{"id":41330,"date":"2021-06-09T23:03:10","date_gmt":"2021-06-09T23:03:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/"},"modified":"2021-06-09T23:03:10","modified_gmt":"2021-06-09T23:03:10","slug":"huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/","title":{"rendered":"Huawei flings open the doors of its third privacy and security transparency centre"},"content":{"rendered":"<p>Huawei has opened another cyber security centre and, despite facing a crisis of trust in the West, has chosen to do so for the first time in its Chinese heartland.<\/p>\n<p>The company said its Global Cyber Security and Privacy Protection Transparency Center (GCSPPT) in the industrial city of Dongguan will allow regulators, independent third-party organisations and customers to gain a closer look at it wares.<\/p>\n<p>According to Huawei, the centre \u201cdemonstrates solutions, facilitates communication, joint innovation, and supports security testing and verification\u201d.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,leaderboard,mpu,\" data-lg=\",fluid,leaderboard,\" data-xlg=\",fluid,superleaderboard,billboard,leaderboard,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>In a statement, Ken Hu, Huawei\u2019s Rotating Chairman, described an urgency for the industry to collaborate on standards and governance.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>\u201cWe need to give both the general public and regulators a reason to trust in the security of the products and services they use on a daily basis. Together, we can strike the right balance between security and development in an increasingly digital world,\u201d he said.<\/p>\n<h3 class=\"crosshead\"> <span>Best practices<\/span><br \/>\n<\/h3>\n<p>Coinciding with the ribbon-cutting, Huawei also published its Product Cyber Security Baseline. The company said this twelve-page document, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www-file.huawei.com\/-\/media\/corp2020\/pdf\/trust-center\/huawei_product_security_baseline_en.pdf\">available to download online (PDF)<\/a>, represents its purported best practices when it comes to secure development.<\/p>\n<p>Although not the lengthiest of reads, the pamphlet touches on the \u201cwetware\u201d of product development, particularly when it comes to the software development life cycle and the management of development and testing teams, something Huawei has been criticised for.<\/p>\n<p>Advice includes having security requirements outlined in advance, and the use of a testing process that includes manual scans and code reviews, as well as the use of automated tools.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,leaderboard,mpu,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Perhaps timely, Huawei\u2019s security baseline includes incident response procedures, with security patching a feature of a product\u2019s long-term maintenance. Last week, securiy biz Trustwave said it had found a vulnerability in one of <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2021\/06\/02\/huawei_lte_usb_stick_vulnerability\/\" rel=\"noopener noreferrer\">Huawei&#8217;s LTE USB modems<\/a> and had tried to report this to Huawei on multiple occasions. However, <a target=\"_blank\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/huawei-lte-usb-stick-e3372-file-overwrite-to-code-execution\/\" rel=\"noopener noreferrer\">Trustwave admitted<\/a> it had not used Huawei&#8217;s correct PSIRT contact information. Huawei eventually took action and patched the weakness after <i>The Register<\/i> intervened.<\/p>\n<p>More technical topics also feature, with Huawei&#8217;s Product Cyber Security Baseline describing integrity protection, good application security hygiene and secure coding practices as essentials, among others.<\/p>\n<p>&#8220;This is the first time we&#8217;ve shared our security baseline framework with the entire industry, not just core suppliers,&#8221; said Sean Yang, director of&nbsp;Huawei&#8217;s Global Cyber Security and Privacy Protection Office.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>\u201cWe want to invite all stakeholders, including customers, regulators, standards organisations, technology providers and testing organisations, to join us in discussing and working on cyber security baselines. Together, we can continuously improve product security across the industry.&#8221;<\/p>\n<p>Casting a critical eye over the documents, it&#8217;s hard to identify anything that goes beyond what is already considered secure software development best practice.<\/p>\n<h3 class=\"crosshead\"> <span>Not Huawei&#8217;s first rodeo<\/span><br \/>\n<\/h3>\n<p>As mentioned, the GSCPPT isn&#8217;t Huawei&#8217;s first foray in opening a dedicated transparency centre.<\/p>\n<p>In 2010, following an agreement with the UK government, Huawei opened the doors to the Huawei Cyber Security&nbsp;Evaluation&nbsp;Centre (HCSEC), located in the leafy market town of Banbury, Oxfordshire.<\/p>\n<p>HCSEC allowed experts from UK spy agency GCHQ and later its tech wing, the National Cyber Security Centre, to scrutinise Huawei\u2019s telecoms kit in order to identify any potential security issues, be they deliberate or accidental. No intentional ones were ever found.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/923309\/Huawei_Cyber_Security_Evaluation_Centre__HCSEC__Oversight_Board-_annual_report_2020.pdf\">most recent report (PDF)<\/a> from the facility\u2019s oversight board said HCSEC was able to operate independently of Huawei\u2019s head office, and remained in compliance with the agreement initially set out between the telecommunications giant and Her Majesty&#8217;s Government.