Vital Details Regarding the US Prohibition on Routers Manufactured Abroad

Vital Details Regarding the US Prohibition on Routers Manufactured Abroad

In March, the Federal Communications Commission prohibited the introduction of new consumer internet routers manufactured outside the US, referencing national security issues. Current routers in American residences or presently available for purchase remain unaffected, but all newly crafted consumer routers require approval. Manufacturers can seek exceptions, and some have been authorized, meaning there’s no necessity to dispose of your existing router, and numerous mesh systems are still purchasable in stores.

Updated May 2026: Further details on software and component modifications, the inclusion of mobile hotspots in the ban, and Conditional Approval granted to certain firms are provided.

Why Are Routers Made Abroad Prohibited?

The FCC indicated that malicious entities have taken advantage of security vulnerabilities in routers made abroad to target American households, disrupt networks, facilitate espionage, and promote intellectual property infringement. Routers that are foreign-made played a role in the Volt, Flax, and Salt Typhoon cyberattacks, which focused on crucial US infrastructure. These routers are included on the Covered List, representing an unacceptable threat to US national security. As noted by Bogdan Botezatu, director of Threat Research at Bitdefender, the prohibition aims to bolster cybersecurity in US homes amidst geopolitical tensions, emphasizing that consumer routers represent a strategic risk if compromised on a broad scale. He states that Internet of Things devices, including routers, are a vulnerability across the internet.

Which Routers Are Prohibited?

The prohibition solely targets the sale of new Wi-Fi routers and mobile Wi-Fi or hotspot devices aimed at consumers, excluding existing FCC-approved routers or phones with hotspot functionalities. Previously acquired routers are not impacted and can be sold, utilized, and updated until March 1, 2027. Any new router produced outside the US must receive FCC approval before being brought in, marketed, or sold within the US, affecting US firms with overseas production.

What Does Foreign-Made Entail?

The prohibition pertains to “consumer-grade” routers designed or produced outside of the US or by companies not owned by US entities. Key players like Netgear, TP-Link, Asus, Amazon’s Eero, Google’s Nest, Synology, Linksys, and Ubiquiti fall into this category, as do most routers provided by internet service providers in the US. Manufacturers can request Conditional Approval from the Department of Defense and the Department of Homeland Security.

What is Conditional Approval?

To obtain Conditional Approval, companies are required to disclose their corporate structure, provide details on the manufacturing and supply chain, and outline a US manufacturing and onshoring strategy. This facilitates the ongoing sales and updates for both existing and new devices for a period of 18 months, which includes firmware updates, superseding the March 1, 2027, firmware waiver deadline. New devices will still undergo the standard FCC approval procedure.

Companies With Conditional Approval

Three companies have been granted Conditional Approval: Netgear, Adtran, and Eero, with permissions extending until October 2027. The Department of Defense, Homeland Security, and FCC have not clarified the reasons for these companies receiving approvals. The Consumer Technology Association (CTA) has requested clearer guidelines, raising concerns about software updates and component modifications.

What About Software Updates?

The FCC waiver permits all authorized routers to access software and firmware updates until March 1, 2027. After this date, it is uncertain what will occur should companies not secure Conditional Approval. Joshua Marpet from Finite State points out that routers that cease to receive updates present security hazards. Older devices frequently involved in cyberattacks typically do not receive further updates.

What About Components Made Abroad?

The international supply chain often faces component substitutions in routers, prompting worries. The CTA has advocated for additional waivers where security is not significantly compromised. The FCC clarified that a router manufactured in the US is not classified as ‘covered’ due to foreign components unless the component is a modular transmitter. Companies must demonstrate non-foreign production without precise regulations for documentation.

Netgear Has Approval

Netgear disclosed its Conditional Approval through a letter from the CEO. Although based in the US, its routers are produced in countries like Vietnam and Taiwan. The company has advocated for enhancing US cybersecurity and strategic competition with China. Netgear’s stock saw an increase following the announcement of the ban.

Will TP-Link Be Banned?

TP-Link, holding an estimated 35% of the US market share, must seek Conditional Approval or establish US manufacturing to market new routers. Investigations by US agencies and a lawsuit by the Texas attorney general highlight concerns regarding TP-Link’s connections to China. TP-Link asserts that it is headquartered in the US and manufactures in Vietnam, with its CEO applying for Trump’s Gold Card program for residency.

Will Asus Be Banned?

Asus mainly manufactures routers in Taiwan and China and must pursue Conditional Approval for new router sales. The ban has not influenced its stock price on the Taiwanese Stock Exchange.

Are Any Routers Manufactured in the US?

Some Starlink Wi-Fi routers, part of Elon Musk’s SpaceX operations, are created in Texas, although many components originate from East Asia. The security framework is considered more crucial than the manufacturing site.

How Will the Router Ban Impact Ordinary Folks?

