Temu criticized by analysts
“Various organizations have expressed concerns about Temu’s cybersecurity, but mostly without providing evidence. As the application is very widely used and the NTC tests what is not otherwise tested, it has taken the “initiative to examine the application, as he had already done for TikTok”, explains Annalena Tosi, spokesperson for the NTC, to the Swiss media Time. In a press release, the institute states that the conclusions of this analysis are in common sense: “precautions are necessary”.
‘I think I’m about to lose my family and my business’: Temu sellers on the brink
gullThe application is subject to Chinese legislation which, from a European point of view, is considered insufficient for data protection.”
The Swiss National Cybersecurity Testing Institute affirms that a concrete element raises great concerns. In short, Temu has dynamic code reloading. This means that the application can modify itself without going through an update. “It can thus modify its operation autonomously. Developers can adapt functions and content flexibly, without updates from mobile app libraries (App Store for Apple or Play Store for Android), i.e. without users having to launch them or approve them”, describes NTC.
The institute also adds that the application has several layers of suspicious encryptions. “Certainly, they can enhance data protection, but they are also likely to be used to hide unwanted data exchanges,” he explains. Temu, owned by the Chinese company PDD Holdings Inc., can thus collect user data to transmit it to the Chinese government. “The application is subject to Chinese legislation which, from a European point of view, is considered insufficient for data protection. Businesses and authorities should take this into account when using the app. complete NTC.
Five million products banned on Temu? The SNI sounds the alert: “It’s time to send a strong signal”
Despite these elements, the independent institute did not find “evidence of unauthorized surveillance and critical security risks.” But it advises users to use the app “with a critical eye”. Also, it is strongly recommended to opt for “alternative use via an internet browser to reduce the attack surface”without using the mobile application therefore. And if you still want to use the application, it is advisable to perform “regular operating system updates”as well as “limit the permissions granted to the application”.