当前位置:网站首页>If you find any loopholes later, don't tell China!
If you find any loopholes later, don't tell China!
2022-06-27 10:12:00 【Hollis Chuang】
source : The new intellectual yuan
See a piece of news , Involving the network security industry , Share it with you .
In recent days, , Department of Commerce, bureau of industry and security (BIS) The latest export control regulations in the field of network security have been officially released .
Yes , That's the release 「 List of entities 」、「 Trade blacklist 」 Of BIS! Speaking of these years , It's kind of 「 An old friend of Chinese netizens 」 了 .
What is this time ? It is mainly about the control of network security and vulnerability information .
Simply speaking , That is, when U.S. entities cooperate with organizations and individuals related to the Chinese government , If security vulnerabilities and information are found , It cannot be published directly , It should be reviewed by the Ministry of Commerce first .
The reason , It's not good to try again 「 National security 」, as well as 「 Counter terrorism needs 」.

actually , The new regulations announced this time are 2021 year 10 Provisional Regulations for the month of ( Solicitation draft ) The final confirmation of . This provision divides the global countries into A、B、D、E Four types of , The restrictive measures and strictness are gradually increasing .
China is divided into D class , namely 「 Restricted countries and regions 」,E Class is 「 Comprehensive embargo countries 」.
This Regulation establishes a new control method for some network security projects , The purpose is to 「 National security and counter-terrorism considerations 」.
meanwhile ,BIS A new exception to authorize cyber security exits has also been added . The core content is to authorize these network security projects to export to most destinations , However, the exceptions mentioned above are not allowed .
BIS Think , These controlled items may be used to monitor 、 Espionage , Or other acts aimed at destruction, etc .
Besides , The regulation also amended the export control classification number in the commercial control list .

BIS The new rules divide the world into A、B、D、E Four types of , among D Class is the most concerned 、 Restricted countries and regions .
As shown in the figure above , China is divided into D In class .
According to the requirements of the new regulations , Each entity is associated with D When relevant government departments or individuals of countries and regions like China cooperate , You must apply in advance , After obtaining permission, potential network vulnerability information can be sent across the border .
Of course , There are exceptions to the clause , If for legitimate network security purposes , Such as public disclosure of vulnerabilities or incident response , No need to apply in advance .
You can see , China is in national security 、 biochemical 、 Missile technology 、 All four items of the US arms embargo have been drawn ×.
The document states , Permission requirements for individuals acting on behalf of the government are necessary , To prevent representation D A person who acts in the government of a group of countries gains from engaging in activities that violate the national security and foreign policy interests of the United States 「 Network security project 」.

Without this requirement , It may lead to D Governments of such countries visit these projects .
BIS This requirement passed , This means that in some cases exporters must check the government affiliation of the individuals and companies they cooperate with .
However , Due to the limited scope and applicability of licensing requirements ,BIS That this requirement will protect the national security and foreign policy interests of the United States , And will not unduly affect legitimate network security activities .
meanwhile ,BIS The clause has also been amended § 740.22(c)(2)(i), This actually widens the scope of the exception .

The present terms allow for D Group of countries exporting digital products , Or export any cyber security project to the police or the judiciary D Group countries .
however ,BIS In fact, it is only intended to allow for the purpose of criminal or civil investigation or prosecution , Export digital products to D The police or judiciary of a group of countries .
so to speak , These changes reflect the expected comments .
Microsoft opposes , Invalid !
about BIS This new regulation of , The domestic technology giants in the United States are not monolithic , Microsoft, the software giant, has made clear its objection .
As early as last year , After the release of the draft for comment on this provision , Microsoft submitted its objection to this document in the comments section in the form of written comments .

Microsoft said , If individuals and entities involved in cyber security activities are restricted due to their association with the government , It will greatly suppress the ability of conventional cyber security activities currently deployed in the global cyber security market .
A lot of times , When it is impossible to determine whether the other party is related to the government , Enterprises can only give up cooperation in the face of compliance pressure .

Microsoft's opposition is not surprising .
The current vulnerability sharing mechanism , It is very important for Microsoft's software development ecosystem . A lot of times , Microsoft needs to analyze the vulnerability through reverse engineering and other technologies , To release relevant patches and upgrades , Once the vulnerability sharing mechanism is broken , It will directly reduce the speed of Microsoft's discovery and repair of vulnerabilities .
Microsoft put forward ,BIS It should be further defined 「 Government end users 」, Or at least clarify which individuals or entities may be covered under this definition .
BIS When the final decision of this regulation is issued , Mentioned Microsoft's objections , But there was no roll call , And said 「BIS Disagree with this opinion 」.
BIS Mention in the document :
「 Some companies said , Yes, it means ' Government end users ' Human limitations , It will hinder cross-border cooperation with cyber security personnel , Because before communicating with these people , To check whether it has contact with the government . The company proposes to cancel this requirement or modify it .BIS Disagree with this proposal .」
The final decision released last week , Last year 10 Compared with the draft for comments released in January , The content has not changed significantly .
however , The regulation adopts some opinions of the research community , The scope of security vulnerabilities to be verified has been further narrowed , A temporary exception clause has been added .
namely : If it is for legitimate network security purposes , Such as disclosure of public vulnerabilities or response to security incidents , No need to audit .

