当前位置:网站首页>If you find any loopholes later, don't tell China!
If you find any loopholes later, don't tell China!
2022-06-27 10:12:00 【Hollis Chuang】
source : The new intellectual yuan
See a piece of news , Involving the network security industry , Share it with you .
In recent days, , Department of Commerce, bureau of industry and security (BIS) The latest export control regulations in the field of network security have been officially released .
Yes , That's the release 「 List of entities 」、「 Trade blacklist 」 Of BIS! Speaking of these years , It's kind of 「 An old friend of Chinese netizens 」 了 .
What is this time ? It is mainly about the control of network security and vulnerability information .
Simply speaking , That is, when U.S. entities cooperate with organizations and individuals related to the Chinese government , If security vulnerabilities and information are found , It cannot be published directly , It should be reviewed by the Ministry of Commerce first .
The reason , It's not good to try again 「 National security 」, as well as 「 Counter terrorism needs 」.

actually , The new regulations announced this time are 2021 year 10 Provisional Regulations for the month of ( Solicitation draft ) The final confirmation of . This provision divides the global countries into A、B、D、E Four types of , The restrictive measures and strictness are gradually increasing .
China is divided into D class , namely 「 Restricted countries and regions 」,E Class is 「 Comprehensive embargo countries 」.
This Regulation establishes a new control method for some network security projects , The purpose is to 「 National security and counter-terrorism considerations 」.
meanwhile ,BIS A new exception to authorize cyber security exits has also been added . The core content is to authorize these network security projects to export to most destinations , However, the exceptions mentioned above are not allowed .
BIS Think , These controlled items may be used to monitor 、 Espionage , Or other acts aimed at destruction, etc .
Besides , The regulation also amended the export control classification number in the commercial control list .

BIS The new rules divide the world into A、B、D、E Four types of , among D Class is the most concerned 、 Restricted countries and regions .
As shown in the figure above , China is divided into D In class .
According to the requirements of the new regulations , Each entity is associated with D When relevant government departments or individuals of countries and regions like China cooperate , You must apply in advance , After obtaining permission, potential network vulnerability information can be sent across the border .
Of course , There are exceptions to the clause , If for legitimate network security purposes , Such as public disclosure of vulnerabilities or incident response , No need to apply in advance .
You can see , China is in national security 、 biochemical 、 Missile technology 、 All four items of the US arms embargo have been drawn ×.
The document states , Permission requirements for individuals acting on behalf of the government are necessary , To prevent representation D A person who acts in the government of a group of countries gains from engaging in activities that violate the national security and foreign policy interests of the United States 「 Network security project 」.

Without this requirement , It may lead to D Governments of such countries visit these projects .
BIS This requirement passed , This means that in some cases exporters must check the government affiliation of the individuals and companies they cooperate with .
However , Due to the limited scope and applicability of licensing requirements ,BIS That this requirement will protect the national security and foreign policy interests of the United States , And will not unduly affect legitimate network security activities .
meanwhile ,BIS The clause has also been amended § 740.22(c)(2)(i), This actually widens the scope of the exception .

The present terms allow for D Group of countries exporting digital products , Or export any cyber security project to the police or the judiciary D Group countries .
however ,BIS In fact, it is only intended to allow for the purpose of criminal or civil investigation or prosecution , Export digital products to D The police or judiciary of a group of countries .
so to speak , These changes reflect the expected comments .
Microsoft opposes , Invalid !
about BIS This new regulation of , The domestic technology giants in the United States are not monolithic , Microsoft, the software giant, has made clear its objection .
As early as last year , After the release of the draft for comment on this provision , Microsoft submitted its objection to this document in the comments section in the form of written comments .

Microsoft said , If individuals and entities involved in cyber security activities are restricted due to their association with the government , It will greatly suppress the ability of conventional cyber security activities currently deployed in the global cyber security market .
A lot of times , When it is impossible to determine whether the other party is related to the government , Enterprises can only give up cooperation in the face of compliance pressure .

Microsoft's opposition is not surprising .
The current vulnerability sharing mechanism , It is very important for Microsoft's software development ecosystem . A lot of times , Microsoft needs to analyze the vulnerability through reverse engineering and other technologies , To release relevant patches and upgrades , Once the vulnerability sharing mechanism is broken , It will directly reduce the speed of Microsoft's discovery and repair of vulnerabilities .
Microsoft put forward ,BIS It should be further defined 「 Government end users 」, Or at least clarify which individuals or entities may be covered under this definition .
BIS When the final decision of this regulation is issued , Mentioned Microsoft's objections , But there was no roll call , And said 「BIS Disagree with this opinion 」.
BIS Mention in the document :
「 Some companies said , Yes, it means ' Government end users ' Human limitations , It will hinder cross-border cooperation with cyber security personnel , Because before communicating with these people , To check whether it has contact with the government . The company proposes to cancel this requirement or modify it .BIS Disagree with this proposal .」
The final decision released last week , Last year 10 Compared with the draft for comments released in January , The content has not changed significantly .
however , The regulation adopts some opinions of the research community , The scope of security vulnerabilities to be verified has been further narrowed , A temporary exception clause has been added .
namely : If it is for legitimate network security purposes , Such as disclosure of public vulnerabilities or response to security incidents , No need to audit .

