnets CISCOActivity 4 - Calculate IPv4 Subnets CISCO
Activity 4 - Calculate IPv4 Subnets CISCOYokimura Dimaunahan
 
Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buod
Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buodSa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buod
Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buodYokimura Dimaunahan
 
Ang Reyna ng Espada at mga Pusa buod
Ang Reyna ng Espada at mga Pusa buodAng Reyna ng Espada at mga Pusa buod
Ang Reyna ng Espada at mga Pusa buodYokimura Dimaunahan
 
Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...
Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...
Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...Yokimura Dimaunahan
 
Reinforcement Activity Cavite Mutiny.pdf
Reinforcement Activity Cavite Mutiny.pdfReinforcement Activity Cavite Mutiny.pdf
Reinforcement Activity Cavite Mutiny.pdfYokimura Dimaunahan
 
Activity 2 Using if - else if- else Conditional Statement.docx
Activity 2 Using if - else if- else Conditional Statement.docxActivity 2 Using if - else if- else Conditional Statement.docx
Activity 2 Using if - else if- else Conditional Statement.docxYokimura Dimaunahan
 
Partial Fraction Decomposition Integral Calculus
Partial Fraction Decomposition Integral CalculusPartial Fraction Decomposition Integral Calculus
Partial Fraction Decomposition Integral CalculusYokimura Dimaunahan
 
Elementary Integration Solutions
Elementary Integration SolutionsElementary Integration Solutions
Elementary Integration SolutionsYokimura Dimaunahan
 
Integration trigonometric function (1-6) only.pdf
Integration trigonometric function (1-6) only.pdfIntegration trigonometric function (1-6) only.pdf
Integration trigonometric function (1-6) only.pdfYokimura Dimaunahan
 
Alternative Solutions to Integration of Trigonometric Substitution
Alternative Solutions to Integration of Trigonometric SubstitutionAlternative Solutions to Integration of Trigonometric Substitution
Alternative Solutions to Integration of Trigonometric SubstitutionYokimura Dimaunahan
 
United Kingdom and Philippines .pdf
United Kingdom and Philippines .pdfUnited Kingdom and Philippines .pdf
United Kingdom and Philippines .pdfYokimura Dimaunahan
 

More from Yokimura Dimaunahan (20)

WATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALS
WATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALSWATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALS
WATER LEVEL SENSOR POWERPOINT FOR MIXED SIGNALS
 
Activity - Deadlocks Banker's algorithm OS
Activity - Deadlocks Banker's algorithm OSActivity - Deadlocks Banker's algorithm OS
Activity - Deadlocks Banker's algorithm OS
 
Creating a Montage for PVMGO Commitment Week
Creating a Montage for PVMGO Commitment WeekCreating a Montage for PVMGO Commitment Week
Creating a Montage for PVMGO Commitment Week
 
Activity 4 - Calculate IPv4 Subnets CISCO
Activity 4 - Calculate IPv4 Subnets CISCOActivity 4 - Calculate IPv4 Subnets CISCO
Activity 4 - Calculate IPv4 Subnets CISCO
 
Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buod
Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buodSa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buod
Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan buod
 
Ang Reyna ng Espada at mga Pusa buod
Ang Reyna ng Espada at mga Pusa buodAng Reyna ng Espada at mga Pusa buod
Ang Reyna ng Espada at mga Pusa buod
 
Buod ng Banaag
Buod ng BanaagBuod ng Banaag
Buod ng Banaag
 
Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...
Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...
Repleksyon sa kwentong: Sa Pagitan ng Sabaw ng Chaolong at Hilab ng Tiyan, An...
 
Reinforcement Activity Cavite Mutiny.pdf
Reinforcement Activity Cavite Mutiny.pdfReinforcement Activity Cavite Mutiny.pdf
Reinforcement Activity Cavite Mutiny.pdf
 
Activity 2 Using if - else if- else Conditional Statement.docx
Activity 2 Using if - else if- else Conditional Statement.docxActivity 2 Using if - else if- else Conditional Statement.docx
Activity 2 Using if - else if- else Conditional Statement.docx
 
trigonometric integral
trigonometric integraltrigonometric integral
trigonometric integral
 
Business Plan
Business Plan Business Plan
Business Plan
 
Partial Fraction Decomposition Integral Calculus
Partial Fraction Decomposition Integral CalculusPartial Fraction Decomposition Integral Calculus
Partial Fraction Decomposition Integral Calculus
 
Integration techniques
Integration techniques Integration techniques
Integration techniques
 
Elementary Integration Solutions
Elementary Integration SolutionsElementary Integration Solutions
Elementary Integration Solutions
 
Integration trigonometric function (1-6) only.pdf
Integration trigonometric function (1-6) only.pdfIntegration trigonometric function (1-6) only.pdf
Integration trigonometric function (1-6) only.pdf
 
Alternative Solutions to Integration of Trigonometric Substitution
Alternative Solutions to Integration of Trigonometric SubstitutionAlternative Solutions to Integration of Trigonometric Substitution
Alternative Solutions to Integration of Trigonometric Substitution
 
