Huawei Will Sell Its 5G Know-How

Huawei's chief executive has proposed selling its current 5G know-how to a Western firm as a way to address security concerns voiced by the US and others about its business. 

Ren Zhengfei (pictured) said the buyer would be free to "change the software code" according to the BBC. That would allow any flaws or supposed backdoors to be addressed without Huawei's involvement. 

The US and Australia have banned their networks from using Huawei's equipment. The UK is still weighing a decision.
Huawei has repeatedly denied claims that it would help the Chinese government spy on or disrupt other countries' telecoms systems, and says it is a private enterprise owned by its workers. 

Huawei’s claim that it is 99% owned by its staff is not reassuring, as they are in fact owned by the trade union committee of Huawei.  Since all trade unions in China are under the All-China Federation of Trade Unions, which is under the supervision of the Communist Party

One expert, who has doubted Huawei’s independence, said the idea of it helping another country's business to compete represented an "extraordinary offer".

"Perhaps the explanation is that Huawei recognises that it is unlikely to be able to bypass the efforts the Trump administration is putting into minimising its scope to operate in North America, Western Europe and Australasia," said Prof Steve Tsang from the University of London.

Seeking Balance 
Huawei's founder Ren Zhengfei made the proposal in interviews with the Economist and the New York Times.
It would include ongoing access to the firm's existing 5G patents, licences, code, technical blueprints and production engineering knowledge. 

According to the New york Times, Huawei is open to sharing our 5G technologies and techniques with US companies, so that they can build up its own 5G industry, creating a more a balanced situation between China, the US and Europe. A spokesman for Huawei has confirmed the quotes are accurate and the idea represents a "genuine proposal".

At present, Europe's Nokia and Ericsson are the main alternatives to Huawei when it comes to networks selecting what 5G cell tower base stations and other equipment to install. South Korea's Samsung and China's ZTE are other alternatives. 

But while American firms including Cisco, Dell EMC and Hewlett Packard Enterprise have developed 5G-related technologies, the US lacks an infrastructure-equipment specialist of its own.

Beyond the licensing fee, Huawei could benefit because it might convince Washington to drop restrictions that currently prevent it buying US-linked technologies for its own use. One consequence of this is that Huawei faces having to launch an Android smartphone later this month that will not offer Google apps. 

A deal would also help ensure Huawei gets its 5G technologies widely adopted.
For instance, 5G supports two different coding techniques for data transmission to help tackle interference. Huawei has developed a technique called "polar codes", which it says will give 5G devices longer battery life than an alternative favoured by many Western firms called "low density parity check". If polar codes are widely adopted, Huawei will earn more patent fees from device-makers that support them.

Intelligence law
Some commentataors have suggested Ren's proposal is doomed to fail. "Huawei misunderstands the underlying problem," Hosuk Lee-Makiyama, from the European Centre for International Political Economy, told the BBC.

"The issue is not the trustworthiness of Huawei as a vendor but the legal obligations that the Chinese government imposes on it.....China's National Intelligence Law requires Chinese businesses and citizens to surrender any data or 'communication tools' they may have access to, under strict punitive sanctions.....Any equipment or software that Huawei licenses to an US entity would still fall under this obligation, and there is no way that the licensing entity or the intelligence agencies could scrutinise millions of lines of code for potential backdoors."

Even if Huawei's offer is ultimately rejected, he explained, it demonstrates that the company is willing to go to remarkable lengths to try and win the trust of its critics.

BBC:         New York Times:

You Might Also Read:

Who’s Afraid Of Huawei?:

5G Needs A New Generation Of Security:

 

« Old Magecart Domains Come Back To Life
Organised Social Media Manipulation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.