
This article is more than 1 year old
New twist in China Apple hardware ban riddle: THE TRUTH at last?
President Xi Jinping's government breaks silence
Chinese officials are denying reports that the state has banned the purchase of Apple hardware for government IT projects.
The Middle Kingdom's bureaucrats told Reuters that Apple computers and gadgets are not on its list of approved products – but not because the Communist nation blacklisted Cupertino over security concerns.
Rather, the government claims, Apple had not applied to be on its list of approved hardware – and in this case, a list of energy-efficient tech. Companies that have been approved for the list include Lenovo, Dell and HP.
Even without the approval, however, state officials are still allowed to buy and run Apple products, according to the report.
The statements are at odds with earlier claims that Apple was struck from an official procurement list and, as such, employees of state-controlled agencies would no longer be allowed to purchase and use iPad or MacBook hardware for official business.
Even if these latest reports prove true, all is not well between Beijing and Apple.
Apple has had a rough go with Chinese officials as of late, facing criticism in China for security concerns posed by the iPhone and the firm has been tied up in legal wrangling with the country's patent office over its Siri service.
Apple is not the only US tech giant at odds with China. Microsoft faces antitrust proceedings as investigators are looking into whether the company illegally bundled its products with copies of Windows. ®
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- AirTag
- Apple M1
- Application Delivery Controller
- App stores
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- China Mobile
- China telecom
- China Unicom
- Common Vulnerability Scoring System
- Competition and Markets Authority
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Cyberspace Administration of China
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Great Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- Hong Kong
- iCloud
- Identity Theft
- iMac
- Incident response
- Infosec
- Internet Explorer
- iOS
- iPad
- iPhone
- iPod
- iTunes
- JD.com
- Kenna Security
- Mac
- MacBook
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Patch Tuesday
- Phishing
- Pluton
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- Safari
- Semiconductor Manufacturing International Corporation
- SharePoint
- Shenzhen
- Siri
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- Tim Cook
- TLS
- Trojan
- Trusted Platform Module
- Uyghur Muslims
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust
Broader topics
More about
Narrower topics
- 2FA
- Active Directory
- Advanced persistent threat
- AirTag
- Apple M1
- Application Delivery Controller
- App stores
- Authentication
- Azure
- BEC
- Bing
- Black Hat
- BSides
- BSoD
- Bug Bounty
- CHERI
- China Mobile
- China telecom
- China Unicom
- Common Vulnerability Scoring System
- Competition and Markets Authority
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Cyberspace Administration of China
- Data Breach
- Data Protection
- Data Theft
- DDoS
- DEF CON
- Digital certificate
- Encryption
- Excel
- Exchange Server
- Exploit
- Firewall
- Great Firewall
- Hacker
- Hacking
- Hacktivism
- HoloLens
- Hong Kong
- iCloud
- Identity Theft
- iMac
- Incident response
- Infosec
- Internet Explorer
- iOS
- iPad
- iPhone
- iPod
- iTunes
- JD.com
- Kenna Security
- Mac
- MacBook
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Ignite
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSAM
- NCSC
- .NET
- Office 365
- OS/2
- Outlook
- Palo Alto Networks
- Password
- Patch Tuesday
- Phishing
- Pluton
- Quantum key distribution
- Ransomware
- Remote Access Trojan
- REvil
- RSA Conference
- Safari
- Semiconductor Manufacturing International Corporation
- SharePoint
- Shenzhen
- Siri
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- Tim Cook
- TLS
- Trojan
- Trusted Platform Module
- Uyghur Muslims
- Visual Studio
- Visual Studio Code
- Vulnerability
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows Subsystem for Linux
- Windows XP
- Xbox
- Xbox 360
- Zero trust