current location:news > news > text
The Ministry of National Security reminds: It is strictly forbidden to use smart wearable devices in confidential places
2025-05-17 source:Ministry of National

In today's digital age, smart wearable devices such as smart watches, smart bracelets, and smart glasses are rapidly popularizing in the society with their convenience and functional diversity. They can not only record health data and provide navigation services, but also realize remote communication and information push. But behind these convenient functions, there is a certain risk of leakage, which we need to prevent.

——The hidden danger of leaking secrets in multi-dimensional records. Smart wearable devices usually have a built-in camera and microphone and have their own positioning function, which can obtain user's fingerprint, iris, facial information and other biological characteristics, and can record user's pulse, blood pressure and other health data, user's behavior status and activity trajectory in real time, and provide users with accurate portraits of people. If such data is accidentally leaked, it may cause security problems.

——A cloud black hole associated with data. Smart wearable devices may be associated with various applications such as social software and payment software during use, and the relevant data will be automatically synchronized to the cloud server. However, cloud storage has certain limitations in the field of security and confidentiality. Once the account is cracked or the service provider has system vulnerabilities, or it is attacked by overseas spy intelligence agencies, it may lead to the leakage of information stored in the cloud or malicious use.

——The "Trojan Horse" that is not easy to detect. Compared with other smart terminals, some smart wearable device systems are relatively incomplete. There are reports that some smart wearable devices have illegal access to permissions by third-party programs and lagging system updates. If hackers use such security vulnerabilities to implant Trojan programs, it may lead to security issues such as illegal collection of data, personal privacy leaks, and remote control of devices.

——The "data wormhole" that spans physical isolation. Smart wearable devices are usually connected to mobile phones or other devices through Bluetooth, Wi-Fi, etc. Some devices have the "administrative networking" feature, which can realize multi-terminal interconnection without a base station, forming an independent communication network, and bypass the physical isolation barrier of confidential networks. If a hacker forms a temporary LAN through smart wearable devices implanted with Trojans and passes the information data of other devices to external devices step by step via Bluetooth, it may cause a hidden danger of leakage.

Build a three-dimensional security line of smart wearable devices

A watch and a bracelet may be the "first gate" to protect national security. While we enjoy the convenience of technology, we must also protect personal privacy and state secrets, beware of the loss of secrets of smart wearable devices, and jointly protect national security in the intelligent era.

——Planning for the use of restricted areas. It is strictly forbidden to use smart wearable devices in confidential places, and it is prohibited to connect smart wearable devices to confidential information systems. It is recommended to set up warning signs at the entrances and office areas of confidential places, etc., and equipped with a special electromagnetic isolation safe box to centrally store electronic equipment of people entering confidential places to avoid hidden dangers of leakage from the source.

——Strengthen self-use management. Users should choose formal channels to purchase products and update the equipment's systems and applications in a timely manner; set device permissions reasonably, authorize third-party applications with caution, turn off non-essential functions such as location sharing and microphones; do not store sensitive information, beware of unfamiliar links and suspicious applications, try to avoid connecting to public networks, and regularly perform anti-virus and data inspection of the equipment.

Everyone is responsible for national security. If citizens find suspected cyber espionage during the purchase and use of smart wearable devices, please promptly report to the local national security organ through the 12339 national security organ reporting acceptance telephone number, the online reporting platform (www.12339.gov.cn), and the WeChat official account of the Ministry of Security, or directly report to the local national security organs.

Unified Service Email:chinanewsonline@yeah.net
Copyright@ www.china-news-online.com