POEM ABOUT LOVE.pdf
POEM ABOUT LOVE.pdfPOEM ABOUT LOVE.pdf
POEM ABOUT LOVE.pdf
 
POEM ABOUT COVID 19
POEM ABOUT COVID 19POEM ABOUT COVID 19
POEM ABOUT COVID 19
 
United Kingdom and Philippines .pdf
United Kingdom and Philippines .pdfUnited Kingdom and Philippines .pdf
United Kingdom and Philippines .pdf
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

AN ARTICLE: Is Tiktok a tool for Chinese spies

  • 1. AN ARTICLE: Is Tiktok a tool for Chinese spies? In the hands of a normal person, Tiktok was pronounced as a legitimate entertainment for American families. The domination of the app in American society is truly tremendous in certain ways, most of the teenagers are joyful when making a content as the times goes by. A new allegation was spark as the trump administration scrutinize the app as malicious and potentially held a enormous of data that may expose the children or even adults to CCP. Tiktok was owned by controversial company “ByteDance”. The app collects fingerprints and biometrics that may compose a sensitive data that will expose americans privacy. The company ByteDance have a mysterious connection to CCP (Chinese Communist Party) that may potentially cause an eruption to the privacy of every living members of the app. Most human rights and anti-CCP movement warn about the use of Chinese application because of privacy espionage and collecting sensitive data that may directed to millions of people or even American people. Most of Chinese company are directed making a secret negotiation, in certain ways that we can’t totally understand because of secrecy of these companies. In recent reports the Biden Administration can potentially revoke the Trump era sanctions to these “malicious” companies and can spark a controversy. Recently, Microsoft and Oracle light a candle to buy the company but, this ended quickly when Bytedance attempt to cancel the deal because of internal issues about the policy. The Biden administration attempt is outright concerning in certain levels that it can escalate to a massive spread of espionage. It can also, devalued the rule of law in privacy and policy act of United States of America. In between September 2021, the Chinese company accessed the data vault in United States. This lingering issue is concerning and can be potentially undermines the data sharing policy in US. In report of Buzzfeed news, the data was transferred by engineer of the company and monitor the flow of US data, which the staff was not independently authorized to access. Data accessing in china was a normal act because of the law in china that permits the official of chinse communist party to access the sensitive data according by their own standard. But, they denied this important allegation and shift blame the issue. Most of the companies in China have these problems that endanger certain countries. Example of it is the use of Huawei phone that spy the user in a critical way, also the network Huawei that accessed the data of customers in severe ways. Most of the country that ties with chinse technology are entitled in tremendous of problems that endangered the national security in sever manner. Unites States of America know the potential atrocity and banned the use of Huawei 5g networks that secretly passing the peoples data in communist china’s lair. Some countries in Asia and Africa was compromised by china and control their economic transaction and crippling the human rights in a higher way. Most of the cases of human rights violation was always finger pointing with china’s business and economic plan. The disturbing human slavery was in highest level in China, even the pandemic structs
  • 2. china’s economy. Also, the pandemic response may also acknowledge as “disgusting” because of china’s response to it. Chinese companies weaponizing application and software is not new to the market. In google play store, the amount Chinese application is unthinkable and expanding due to higher demands of games and applications. In new reports the Byte Dance company popular game Mobile Legends generated $317.7 million across the globe and potentially increase due to amounts of player. The aggressive response to online games is due to COVID-19 lockdowns that struct million or even billion of people to stay home. The boredom was pronouncing and strike to millions of people, these generated a tremendous number of users of social media platforms and online games. The high demands of online chat were also proclaiming and the video chats applications was ramping into users every day. Mostly people use the chinses app Zoom to connect each other which also blacklisted to be potential chinses spies’ tool. In reports of financial times, a man named Mr. Jin pass a complaint to Department of Justice that detailed surveilling and disrupting of Chinese cops in the meeting. This create a smoking reason to Zoom meeting was a potential tool for Chinese police that can reach beyond china. It triggers a question that “Is Chinese app can prosecute a human person outside China?” the question was linger in some bigger people and remain a mystery until a conclusion and prevention of United States of America filled to investigate some cases of abuse of authority of CCP abroad. It also sparks a investigation through some nation that ties with china and also a friend of china in economic and bilateral relationship. In other point, the Chinese in media is almost a severe and dangerous unregulated due to connection in internal support to CCP. It also lingers in American media and continue to pounder lies in a level that we didn’t see before. Most of chinse software are symbolizing a great danger to democracy and freedom of a nation. It leaves a mark that need to be abrasively wash to prevent a rise of radicalism or even communism into to government roots. These proves that fighting communism are always in the table and a glimpse of tomorrow world. The media and writer must acknowledge the certain topic to provide a good information for all the people that need a reliable media sources and reliable freedom to think in according to 1st amendment. These brings a unification of mind and talented ideology to be the greatest by standard in the future and ongoing plans for surfacing a new civilization. The greatest knowledge may only be acquired in the freedom of every human in this world. Even, the lingering bias may occur the world will always benefit to certain mementos that every human is equal. In the end, the chinse espionage to American people is blatant and need to be actioned by the law.