TechCentralTechCentral
    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Dimension Data to be renamed NTT Data

      27 October 2023

      DStv makes RWC final stream available for R19.95

      27 October 2023

      Karpowership gets green light for Richards Bay plant

      27 October 2023

      Why people wave on Zoom

      27 October 2023

      Microsoft gaining ground in cloud race with AWS, Google

      27 October 2023
    • World

      Intel beats expectations; manufacturing momentum builds

      27 October 2023

      Google CEO to testify on Monday in antitrust trial

      27 October 2023

      Huawei sees growth in cloud, digital power segments

      27 October 2023

      China rushes to swap Western tech for domestic options

      26 October 2023

      Alphabet, Meta deliver solid financial performances

      26 October 2023
    • In-depth

      Quantum computers in 2023: what they do and where they’re heading

      22 October 2023

      How did Stephen van Coller really do as EOH CEO?

      19 October 2023

      Risc-V emerges as new front in US-China tech war

      6 October 2023

      Get ready for a tidal wave of software M&A

      26 September 2023

      Watch | A tour of Vumatel’s Alexandra fibre roll-out

      19 September 2023
    • TCS

      TCS | Mesh.trade’s Connie Bloem on the future of finance

      26 October 2023

      TCS | Rahul Jain on Peach Payments’ big funding round

      23 October 2023

      TCS+ | How MiWay uses conversation analytics

      16 October 2023

      TCS+ | The story behind MTN SuperFlex

      13 October 2023

      TCS | The Information Regulator bares its teeth – an interview with Pansy Tlakula

      6 October 2023
    • Opinion

      Big banks, take note: PayShap should be free

      20 October 2023

      Eskom rolling out virtual wheeling – here’s how it works

      4 October 2023

      How blockchain can help defeat the scourge of counterfeit goods

      29 September 2023

      There’s more to the skills crisis than emigration

      29 September 2023

      The role of banks in Africa’s digital future

      22 August 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Social media » TikTok ban could weaken personal cybersecurity

    TikTok ban could weaken personal cybersecurity

    TikTok is the first widely used app that the US has proposed banning over privacy and security concerns.
    By The Conversation14 April 2023
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    TikTok is not the first app to be scrutinised over the potential exposure of US user data but it is the first widely used app that the US government has proposed banning over privacy and security concerns.

    So far, the discussion has focused on whether TikTok should be banned. There has been little discussion of whether TikTok could be banned, and there has been almost no discussion of the effects on cybersecurity that a TikTok ban could cause, including encouraging users to sidestep built-in security mechanisms to bypass a ban and access the app.

    As a cybersecurity researcher, I see potential risks if the US attempts to ban TikTok. The type of risk depends on the type of ban.

    Server addresses can be changed and a TikTok ban could devolve into a game of cat and mouse

    Blocking access to TikTok by filtering traffic destined for addresses believed to be owned by TikTok is possible but would be difficult to accomplish. Server addresses can be changed and a TikTok ban could devolve into a game of cat and mouse.

    Additionally, this sort of block could be bypassed using virtual private networks (VPNs), which encrypt data flowing between servers and devices. VPNs can be used to shield traffic between servers in other countries and devices in the US VPNs were once widely recommended for people using public Wi-Fi, and people are already using VPNs to access blocked streaming services. While security experts no longer recommend VPNs for public Wi-Fi, many people have used them and so are familiar with a tool that would help them bypass a TikTok ban.

    DNS sinkholes are another technique that could be used in TikTok bans. DNS, the Domain Name System, is a network protocol that behaves like the internet’s phone book. Computers need to know the IP address of a server in order to communicate with it. DNS allows a computer to look up that address using a name convenient for humans to remember, such as www.google.com.

    How the domain name system works

    DNS sinkholes stop that lookup. DNS sinkholes don’t directly block access to a server. Rather, they stop other computers from being able to look up the server’s address. It’s fair to think of a DNS sinkhole as removing someone’s name from a phone book.

    DNS sinkholes are often used to stop malware and advertisements. They could be used in a TikTok ban. However, DNS sinkholes only work if lookups are confined to DNS servers that are configured to be sinkholes. A ban using DNS sinkholes would likely cover most DNS servers that people’s computers use by default.

