Skip to main content

52 Chinese apps red-flagged by Indian Intel agencies

52 Chinese apps red-flagged by Indian Intel agencies; TikTok, ShareIt, UC Browser, Clean Master in list

Indian intelligence agencies have asked the government to block or advise people to stop using a bunch of applications that are apparently extracting user data. These Chinese apps, 52 in number are linked to neighboring country China.

The concern raised is that the applications in question end up extracting a huge amount of private data and sending this outside India.

The list of applications includes popular tools that are used by lots of people in the country. These Chinese apps list include:

  1. TikTok
  2. Vault-Hide
  3. Vigo Video
  4. Bigo Live
  5. Weibo
  6. WeChat
  7. SHAREit
  8. UC News
  9. UC Browser
  10. BeautyPlus
  11. Xender
  12. ClubFactory
  13. Helo
  14. LIKE
  15. Kwai
  16. ROMWE
  17. SHEIN
  18. NewsDog
  19. Photo Wonder
  20. APUS Browser
  21. VivaVideo- QU Video Inc
  22. Perfect Corp
  23. CM Browser
  24. Virus Cleaner (Hi Security Lab)
  25. Mi Community
  26. DU recorder
  27. YouCam Makeup
  28. Mi Store
  29. 360 Security
  30. DU Battery Saver
  31. DU Browser
  32. DU Cleaner
  33. DU Privacy
  34. Clean Master – Cheetah
  35. CacheClear DU apps studio
  36. Baidu Translate
  37. Baidu Map
  38. Wonder Camera
  39. ES File Explorer
  40. QQ International
  41. QQ Launcher
  42. QQ Security Centre
  43. QQ Player
  44. QQ Music
  45. QQ Mail
  46. QQ Newsfeed
  47. WeSync
  48. SelfieCity
  49. Clash of Kings
  50. Mail Master
  51. Mi Video call-Xiaomi
  52. Parallel Space

Comments

Popular posts from this blog

Computer Network : Layered Architecture

Layered Architecture Protocol Hierarchy To tackle with the design complexity most of the networks are organize as a set of layers or levels. The fundamental idea of layered architecture is to divide the design into small pieces. The layering provides modularity to the network design. The main duty of each layer is to provide offer services to higher layers, and provide abstraction. The main benefits of layered architecture are modularity and clear interfaces. Five Layered Network Design Issues:  Layered architecture in computer network design  Layered architectures have several advantages. Some of them are,   Modularity and clear interface   Provide flexibility to modify network services   Ensure independence of layers   Management of network architecture is easy   Each layer can be ...

Computer Network : ISO-OSI Reference Model

ISO-OSI Reference Model Principal of OSI Reference Model The OSI reference model has 7 layers. The principles that were applied to arrive at the seven layers can be briefly summarized as   follows: A layer should be created where a different abstraction is needed. Each layer should perform a well-defined function. The function of each layer should be chosen with an eye toward defining internationally standardized protocols. The layer boundaries should be chosen to minimize the information flow across the interface The  number   of  layers  should   be   large   enough   that   distinct functions    need   not  be   thrown together    in the same layer out of necessity and small enough that architecture does not become unmanageble. Feature of OSI Model: Big picture of communication over network is understandable thr...

Can coronavirus spread through mosquitoes?

  Can coronavirus spread through mosquitoes? Scientists have confirmed for the first time that the novel coronavirus behind the COVID-19 pandemic cannot be transmitted to people by mosquitoes , a finding that adds evidence to WHO claims that the disease is not mosquito-borne. The research, published in the journal Scientific Reports, provided the first experimental evidence on the capacity of SARS-CoV-2, the virus that causes COVID-19 disease, to infect and be transmitted by mosquitoes. "Here we provide the first experimental data to investigate the capacity of SARS-CoV-2 to infect and be transmitted by mosquitoes," the study noted. "While the World Health Organization (WHO) has definitively stated that mosquitoes cannot transmit the virus, our study is the first to provide conclusive data supporting the theory," said Stephen Higgs, a co-author of the research from Kansas State University in the US. According to the study, conducted at the university...

Topology-Mesh, Star, Bus, Ring and Hybrid

Computer Network Topology – Mesh, Star, Bus, Ring and Hybrid Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology – Mesh, Star, Bus, Ring and Hybrid. Types of Topology There are five types of topology in computer networks: 1. Mesh Topology 2. Star Topology 3. Bus Topology 4. Ring Topology 5. Hybrid Topology Mesh Topology In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Lets say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2. Advantages of Mesh topology 1. No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices. 2. Mesh topolog...

Computer Network and Types

Computer Network A network set up by connecting two or more computers and other supporting hardware devices through communication channels is called a computer network. It enables computers to communicate with each other and to share commands, data, etc., including the hardware and software resources. Uses of Computer Network: It allows you to share resources such as printers, scanners, etc. You can share expensive software and database among network users. It facilitates communications from one computer to another computer. It allows the exchange of data and information among users through a network. What Are the Important Types of Computer Networks? There are various types of computer networks available. We can categorize them according to their size as well as their purpose. The size of a network should be expressed by the geographic area and number of computers, which are a part of their networks. It includes devices housed in a single room to millions of devices sp...

BIT ORIENTED PROTOCOLS : SDLC, HDLC, BISYNC, LAP & LAPB

BIT ORIENTED PROTOCOLS A bit-oriented protocol is a communications protocol that sees the transmitted data as an opaque stream of bits with no semantics, or meaning. Control codes are defined in terms of bit sequences instead of characters. Bit oriented protocol can transfer data frames regardless of frame contents. It can also be stated as "bit stuffing" this technique allows the data frames to contain an arbitrary number of bits and allows character codes with arbitrary number of bits per character. SDLC Synchronous Data Link Control (SDLC) supports a variety of link types and topologies. It can be used with point-to-point and multipoint links, bounded and unbounded media, half-duplex and full-duplex transmission facilities, and circuit-switched and packet-switched networks. SDLC identifies two types of network nodes: primary and secondary. Primary nodes control the operation of other stations, called secondary. The primary polls the secondary in a predeter...