Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

North Korea unveils ‘Secure, Homemade’ Smartphone

SEOUL – North Korea, one of the most isolated and censored societies on the planet, has unveiled what it says is a domestically-produced smartphone.

Industry analysts say the “Arirang”, built around Google’s Android OS, is likely manufactured in neighboring China, however.

SEOUL – North Korea, one of the most isolated and censored societies on the planet, has unveiled what it says is a domestically-produced smartphone.

Industry analysts say the “Arirang”, built around Google’s Android OS, is likely manufactured in neighboring China, however.

The existence of the phone, named after a famous Korean folk song, came to light during a factory inspection by North Korean leader Kim Jong-Un at the weekend.

During the tour, Kim was given a detailed briefing on the “performance, quality and packing of the Arirang hand phone,” Pyongyang’s official Korean Central News Agency (KCNA) reported.

Some analysts suggest the “Arirang” is aimed at getting North Koreans to use an officially-approved phone that can be properly monitored.

While Internet access is virtually non-existent in North Korea, which comes bottom of any media freedom survey, the country is not a complete IT desert.

Cell phones were introduced in 2008 through a joint venture with the Egyptian telecom firm Orascom, which says there are now two million users in North Korea.

A domestic Intranet was launched in 2002 and some state bodies have their own websites.

Advertisement. Scroll to continue reading.

It is a natural progression for an impoverished country desperate for investment, but in North Korea the economic imperative is always weighed against the potential for social disruption.

Subscribers to the sole cell phone system provider, Koryolink, can call each other, but not outside the country.

The Intranet is similarly cut off from the rest of the world, allowing its very limited number of users to exchange state-approved information.

Access to the full-blown Internet is for the super-elite only, meaning a few hundred people or maybe 1,000 at most.

For all the regime’s efforts, the information barrier erected around North Korea has, in recent years, begun to lose some of its prophylactic power.

Smuggled Chinese mobile phones allow people near the border to connect with Chinese servers and make international calls, while re-wired TVs allow access to outside broadcasting.

The KCNA report on Kim’s factory visit noted that the young leader praised the “Arirang’s” developers for coming up with a product that “provides the best convenience to the users while strictly guaranteeing security”.

KCNA photos of the factory visit show workers with the finished phones, inspecting, testing and packing them. There are no pictures of an actual assembly line.

“Despite KCNA’s reporting that the handsets are made at the factory, they are probably made to order by a Chinese manufacturer and shipped to the factory where they are inspected before going on sale,” said Martyn Williams, who runs the North Korea Tech website.

Steven Millward on the Tech In Asia website reached the same conclusion.

“Possibly, the whole smartphone is made in China, and only the final boxing is done in the rather sparse plant that Kim Jong-Un toured,” Millward said.

In February, a picture of Kim Jong-Un with a smartphone triggered fevered speculation about which brand was favoured by the leader of one of the world’s most repressive nations.

After ruling out an Apple iPhone or a Galaxy from South Korea’s Samsung, the consensus was an HTC phone made in Taiwan.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Cyberwarfare

Ask any three people to define cyberwar and you will get three different answers. But as global geopolitics worsen and aggressive cyberattacks increase, this...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...