This exception is to a large extent to create the necessary conditions for the normal operation of the open source community .
Microsoft is thanking BIS While modifying the rules , Also said , It is uncertain whether such an exception will solve the practical problem .
「 What allows direct disclosure , What is not allowed to be disclosed directly , It is still in a state of chaos . Which behaviors require permission , At this stage, it is still uncertain . We are worried. , For those technologies that cannot be completely classified into specific use categories , Permission applications can be very cumbersome .」
BIS Acknowledge Microsoft's concerns , But at the same time insist that , This regulation has more advantages than disadvantages for the national security of the United States .
And 「 Wassenaar Arrangement 」 different approaches but equally satisfactory results
actually , As early as 2021 year 10 month ,BIS Was released 「 Prohibit the export of offensive network tools 」 The provisions of the , Prevent U.S. entities from moving toward the center 、 Russia sells offensive network tools .

U.S. Secretary of Commerce Gina · Ramondo said ,「 Implement export controls on certain cyber security projects , Is a suitable method , It can protect the national security of the United States from malicious network acts , And ensure legal network security activities .」
BIS To further express , The current rules are also 「 Wassenaar agreement 」 Within the framework of , namely 《 Wassenaar agreement on export control of conventional arms and dual-use goods and technologies 》.

《 Wassenaar agreement 》 Regulations , Member States, at their discretion, issue export licenses for dual-use items of sensitive products and technologies , And, on a voluntary basis, inform other members of the agreement of relevant information .
actually , The agreement is actually controlled by the United States to a large extent , It also affects the export control regulations of other member states , It has become an important tool for the west to implement high-tech monopoly on China .
Agreement control 「 Military and dual-use technologies 」 Export policy , share 42 Agreement countries , Including beauty 、 Britain 、 Law 、 Virtue , Japan and other major developed countries . Although Russia is also an agreement country , But it is still one of the targets of the embargo .
End
My new book 《 In depth understanding of Java The core technology 》 It's on the market , After listing, it has been ranked in Jingdong best seller list for several times , At present 6 In the discount , If you want to start, don't miss it ~ Long press the QR code to buy ~

Long press to scan code and enjoy 6 A discount
Previous recommendation These old system codes , Was it written by a pig ?
The art of code annotation , Does good code really need no comments ?
I'm stupid , A bunch of them will only “ Google ” The programmer !
If you enjoyed this article ,
Please hold on to the QR code , Focus on Hollis.

Forward to circle of friends , It was my greatest support .
Order one Looking at
Like is a feeling
Looking is a kind of support
边栏推荐
- 多线程实现 重写run(),怎么注入使用mapper文件操作数据库
- 强化学习中好奇心机制
- The R language uses the preprocess function of the caret package for data preprocessing: Center all data columns (subtract the average value from each data column), and set the method parameter to cen
- How do I get the STW (pause) time of a GC (garbage collector)?
- TDengine 邀请函:做用技术改变世界的超级英雄,成为 TD Hero
- 使用Aspose.cells将Excel转成PDF
- Cross cluster deployment of helm applications using karmada [cloud native open source]
- leetcode:522. 最长特殊序列 II【贪心 + 子序列判断】
- Ubuntu手动安装MySQL
- 产品力对标海豹/Model 3,长安深蓝SL03预售17.98万起
猜你喜欢

反编译jar包,修改后重新编译为jar包

TCP/IP 详解(第 2 版) 笔记 / 3 链路层 / 3.4 桥接器与交换机 / 3.4.1 生成树协议(Spanning Tree Protocol (STP))
Scientists develop two new methods to provide stronger security protection for intelligent devices

Stop using system Currenttimemillis() takes too long to count. It's too low. Stopwatch is easy to use!

QT运行显示 This application failed to start because it could not find or load the Qt platform plugin

C any() and aii() methods

Comparison between new and old interfaces

感应电机直接转矩控制系统的设计与仿真(运动控制matlab/simulink)

Oracle trigger stored procedure writes at the same time

新旧两个界面对比
随机推荐
unity--newtonsoft. JSON parsing
Decompile the jar package and recompile it into a jar package after modification
[200 opencv routines] 211 Draw vertical rectangle
一次线上移动端报表网络连接失败问题定位与解决
C language learning day_ 06
运维一线工作常用shell脚本再整理
CPU design (single cycle and pipeline)
片刻喘息,美国电子烟巨头禁令推迟,可暂时继续在美销售产品
R语言使用caret包的preProcess函数进行数据预处理:对所有的数据列进行center中心化(每个数据列减去平均值)、设置method参数为center
C# Any()和AII()方法
leetcode:522. Longest special sequence II [greed + subsequence judgment]
前馈-反馈控制系统设计(过程控制课程设计matlab/simulink)
使用Aspose.cells将Excel转成PDF
Product strength benchmarking seal /model 3, with 179800 pre-sales of Chang'an dark blue sl03
audiotrack与audioflinger
闭包的常见问题
I'm almost addicted to it. I can't sleep! Let a bug fuck me twice!
【HCIE-RS复习思维导图】- STP
Tdengine invitation: be a superhero who uses technology to change the world and become TD hero
Technology is as important as business. It is wrong to favor either side


