(1) . @AgoraIO, a Shanghai-based startup, provides the backend platform to Clubhouse. This has been widely suspected.

(2/8)
(2) . @joinClubhouse user IDs (not their username — more like a unique serial number) are transmitted in plaintext over the internet, making them trivial to intercept. Chatroom IDs (again, more like serial number) also transmitted in plaintext.

(3/8)
Any observer of internet traffic could easily match IDs on shared chatrooms to see who is talking to whom. For mainland Chinese users, this is troubling

(4/8)
(3) Users’ raw audio is likely but not certainly available to @agoraIO. AgoraIO says it does not store client audio, but PRC Cybersecurity Law could compel the firm to cooperate on handing over user data
@jeromeacohen @fryan

(5/8)
(4) . @joinClubhouse terms state that it temporarily records user audio on its own servers. Unclear where servers are, or how long is “temporary.” If servers are in the US, Chinese govt is unlikely to receive legal access to them
@Riana_Crypto

(6/8)
(5) We also explore how the Chinese govt could crack down on mainland Chinese Clubhouse users, even in subtle ways. We also discuss why China banned the app now
@jenjpan @mollyeroberts

(7/8)
Thank you to our team @elegant_wallaby @jackhcable @noUpside @alexstamos @debutts & @Riana_Crypto for their analysis on this post.

(8/8)
You can follow @stanfordio.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.