&imwidth=800&imheight=600&format=webp&quality=medium)
During a recent summit, Chinese President Xi Jinping jokingly told South Korean President Lee Jae-myung to "check for any backdoor" on Xiaomi phones he gifted. Smartphone surveillance through such backdoors is not a joke, but a reality.
Chinese President Xi Jinping jocularly told Lee Jae-myung to "check if there’s any backdoor" on the smartphones he gifted to his South Korean counterpart. The unusual exchange was seen in some circles as a sarcastic remark on longstanding suspicions that mobile phones are used as tools of surveillance by China. But what exactly is a "backdoor"? Is it even possible to spy on cell phone users via such a method? The answers might surprise you — and no, it’s not only China that’s been accused of turning devices into digital spies. Read on to find more about the world of digital device surveillance.
During a bilateral meeting on the sidelines of the APEC Summit in Gyeongju on November 1, Xi gifted Lee Jae-myung a pair of Xiaomi smartphones. When Lee asked if the devices were secure, Xi smiled and said through an interpreter, "You should check if there’s a backdoor," drawing laughter from the leaders and delegations on both sides. The moment, light-hearted as it was, carried a subtle undertone: A wry acknowledgement of global fears that modern smartphones — mainly Chinese-made but others too— could be turned into listening posts in a new era of digital geopolitics.
In cybersecurity, a ‘backdoor’ refers to a secret method of bypassing normal authentication or encryption controls on digital devices. This would potentally allow hackers, the manufacturers or even governments, to sneak inside the system without users' permission. Once accessed, calls can be quietly intercepted. Messages and photos can be accessed. Even the camera and microphone of these devices can be turned on remotely.
Unlike a typical software bug, a backdoor is put there deliberatedly. Some of these could be for maintenance (remote-access of phones and computers) or law-enforcement access. It is nearly impossible to be sure who all can access a single phone using such backdoors. The backdoors, even when created for "good" intentions, could be used for exploitation.
In 2016, researchers found pre-installed software in some budget Android phones made in China. They were allegedly transmitting user data secretly to servers in China. Huawei and Xiaomi have often faced such allegations, but both have repeatedly denied building surveillance features into their devices. In their defence, these Chinese companies had pointed the fingers at rogue app developers or firmware vendors.
China, however, is not the only country alleged to have used backdoors on digital devices. In the US, the "Clipper chip" sought to give the government a built-in key to encrypted phones. This was cancelled due to public backlash. The Edward Snowden leaks revealed that the US intelligence agencies like NSA, could infiltrate smartphones by intercepting them in transit and implanting spy firmware.
The Israeli firm NSO Group’s Pegasus spyware created invisible backdoors on iPhones and Android devices. This controversial product, sold commercially, could allow governments worldwide to monitor journalists and activists. Russia reportedly deployed malware that could hijack soldiers’ smartphones in conflict zones.
While no nation publicly admits to planting consumer backdoors, nearly every major power has used digital tools to watch, listen, and gather intelligence. As cellular networks grow smarter and more connected, the line between convenience and surveillance is thinning out .
Xi’s quip to Lee may have been a joke, but it echoed a deeper truth that trust in technology is as fragile as the code it runs on. Checking if your device has a backdoor is not always possible. But it's not just a matter of paranoia anymore: it’s an aspect of digital self-defence.
Checking for a backdoor isn’t paranoia anymore; it’s digital self-defense.