In a statement provided to the Stanford Internet Observatory (SIO), Clubhouse admitted that the pings that the company sent to servers all over the world do contain user’s ID. Even though this only applies to a small part of its traffic, these servers might be located in China as well.
Hence, it will now increase the encryption and blocks within the Clubhouse app to stop it from pinging Chinese servers. The company has also planned to have these new changes to be audited and verified by an external security company.
Earlier, SIO researchers raised concerns that Agora, who provides back-end infrastructure to Clubhouse, might have access to users’ raw audio. SIO surmised that since Agora is subject to China’s cybersecurity laws, the company must turn over recordings to Beijing if requested to do so under national security grounds.
For its part, Agora told The Verge that it does not have access to identifiable user data. The Shanghai-based company also insists that voice and video traffic from non-China users does not go through China.
Beijing blocked Clubhouse last week after Chinese users began using it to discuss taboo topics such as China-Taiwan relations, the ill-treatment of Uighur Muslims in China’s Xinjiang province, and the 1989 Tiananmen Square crackdown.
No comments:
Post a Comment