    However, you can relatively easily change DNS settings on your computer to circumvent a ban based on DNS sinkholes. There are many public DNS servers that people could use instead of their current DNS servers, which are commonly maintained by internet service providers. Blocking TikTok with DNS sinkholes would require significant international cooperation to make it difficult for people to find DNS servers that could access TikTok.

    People circumventing a ban by looking for an alternate DNS server would be at risk. Unless a DNS server uses an uncommon extension named DNSSEC, you can’t verify the integrity of a DNS response. A malicious DNS server could reply to a lookup with an IP address of a server that’s under criminal control. This opens the door for a number of different kinds of attacks that could put your data at risk.

    Banning TikTok from your phone

    Another way TikTok could be banned is by blocking the TikTok mobile app. This would not affect US users’ ability to access the TikTok website, but it could change how and how often people access TikTok. Blocking the app could address the concern that TikTok could be used without the user’s knowledge to access other systems on a network that a mobile device is connected to. This has been the motivation for some local TikTok bans.

    Removing TikTok from app stores is unlikely to succeed by itself. Both Android and iOS devices have the ability to install apps from alternative sources, a technique known as sideloading. While this added step may discourage some people, sideloading tutorials are widely available online, and there is already popular software that must be sideloaded to be used on a phone.

    Mobile devices assume that mobile apps are coming from a trusted source. Both Google and Apple audit mobile apps prior to the app being available for download. While these reviews aren’t perfect, they help ensure apps don’t contain vulnerabilities or malware. When app stores aren’t involved, security responsibilities change. Sideloading makes users responsible for verifying an app’s legitimacy, and criminals could trick users into installing malicious apps from third-party sources.

    Read: Some US politicians blast bill that would ban TikTok

    But what about the millions of people who already have TikTok installed on their phones? Enforcing a TikTok app ban would likely require that it be removed from mobile devices. Apple has long had the ability to remove software from iPhones, and Google could remove apps using Google Play Protect. These tools are important security controls that, at least on Android devices, can remove malware even if it was sideloaded. Enforcing a ban using security controls could motivate users to disable these controls, which would weaken the security of their devices.

    Read: TikTok parent now makes us much revenue as Tencent

    Users might even be motivated to “jailbreak” their iOS devices or “root” their Android devices to prevent Apple or Google from removing the TikTok app, which would further weaken security. Jailbreaking an iOS device allows users to bypass security restrictions in the operating system. Rooting an Android device means gaining the highest level security access, which allows users to make changes to the operating system. Jailbreaking and rooting are prohibited by Apple and Google. Both actions void the user’s warranty and undermine the security controls that limit criminals’ access to mobile devices.

    Security trade-offs

    I find it unlikely that a TikTok ban would be technologically enforceable. Even China struggles with content filtering. These difficulties may be why proposed legislation includes significant punishments for bypassing the ban.

    Even if the punishments are not aimed at the average TikTok user, this proposed legislation – aimed at improving cybersecurity – could motivate users to engage in riskier digital behaviour.

    • Written by Robert Olson, senior lecturer of computing security, Rochester Institute of Technology
    • This article is republished from The Conversation under a Creative Commons licence

    Get TechCentral’s daily newsletter

    Apple ByteDance Google TikTok
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleWatch | Researchers turn dead birds into drones
    Next Article AWS steps up AI rivalry with Google, Microsoft

    Related Posts

    Dimension Data to be renamed NTT Data

    27 October 2023

    DStv makes RWC final stream available for R19.95

    27 October 2023

    Karpowership gets green light for Richards Bay plant

    27 October 2023
    Promoted

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    iKhokha, Shopstar pave the way for simpler e-commerce

    27 October 2023

    Flutter vs React Native: a comprehensive comparison

    27 October 2023
    Opinion

    Big banks, take note: PayShap should be free

    20 October 2023

    Eskom rolling out virtual wheeling – here’s how it works

    4 October 2023

    How blockchain can help defeat the scourge of counterfeit goods

    29 September 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.