• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2020 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

“Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

April 21, 2022 Leave a Comment

The article I read this week was from the New York Times, and it describes a mandatory app athletes must have while participating at this year’s Winter Olympics in China. The app, which is used to report health & travel data, has serious encryption vulnerabilities according to researchers. It was found that portions of the app used to transmit Covid results & travel information failed to verify the signature used in encrypted transfers, or didn’t encrypt data at all. The app, MY2022, was designed to keep athletes in China from the greater Chinese population in order to control Covid spread. Concerns with the app’s design underscore the broader worries of Censorship in China. When security flaws with the app were disclosed to Beijing, an update did not fix the issues, as they likely violated China’s personal data protection laws. Issues of nonexistent encryption have long been an issue for China’s tech industry, as they have the duty of protecting consumer data while also sharing it with government censorship programs. This is also not the first time a Covid-related application has suffered issues, either. They are often not secure or transparent, or they are rushed, which can lead to public distrust in health initiatives. Issues with MY2022 include hackers being able to intercept data, and it’s messaging service failing to encrypt metadata. The main concern is whether or not these flaws were intentional, because once again proper encryption may interfere with the Government being able to “snoop”.

https://www.nytimes.com/2022/01/18/technology/china-olympics-app-security.html

-Alex Knoll

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

RECENT ANNOUNCEMENTS

“School District reports a 334% hike in cybersecurity insurance costs”

A school district in Chicago released details on its cyber-insurance, from … [More...] about “School District reports a 334% hike in cybersecurity insurance costs”

“Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

The article I read this week was from the New York Times, and it describes … [More...] about “Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

“‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

by Sean Lyngaas 3/26/22 To summarize this article, the United States … [More...] about “‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

Cisco Umbrella default SSH key allows theft of admin credentials

Cisco Umbrella default SSH key allows theft of admin credentials … [More...] about Cisco Umbrella default SSH key allows theft of admin credentials

The battle over end-to-end encryption

The BBC article, “The battle over end-to-end encryption, is news to … [More...] about The battle over end-to-end encryption

Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

This article explains the email-based social engineering of criminals to … [More...] about Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University