Some people my server admin uncle included believe that bringing any device to China automatically compromises it even if you reinstall a new OS. Is this warranted as some random person?

Can I go to my public sites and/or VPN into my servers?

Edit: I go there all the time. Also, I can take these precautions but I can’t expect my family to take them. What about family members phones?

A lot of great replies, thank you! Would love the read more specifics so I can know exactly the threats and my actions

Also, this is not an anti-China post. My field is Chinese related. Just learning more about the hosting side :)

  • Moonrise2473@feddit.it
    link
    fedilink
    English
    arrow-up
    1
    ·
    10 minutes ago

    When you enter China, you have to run their application on your phone to fill the immigration form. Way more convenient compared to the paper slip, right? 😉

    It’s this https://apkpure.com/zhong-guo-ling-shi/com.gov.mfa

    Luckily, you don’t need to install full malware but only medium malware, there’s a way to run it as a web app inside tencent WeChat by scanning a special qr code.

    I run this stuff inside insular because tencent is tencent and even on fully patched Android 15 without any file access permission they still manage to drop fingerprinting files disguised as images in /pictures/.gs_fs0

    For connecting to my servers, technically ssh on standard ports isn’t blocked (otherwise it would hurt their bots, no?) but I don’t want to show my server IP address, so I use a hysteria2 proxy hosted on a Oracle VM in the Japan datacenter. There are services like doggygo that rent access to those proxys for literal pennies (like $2 per month) but payment need to do with alibaba’s alipay or tencent wepay which is ultra traceable (linked to Chinese id+Chinese bank account+Chinese phone number) and very stupid. Honeypot?

    There are reports of evil maid attacks where a secret service agent poses as room cleaner in your hotel room and tampers with your laptop when you’re away, but for normal people this seems unlikely. Keep your electronics with you at all times, always use a VPN, check hashes of executables if really need to run them (better not) and you’re going to be ok

  • neatchee@lemmy.world
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    2
    ·
    edit-2
    9 hours ago

    Do not bring your normal personal devices to China. They are notorious for injecting spyware on foreign devices at every opportunity. Use a freshly formatted device and create all new accounts to use with it.

    Regarding services: do not use self-hosted services unless you you spin up fresh, isolated instances of your services for use while abroad and spin them down afterwards, including formatting any OS they were hosted on.

    Regarding VPN: because we are assuming that any device used in China is compromised, do not connect to your VPN unless you have set up a segregated VLAN and are connecting through a VPN server instance created specifically for use while in China.

    Basically, assume anything you use in China is compromised. And assume your connections are being monitored. And assume that any device you are connecting to from China is at risk of being compromised. So everything needs to be segregated from the rest of your network and set up specifically to be deleted after you’re back home.

    • ComradeMiao@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      8 hours ago

      Do you have any links to read more about this? Thanks for a very detailed response.

      Is there anyway to bring my phone and laptop without this risk? I can totally format my laptop completely but can’t do that with my phone.

      • neatchee@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        7 hours ago

        Unfortunately, no, not really. They are absolutely able and willing to confiscate your devices at any time once you’re on Chinese soil, and once you’ve lost physical control, that’s the end of trust for that device. Even beyond that, it’s not unheard of for there to be vulnerabilities in Wi-Fi, Bluetooth, etc that make your device susceptible to wireless attacks. IMO it’s not worth the risk.

        Here is just one example of this type of thing uncovered by The Guardian, New York Times, and others in a joint investigation: https://www.theguardian.com/world/2019/jul/02/chinese-border-guards-surveillance-app-tourists-phones

        • AustralianSimon@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          21 minutes ago

          I know both Australia and UK have laws that allow border to take and copy your phones, laptops and storage devices. It’s not unusual.

  • NeoNachtwaechter@lemmy.world
    link
    fedilink
    English
    arrow-up
    22
    ·
    11 hours ago

    Can I go to my public sites

    I would not recommend. Remember, wherever you step, your feet are leaving traces. Your public sites may be a little too publicly well-known afterwards.

    and/or VPN into my servers?

    VPN’s might not work from there, or the use may be considered a crime.

  • schizo@forum.uncomfortable.business
    link
    fedilink
    English
    arrow-up
    19
    ·
    11 hours ago

    If your device is out of your sight, then yeah, you should probably assume it’s compromised.

    Of course, that’s hardly JUST China doing funky shit with your devices, but depending where you’re calling home, odds are customs/immigration when you head home will try to do the exact same thing, too.

    And the answer to everything is yes, always use a VPN if you don’t trust the network and you should never trust the network.