This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy
Telecom systems have access points built-in, by necessity
People misuse the term backdoor a lot. This short video tutorial walks you through the ins and outs of vulnerabilities and backdoors.
The first type of "backdoor" is actually a front door called Lawful Interception. As the name implies, these are legal doors for governments to intercept network communications. In most countries, operators are legally required to install these doors in their networks.
This second type of door is more like a workman’s entrance. It's used to set up, maintain, upgrade and repair the network – like a service door. When a network needs maintenance, the operators give equipment vendors like Huawei special one-time, limited access to the service door. This is only done with the permission of the operator, under very strict oversight.
The third type of backdoor is a network vulnerability – installed either on purpose or by accident – that can be exploited by bad actors. Huawei never has, and never would, install a vulnerability into its products on purpose.