Yesterday I did a thread on how Huawei is trying to manipulate Belgian policy audiences with a fake online ecosystem ahead of a key 5G decision. (https://t.co/ViIp7X5KsN) Huawei did not take kindly to my research.

Mike Bai, the "President of Strategy Marketing Western Europe" for Huawei doubled down and tagged me and the organisations listed in my profile in a promoted (!) tweet. It's still doing the rounds now.
But who is Mike Bai? An analysis of his Twitter account by Botometer rates him a dubious 2.2/5 (by comparison, I rate 0.4, where 0 is best). @villaraco points out that he gained 800K followers in 9 months: https://t.co/YfoVaVNq2y
Bai's sudden and massive online presence for Huawei started at the exact same time as the fake ecosystem of blogs and websites started being built, in March 2020. I can find no job history for him pre-Huawei, starting in March of this year.
I did find another (?) Mike Bai. The other Mike Bai authored a blog that posts Chinese state propaganda about things like the Covid-19 outbreak not originating in China. I won't link to the blog as not 100% sure it's same person, but here's a screenshot of part of the text.
Finally, last night Bai sent me a link to a website suggesting corruption is at play in Belgium's 5G decision to exclude Huawei from its networks. https://t.co/fx3oH9EsoJ
A quick look at the contact page of "https://t.co/Vp6im1mK9N" reveals a street address that according to Google Maps doesn't exist: "Crescent de l'Europe". Dwire is another key part of the fake ecosystem, a https://t.co/sm6Xz4RfQM audit suggests.
Belgian magazine Knack has now picked up the full story: https://t.co/IuRndrY5PI
And as @ArbiterOfTweets points out, it seems I wasn't the first to spot and analyse the fake campaign. @bickylover was first! https://t.co/urjLPMKFR0

More from Crime

My students @maxzks and Tushar Jois spent most of the summer going through every piece of public documentation, forensics report, and legal document we could find to figure out how police were “breaking phone encryption”. 1/


This was prompted by a claim from someone knowledgeable, who claimed that forensics companies no longer had the ability to break the Apple Secure Enclave Processor, which would make it very hard to crack the password of a locked, recent iPhone. 2/

We wrote an enormous report about what we found, which we’ll release after the holidays. The TL;DR is kind of depressing:

Authorities don’t need to break phone encryption in most cases, because modern phone encryption sort of sucks. 3/

I’ll focus on Apple here but Android is very similar. The top-level is that, to break encryption on an Apple phone you need to get the encryption keys. Since these are derived from the user’s passcode, you either need to guess that — or you need the user to have entered it. 4/

Guessing the password is hard on recent iPhones because there’s (at most) a 10-guess limit enforced by the Secure Enclave Processor (SEP). There’s good evidence that at one point in 2018 a company called GrayKey had a SEP exploit that did this for the X. See photo. 5/

You May Also Like