This exception is to a large extent to create the necessary conditions for the normal operation of the open source community .
Microsoft is thanking BIS While modifying the rules , Also said , It is uncertain whether such an exception will solve the practical problem .
「 What allows direct disclosure , What is not allowed to be disclosed directly , It is still in a state of chaos . Which behaviors require permission , At this stage, it is still uncertain . We are worried. , For those technologies that cannot be completely classified into specific use categories , Permission applications can be very cumbersome .」
BIS Acknowledge Microsoft's concerns , But at the same time insist that , This regulation has more advantages than disadvantages for the national security of the United States .
And 「 Wassenaar Arrangement 」 different approaches but equally satisfactory results
actually , As early as 2021 year 10 month ,BIS Was released 「 Prohibit the export of offensive network tools 」 The provisions of the , Prevent U.S. entities from moving toward the center 、 Russia sells offensive network tools .

U.S. Secretary of Commerce Gina · Ramondo said ,「 Implement export controls on certain cyber security projects , Is a suitable method , It can protect the national security of the United States from malicious network acts , And ensure legal network security activities .」
BIS To further express , The current rules are also 「 Wassenaar agreement 」 Within the framework of , namely 《 Wassenaar agreement on export control of conventional arms and dual-use goods and technologies 》.

《 Wassenaar agreement 》 Regulations , Member States, at their discretion, issue export licenses for dual-use items of sensitive products and technologies , And, on a voluntary basis, inform other members of the agreement of relevant information .
actually , The agreement is actually controlled by the United States to a large extent , It also affects the export control regulations of other member states , It has become an important tool for the west to implement high-tech monopoly on China .
Agreement control 「 Military and dual-use technologies 」 Export policy , share 42 Agreement countries , Including beauty 、 Britain 、 Law 、 Virtue , Japan and other major developed countries . Although Russia is also an agreement country , But it is still one of the targets of the embargo .
End
My new book 《 In depth understanding of Java The core technology 》 It's on the market , After listing, it has been ranked in Jingdong best seller list for several times , At present 6 In the discount , If you want to start, don't miss it ~ Long press the QR code to buy ~

Long press to scan code and enjoy 6 A discount
Previous recommendation These old system codes , Was it written by a pig ?
The art of code annotation , Does good code really need no comments ?
I'm stupid , A bunch of them will only “ Google ” The programmer !
If you enjoyed this article ,
Please hold on to the QR code , Focus on Hollis.

Forward to circle of friends , It was my greatest support .
Order one Looking at
Like is a feeling
Looking is a kind of support
边栏推荐
- 【报名】基础架构设计:从架构热点问题到行业变迁 | TF63
- How do I get the STW (pause) time of a GC (garbage collector)?
- In the three-tier architecture, at which layer is the database design implemented, not at the data storage layer?
- 你睡觉时大脑真在自动学习!首个人体实验证据来了:加速1-4倍重放,深度睡眠阶段效果最好...
- 我大抵是卷上瘾了,横竖睡不着!竟让一个Bug,搞我两次!
- Memory compression for win10
- 【SO官方采访】为何使用Rust的开发者如此深爱它
- 一次线上移动端报表网络连接失败问题定位与解决
- Prometheus alarm process and related time parameter description
- CPU设计(单周期和流水线)
猜你喜欢
Scientists develop two new methods to provide stronger security protection for intelligent devices

On anchors in object detection

Stop using system Currenttimemillis() takes too long to count. It's too low. Stopwatch is easy to use!

Bluetooth health management device based on stm32

【OpenCV 例程200篇】211. 绘制垂直矩形

Use aspese slides to convert PPT to PDF

Exception in Chinese character fuzzy query of MySQL database

LVI Sam summary

C# Any()和AII()方法

CPU设计(单周期和流水线)
随机推荐
TDengine 邀请函:做用技术改变世界的超级英雄,成为 TD Hero
JS array splicing "suggested collection"
Stop using system Currenttimemillis() takes too long to count. It's too low. Stopwatch is easy to use!
Evolution of software system architecture
详细记录YOLACT实例分割ncnn实现
Use aspese Cells convert Excel to PDF
C language learning day_ 04
运维一线工作常用shell脚本再整理
R语言plotly可视化:plotly可视化基础小提琴图(basic violin plot in R with plotly)
R langage plotly visualisation: visualisation de plusieurs histogrammes normalisés d'ensembles de données et ajout d'une courbe de densité KDE à l'histogramme, réglage de différents histogrammes en ut
有关WIN10的内存压缩
10 常见网站安全攻击手段及防御方法
分布式文件存储系统的优点和缺点
Error im002 when Oracle connects to MySQL
文件名设置导致writelines写入报错:OSError: [Errno 22] Invalid argument
TCP/IP 详解(第 2 版) 笔记 / 3 链路层 / 3.4 桥接器与交换机 / 3.4.1 生成树协议(Spanning Tree Protocol (STP))
How do I get the STW (pause) time of a GC (garbage collector)?
Technology is as important as business. It is wrong to favor either side
6月23日《Rust唠嗑室》第三期B站视频地址
leetcode:968. 监控二叉树【树状dp,维护每个节点子树的三个状态,非常难想权当学习,类比打家劫舍3】