The immediate consequence may be minimal, with numerous

Elon Musk's XChat App Looks More Like Facebook's Messenger Than Signal

Elon Musk’s XChat App Looks More Like Facebook’s Messenger Than Signal

Elon Musk utilized Friday to share critiques of rivals after the debut of the XChat app, a standalone messaging service for X users. “Signal, WhatsApp, Telegram, and iMessage all have significant security issues,” stated a message Musk shared, asserting that “XChat is the sole secure, encrypted messaging application.” Encryption specialists I consulted voiced measured skepticism regarding XChat’s implementation and supported other platforms like Signal.

A primary worry concerning XChat is that users are required to link an existing X account for login. “I’m somewhat wary of that since more data points equate to more tracking,” remarks Maria Villegas Bravo from the Electronic Privacy Information Center. She perceives Musk’s earlier criticisms of other apps as self-serving.

When Musk initially presented XChat as an upgraded, encrypted version of X direct messages, security professionals raised concerns about the storage of users’ cryptographic keys on X’s servers. “Considering XChat’s track record of security flaws, I would hesitate to use it until it undergoes a comprehensive audit,” states Cooper Quintin from the Electronic Frontier Foundation.

Musk aims for the discussion to zero in on which encrypted messaging app reigns supreme. However, after trying XChat, it feels more akin to Facebook’s Messenger. Rather than launching an elegant, new application, Musk revealed a straightforward extension of his social media platform that features encrypted messaging.

When the XChat team disclosed the app’s launch, the initial release date on Apple’s App Store was set for April 17 but was postponed several times before its surprise launch on April 24. The appropriate app did not consistently appear in searches, with a Russian-language app called “XChat App” briefly ascending Apple’s download rankings. “Scam app,” cautioned one user review.

Upon XChat’s eventual launch, access was initially restricted to the U.S., leaving U.K. users feeling disappointed. “UK should be live soon; had one issue,” wrote X’s head of product, Nikita Bier. Bier attributed the confusion early downloaders faced during the onboarding process to Apple.

After downloading XChat, I found it challenging to locate contacts to message. None of my top iMessage contacts possess X accounts, emphasizing XChat’s niche attraction. After revisiting my old DMs, I revived a few conversations. Following my messages, a pop-up confirmed, “This conversation is now end-to-end encrypted.” Despite this, no responses were received, just some emoji reactions.

Your Images Might Be Disclosing Your Location. Here's How to Stop That

Your Images Might Be Disclosing Your Location. Here’s How to Stop That

Capture an image with any digital camera or smartphone, and it’s not only the pixels that are recorded. The photo also contains metadata, referred to as EXIF (Exchangeable Image File Format) data, which reveals information about when it was captured, the device utilized, and the camera configurations. If your smartphone or camera is equipped with a GPS chip and monitors your location, this is also subtly embedded in the photograph. This can aid in reminiscing about memories captured in specific places but may not be suitable if you intend to share images while keeping your home address confidential. It’s important to reflect on the metadata linked to any photograph you distribute beyond your private use, and eliminate location data if needed.

How to Inspect Photo Metadata

Photo metadata can offer various benefits, including location tagging. Google Photos and Apple Photos facilitate the organization of your library based on the locations where images were captured. Attempt to search for a location in these applications to observe the outcomes. You can access photo metadata in multiple ways. In Google Photos for Android, select an image, tap the three dots in the upper right corner, and pick About. If there’s location information, it will be displayed on a map. In Google Photos on the web, open an image and click the info icon in the upper right to see the metadata. On iOS, use Apple Photos by opening an image and tapping the info icon at the bottom. If location details are present, they will show on a map. In Apple Photos on the web, double-click an image to open it, and the info icon is located at the top right.

This data can be accessed on Windows and macOS, though it shows GPS coordinates rather than a map. In Windows, right-click on an image in File Explorer, select Properties, and go to the Details tab. On macOS, right-click an image in Finder, choose Get Info, and GPS coordinates will be displayed in the dialog if they are available.

John Solly: The DOGE Agent Charged with Scheming to Shift Social Security Information to His New Position

John Solly: The DOGE Agent Charged with Scheming to Shift Social Security Information to His New Position

John Solly, a software developer and previous member of the Department of Government Efficiency (DOGE), is allegedly reported to have informed colleagues that he had kept critical Social Security Administration (SSA) data on a USB drive with plans to present it to his new employer, as per sources. Since October, Solly has held the position of chief technology officer for Leidos’ health IT sector, which possesses substantial contracts with SSA. Solly’s online footprint has been erased this week. Through his legal representation, Solly refutes any accusations of misconduct. Leidos has found no proof that supports the whistleblower’s allegations. Solly was a member of a 12-person DOGE team at SSA, contributing to various projects. A report, not specifying Solly or Leidos, was submitted to the SSA’s Inspector General, claiming that a former DOGE employee had taken SSA data to possibly use at a private-sector firm, anticipating clemency for any illegal acts. Solly asserts that he did not partake in the alleged conduct. Leidos stands as a prominent SSA contractor, continuing to gain substantial contracts despite cuts under DOGE’s initiatives.