For years, the use of insecure smart home appliances and other Internet-connected devices has resulted in personal data leaks. Many smart devices require users’ location, contact details or access to cameras and microphones to set up, which expose people’s personal information, but are unnecessary to use the product. As a result, data breaches and security incidents continue to emerge worldwide through smartphone apps, smart speakers, TVs, air fryers and robot vacuums.
Last week, another major data breach was added to the list: Mars Hydro, a Chinese company that makes Internet of Things (IoT) devices such as LED grow lights and the software to control them remotely. Jeremiah Fowler, a cybersecurity researcher at vpnMentor, on Feb. 12 reported that Mars Hydro had left 1.17 terabytes of non-password-protected data containing 2.7 billion records online, including users’ Wi-Fi network names, Wi-Fi passwords, Internet protocol addresses and device IDs.
The exposed data appeared to belong to users of the company’s Mars Pro smartphone app, even though Mars Hydro’s privacy notices on Apple’s App Store and Google Play state that the app does not collect user data, Fowler said. Within hours of notifying Mars Hydro, the database was no longer publicly available, but it is uncertain how long it was left unprotected or if unauthorized parties had accessed it, he said. The incident demands further investigation to get a full picture of users’ exposure, he said, adding that the issue yet again raises concerns over the security and privacy of IoT devices.
The Mars Hydro incident comes as Chinese start-up DeepSeek’s artificial intelligence (AI) chatbot was recently found to have transferred user data to ByteDance Ltd, TikTok’s parent company, which prompted many countries to ban public-sector entities from using DeepSeek or suspend downloads of the Chinese app. In Taiwan, the Ministry of Digital Affairs on Jan. 31 said that government agencies would be prohibited from using DeepSeek, but it remains unclear if the ministry would restrict public use of the service if it contravenes data protection laws.
Concerns over data leaks and hacking from Chinese software and devices have grown in the past few years. Security experts warn that apps from Chinese e-commerce sites such as AliExpress and Temu, as well as China-made IP cameras, smart speakers and robot vacuums, have data security vulnerabilities. They say risks stem from potential backdoors embedded during manufacturing or coding to weaken encryption methods and provide gateways for cyberattacks.
Make no mistake: Concerns over data breaches also exist for devices made by non-Chinese vendors. However, the issue with products made in China or by Chinese-owned companies is that the Chinese Communist Party, with no democratic oversight, could exploit such information for surveillance or intelligence-gathering purposes, posing national security threats. In addition, most countries generally require businesses to obtain consent from users before collecting their personal information. Unfortunately, some Chinese services do not inform users or bypass this requirement when collecting personal data.
In November last year, the Ministry of Digital Affairs acknowledged the importance of IoT information security as such devices become more popular. It said that regardless of the country of origin or the type of device, user data could be collected and become a potential security risk. It added that it would launch information security labels for IoT devices sold in Taiwan and propose data protection guidelines for device makers. In the meantime, users can take simple steps to mitigate potential risks, such as changing default passwords, restricting the access software and devices have to personal information, stopping data sharing, monitoring device activity and turning off devices when not in use.
Father’s Day, as celebrated around the world, has its roots in the early 20th century US. In 1910, the state of Washington marked the world’s first official Father’s Day. Later, in 1972, then-US president Richard Nixon signed a proclamation establishing the third Sunday of June as a national holiday honoring fathers. Many countries have since followed suit, adopting the same date. In Taiwan, the celebration takes a different form — both in timing and meaning. Taiwan’s Father’s Day falls on Aug. 8, a date chosen not for historical events, but for the beauty of language. In Mandarin, “eight eight” is pronounced
In a recent essay, “How Taiwan Lost Trump,” a former adviser to US President Donald Trump, Christian Whiton, accuses Taiwan of diplomatic incompetence — claiming Taipei failed to reach out to Trump, botched trade negotiations and mishandled its defense posture. Whiton’s narrative overlooks a fundamental truth: Taiwan was never in a position to “win” Trump’s favor in the first place. The playing field was asymmetrical from the outset, dominated by a transactional US president on one side and the looming threat of Chinese coercion on the other. From the outset of his second term, which began in January, Trump reaffirmed his
Having lived through former British prime minister Boris Johnson’s tumultuous and scandal-ridden administration, the last place I had expected to come face-to-face with “Mr Brexit” was in a hotel ballroom in Taipei. Should I have been so surprised? Over the past few years, Taiwan has unfortunately become the destination of choice for washed-up Western politicians to turn up long after their political careers have ended, making grandiose speeches in exchange for extraordinarily large paychecks far exceeding the annual salary of all but the wealthiest of Taiwan’s business tycoons. Taiwan’s pursuit of bygone politicians with little to no influence in their home
Despite calls to the contrary from their respective powerful neighbors, Taiwan and Somaliland continue to expand their relationship, endowing it with important new prospects. Fitting into this bigger picture is the historic Coast Guard Cooperation Agreement signed last month. The common goal is to move the already strong bilateral relationship toward operational cooperation, with significant and tangible mutual benefits to be observed. Essentially, the new agreement commits the parties to a course of conduct that is expressed in three fundamental activities: cooperation, intelligence sharing and technology transfer. This reflects the desire — shared by both nations — to achieve strategic results within