Hong Kong expands police powers to access encrypted devices, raising privacy concerns for crypto users

ambcrypto2026-03-26 tarihinde yayınlandı2026-03-26 tarihinde güncellendi

Özet

Hong Kong has expanded police powers under the National Security Law, criminalizing the refusal to provide passwords or assist in decrypting personal electronic devices. The rules, effective March 23, apply to residents, visitors, and transit passengers at Hong Kong International Airport. Authorities can now access, seize, and retain devices deemed relevant to national security investigations. This raises significant privacy concerns, particularly for crypto users who store sensitive financial data or access digital asset accounts on their devices. The policy highlights growing tensions between law enforcement and digital privacy.

Authorities in Hong Kong have introduced new rules under the National Security Law that make it a criminal offense to refuse to provide passwords or assist in decrypting personal electronic devices.

The changes, which took effect on March 23, apply to residents, visitors, and even travelers transiting through Hong Kong International Airport.

The update grants police broader authority to access data stored on phones, laptops, and other devices, as well as to seize and retain equipment they deem relevant to national security investigations.

The development expands existing enforcement powers and introduces new obligations around digital access.

Hong Kong criminalizes refusal to unlock personal devices

Under the revised rules, according to the U.S. Consulate, individuals may be required to provide passwords or assist authorities in decrypting electronic devices during an investigation. Refusal to comply is now considered a criminal offense.

The scope of the law is wide, covering all personal electronic devices and applying regardless of nationality. This means foreign nationals, including business travelers and transit passengers, may be subject to the same requirements while in Hong Kong.

Authorities are also empowered to take and retain devices as evidence if they believe the contents are linked to national security concerns. However, the threshold for such determinations has not been clearly defined in public guidance.

Law extends to travelers and transit passengers

Including transit passengers broadens the policy’s reach beyond residents and visitors entering the city. Individuals passing through Hong Kong International Airport may be subject to the same requirements, even if they are not formally entering the territory.

This has implications for international travelers who routinely carry sensitive personal or corporate data on their devices. Legal obligations may apply regardless of whether a traveler’s stay is temporary or incidental.

Implications for digital privacy and crypto users

While the policy is not specific to digital assets, it has potential implications for individuals who store financial or sensitive information on their devices.

Crypto wallet applications, exchange accounts, and authentication tools are often accessible via smartphones or laptops.

In cases where access to a device is compelled, this could expose account-level information or transaction histories, even if assets themselves remain secured elsewhere.

The changes highlight broader tensions between regulatory enforcement and digital privacy, particularly as financial activity becomes increasingly tied to personal devices.


Final Summary

  • Hong Kong’s updated rules require individuals to unlock devices on request, extending enforcement powers under national security law.
  • The policy raises new privacy considerations, including for users who access crypto accounts on personal devices.

İlgili Sorular

QWhat are the key changes introduced by Hong Kong's new rules under the National Security Law regarding electronic devices?

AThe new rules criminalize refusing to provide passwords or assist in decrypting personal electronic devices, grant police broader authority to access and seize devices deemed relevant to national security investigations, and apply to all individuals including residents, visitors, and transit passengers.

QWho is subject to these new regulations in Hong Kong?

AThe regulations apply to all individuals in Hong Kong, regardless of nationality, including residents, visitors, and even transit passengers passing through Hong Kong International Airport.

QWhat are the potential implications for cryptocurrency users under these new rules?

ACryptocurrency users may be compelled to provide access to devices containing crypto wallet applications, exchange accounts, or authentication tools, potentially exposing account information or transaction histories if investigated under national security grounds.

QWhat is the threshold for authorities to seize and retain electronic devices under this law?

AThe threshold for authorities to determine whether device contents are linked to national security concerns has not been clearly defined in public guidance.

QWhen did these new rules in Hong Kong take effect?

AThese new rules took effect on March 23.

İlgili Okumalar

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

The article "a16z: AI's 'Amnesia' – Can Continual Learning Cure It?" explores the limitations of current large language models (LLMs), which, like the protagonist in the film *Memento*, are trapped in a perpetual present—unable to form new memories after training. While methods like in-context learning (ICL), retrieval-augmented generation (RAG), and external scaffolding (e.g., chat history, prompts) provide temporary solutions, they fail to enable true internalization of new knowledge. The authors argue that compression—the core of learning during training—is halted at deployment, preventing models from generalizing, discovering novel solutions (e.g., mathematical proofs), or handling adversarial scenarios. The piece introduces *continual learning* as a critical research direction to address this, categorizing approaches into three paths: 1. **Context**: Scaling external memory via longer context windows, multi-agent systems, and smarter retrieval. 2. **Modules**: Using pluggable adapters or external memory layers for specialization without full retraining. 3. **Weights**: Enabling parameter updates through sparse training, test-time training, meta-learning, distillation, and reinforcement learning from feedback. Challenges include catastrophic forgetting, safety risks, and auditability, but overcoming these could unlock models that learn iteratively from experience. The conclusion emphasizes that while context-based methods are effective, true breakthroughs require models to compress new information into weights post-deployment, moving from mere retrieval to genuine learning.

marsbit3 dk önce

a16z: AI's 'Amnesia', Can Continuous Learning Cure It?

marsbit3 dk önce

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

An individual manipulated a weather sensor at Paris Charles de Gaulle Airport with a portable heat source, causing a Polymarket weather market to settle at 22°C and earning $34,000. This incident highlights a fundamental issue in prediction markets: when a market aims to reflect reality, it also incentivizes participants to influence that reality. Prediction markets operate on two layers: platform rules (what outcome counts as a win) and data sources (what actually happened). While most focus on rules, the real vulnerability lies in the data source. If reality is recorded through a specific source, influencing that source directly affects market settlement. The article categorizes markets by their vulnerability: 1. **Single-point physical data sources** (e.g., weather stations): Easily manipulated through physical interference. 2. **Insider information markets** (e.g., MrBeast video details): Insiders like team members use non-public information to trade. Kalshi fined a剪辑师 $20,000 for insider trading. 3. **Actor-manipulated markets** (e.g., Andrew Tate’s tweet counts): The subject of the market can control the outcome. Evidence suggests Tate’sociated accounts coordinated to profit. 4. **Individual-action markets** (e.g., WNBA disruptions): A single person can execute an event to profit from their pre-placed bets. Kalshi and Polymarket handle these issues differently. Kalshi enforces strict KYC, publicly penalizes insider trading, and reports to regulators. Polymarket, with its anonymous wallet-based system, has historically been more permissive, arguing that insider information improves market accuracy. However, it cooperated with authorities in the "Van Dyke case," where a user traded on classified government information. The core paradox is reflexivity: prediction markets are designed to discover truth, but their financial incentives can distort reality. The more valuable a prediction becomes, the more likely participants are to influence the event itself. The market ceases to be a mirror of reality and instead shapes it.

marsbit1 saat önce

Can a Hair Dryer Earn $34,000? Deciphering the Reflexivity Paradox in Prediction Markets

marsbit1 saat önce

İşlemler

Spot
Futures
活动图片