Hong Kong expands police powers to access encrypted devices, raising privacy concerns for crypto users

ambcryptoPublished on 2026-03-26Last updated on 2026-03-26

Abstract

Hong Kong has expanded police powers under the National Security Law, criminalizing the refusal to provide passwords or assist in decrypting personal electronic devices. The rules, effective March 23, apply to residents, visitors, and transit passengers at Hong Kong International Airport. Authorities can now access, seize, and retain devices deemed relevant to national security investigations. This raises significant privacy concerns, particularly for crypto users who store sensitive financial data or access digital asset accounts on their devices. The policy highlights growing tensions between law enforcement and digital privacy.

Authorities in Hong Kong have introduced new rules under the National Security Law that make it a criminal offense to refuse to provide passwords or assist in decrypting personal electronic devices.

The changes, which took effect on March 23, apply to residents, visitors, and even travelers transiting through Hong Kong International Airport.

The update grants police broader authority to access data stored on phones, laptops, and other devices, as well as to seize and retain equipment they deem relevant to national security investigations.

The development expands existing enforcement powers and introduces new obligations around digital access.

Hong Kong criminalizes refusal to unlock personal devices

Under the revised rules, according to the U.S. Consulate, individuals may be required to provide passwords or assist authorities in decrypting electronic devices during an investigation. Refusal to comply is now considered a criminal offense.

The scope of the law is wide, covering all personal electronic devices and applying regardless of nationality. This means foreign nationals, including business travelers and transit passengers, may be subject to the same requirements while in Hong Kong.

Authorities are also empowered to take and retain devices as evidence if they believe the contents are linked to national security concerns. However, the threshold for such determinations has not been clearly defined in public guidance.

Law extends to travelers and transit passengers

Including transit passengers broadens the policy’s reach beyond residents and visitors entering the city. Individuals passing through Hong Kong International Airport may be subject to the same requirements, even if they are not formally entering the territory.

This has implications for international travelers who routinely carry sensitive personal or corporate data on their devices. Legal obligations may apply regardless of whether a traveler’s stay is temporary or incidental.

Implications for digital privacy and crypto users

While the policy is not specific to digital assets, it has potential implications for individuals who store financial or sensitive information on their devices.

Crypto wallet applications, exchange accounts, and authentication tools are often accessible via smartphones or laptops.

In cases where access to a device is compelled, this could expose account-level information or transaction histories, even if assets themselves remain secured elsewhere.

The changes highlight broader tensions between regulatory enforcement and digital privacy, particularly as financial activity becomes increasingly tied to personal devices.


Final Summary

  • Hong Kong’s updated rules require individuals to unlock devices on request, extending enforcement powers under national security law.
  • The policy raises new privacy considerations, including for users who access crypto accounts on personal devices.

Related Questions

QWhat are the key changes introduced by Hong Kong's new rules under the National Security Law regarding electronic devices?

AThe new rules criminalize refusing to provide passwords or assist in decrypting personal electronic devices, grant police broader authority to access and seize devices deemed relevant to national security investigations, and apply to all individuals including residents, visitors, and transit passengers.

QWho is subject to these new regulations in Hong Kong?

AThe regulations apply to all individuals in Hong Kong, regardless of nationality, including residents, visitors, and even transit passengers passing through Hong Kong International Airport.

QWhat are the potential implications for cryptocurrency users under these new rules?

ACryptocurrency users may be compelled to provide access to devices containing crypto wallet applications, exchange accounts, or authentication tools, potentially exposing account information or transaction histories if investigated under national security grounds.

QWhat is the threshold for authorities to seize and retain electronic devices under this law?

AThe threshold for authorities to determine whether device contents are linked to national security concerns has not been clearly defined in public guidance.

QWhen did these new rules in Hong Kong take effect?

AThese new rules took effect on March 23.

Related Reads

An Open-Source AI Tool That No One Saw Predicted Kelp DAO's $292 Million Vulnerability 12 Days Ago

An open-source AI security tool flagged critical risks in Kelp DAO’s cross-chain architecture 12 days before a $292 million exploit on April 18, 2026—the largest DeFi incident of the year. The vulnerability was not in the smart contracts but in the configuration of LayerZero’s cross-chain bridge: a 1-of-1 Decentralized Verifier Network (DVN) setup allowed an attacker to forge cross-chain messages with a single compromised node. The tool, which performs AI-assisted architectural risk assessments using public data, identified several unremediated risks, including opaque DVN configuration, single-point-of-failure across 16 chains, unverified cross-chain governance controls, and similarities to historical bridge attacks like Ronin and Harmony. It also noted the absence of an insurance pool, which amplified losses as Aave and other protocols absorbed nearly $300M in bad debt. The attack unfolded over 46 minutes: the attacker minted 116,500 rsETH on Ethereum via a fraudulent message, used it as collateral to borrow WETH on lending platforms, and laundered funds through Tornado Cash. While an emergency pause prevented two subsequent attacks worth ~$200M, the damage was severe. The tool’s report, committed to GitHub on April 6, scored Kelp DAO a medium-risk 72/100—later acknowledged as too lenient. It failed to query on-chain DVN configurations or initiate private disclosure, highlighting gaps in current DeFi security approaches that focus on code audits but miss config-level and governance risks. The incident underscores the need for independent, AI-powered risk assessment tools that evaluate protocol architecture, not just code.

marsbit2h ago

An Open-Source AI Tool That No One Saw Predicted Kelp DAO's $292 Million Vulnerability 12 Days Ago

marsbit2h ago

Trading

Spot
Futures
活动图片