<\/p>\n<p>However, HCSEC <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/10\/01\/huawei_uk_security_code_review_panel\/\" rel=\"noopener noreferrer\">raised concerns about the quality of Huawei&#8217;s software development practices<\/a>, which it said brought &#8220;significantly increased risk to UK operators\u201d and required \u201congoing management and mitigation&#8221;.<\/p>\n<p>Last July, the UK Government <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/07\/14\/huawei_ban_uk\/\" rel=\"noopener noreferrer\">issued a wholesale ban against UK carriers using Huawei\u2019s 5G equipment<\/a>, and ordered networks to remove existing equipment by 2027. This move was prompted by fears surrounding Huawei&#8217;s long-term ability to source the essential semiconductors it relies on. This was itself caused by US sanctions that prevented US suppliers from selling components to Huawei, born of national security concerns about Huawei&#8217;s perceived closeness to the Chinese govenrment.<\/p>\n<p>The UK&#8217;s decision will cut Huawei from the UK\u2019s 5G ecosystem and is expected to delay the rollout of 5G services across the country by two to three years and cost \u00a32bn to rip and replace.<\/p>\n<p>Huawei also <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2019\/03\/05\/huawei_brussels_code_inspection_facility\/\" rel=\"noopener noreferrer\">operates a similar facility in Brussels<\/a>. This facility, opened in 2019, was conceived to assuage the fears of regulators across the continent.<\/p>\n<p>Although it&#8217;s hard to imagine a scenario in which this third facility based in China softens the hearts of lawmakers in the West, and the wider \u201cFive Eyes\u201d community, it may provide reassurance to unaffiliated countries, particularly those in the developing world.<\/p>\n<p>Huawei remains a viable competitor in Africa, and is providing some of the equipment <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.reuters.com\/article\/us-kenya-safaricom-idUSKBN2BI1H7\">used by Kenyan network Safaricom in its 5G network trials<\/a>, alongside Nokia.<\/p>\n<p>Safaricom, we note, is partly owned by UK network Vodafone, with the government of Kenya and South African carrier Vodacom also holding sizeable shares.<\/p>\n<p>Huawei has also begun reducing it&#8217;s dependency on carrier sales, placing greater emphasis on industrial networks, as well as software and cloud products which are inherently less susceptible to the type of supply chain disruption it has experienced in the previous two years.<\/p>\n<p>The company&#8217;s previously high-volume consumer arm is also shifting from its traditional bread-and-butter of high-end mobile handsets to devices that are less dependent on sophisticated semiconductor components.<\/p>\n<p>These include wearable devices, PCs and laptops, monitors, tablet computers (with <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2021\/06\/03\/huawei_harmonyos_2\/\" rel=\"noopener noreferrer\">much of its latest crop using 4G platforms provided by Qualcomm<\/a>). \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/06\/09\/huawei_opens_the_doors_on\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first based in China Huawei has opened another cyber security centre and, despite facing a crisis of trust in the West, has chosen to do so for the first time in its Chinese heartland.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-41330","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Huawei flings open the doors of its third privacy and security transparency centre 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Huawei flings open the doors of its third privacy and security transparency centre 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-09T23:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Huawei flings open the doors of its third privacy and security transparency centre\",\"datePublished\":\"2021-06-09T23:03:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/\"},\"wordCount\":958,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/\",\"name\":\"Huawei flings open the doors of its third privacy and security transparency centre 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-06-09T23:03:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage\",\"url\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Huawei flings open the doors of its third privacy and security transparency centre\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Huawei flings open the doors of its third privacy and security transparency centre 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/","og_locale":"en_US","og_type":"article","og_title":"Huawei flings open the doors of its third privacy and security transparency centre 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-09T23:03:10+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Huawei flings open the doors of its third privacy and security transparency centre","datePublished":"2021-06-09T23:03:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/"},"wordCount":958,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/","url":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/","name":"Huawei flings open the doors of its third privacy and security transparency centre 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2021-06-09T23:03:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YMbI2WiJUwuElQm2VwVkZAAAAIU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/huawei-flings-open-the-doors-of-its-third-privacy-and-security-transparency-centre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Huawei flings open the doors of its third privacy and security transparency centre"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41330"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41330\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}