The French weekly Observer website published an article titled How the Chinese Communist Party tapped the Iphones of Uyghurs. The article says that the Beijing government offered a $200,000 reward for secretly organizing a hacking contest whose goal was how to open a tap-viewing gap in Iphone phones, and the contest eventually paid off.
In November 2018, a Chinese Communist hacker managed to find out how to intercept information from Iphone phones from a distance. A few months ago, U.S. security services informed Apple Group of the above information. An article published by MIT Technology on May 6 details the above process, however, the article does not reveal the means through which the Chinese Communist hacker opened the gap.
The article commented that since 2018, CCP hackers have stopped participating in the annual international hacking competition held in Vancouver, Canada, which is a side event of the International Computer Security Conference, and it is clear that Beijing believes that the CCP hackers’ findings should be used by the CCP’s security services.
Beijing began holding a CCP hacking competition called the Tianfu Cup in 2018, and one hacker won the first Tianfu Cup prize for breaking the information gap in an Iphone. He called his discovery a kernel vulnerability (Chaos), and the Chinese media called his discovery “the perfect remote jailbreak for the iPhone,” but two months later, the Apple Group quietly closed the loophole. During this two-month period, it was possible for the Chinese security services to monitor all Iphone phones, especially those of Uyghurs. Research by the U.S. government, as well as Google Group, shows that the above findings by Chinese Communist hackers provided substantial assistance to the Beijing government in its mass surveillance of Uyghurs.