Baidu's and Don'ts

Total Page:16

File Type:pdf, Size:1020Kb

Baidu's and Don'ts BAIDU’S AND DON’TS Privacy and Security Issues in Baidu Browser By Jeffrey Knockel, Sarah McKune, and Adam Senft FEBRUARY 23, 2016 RESEARCH REPORT #70 Copyright © The Citizen Lab Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike licence). Electronic version first published in 2016 by the Citizen Lab. This work can be accessed through https://citizenlab.ca/2016/02/privacy- security-issues-baidu-browser/. Document Version: 1.0 The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: • give appropriate credit; • indicate whether you made changes; and • use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement. Suggested Citation Jeffrey Knockel, Sarah McKune, and Adam Senft. “Baidu’s and Don’ts: Privacy and Security Issues in Baidu Browser,” Citizen Lab Research Report No. 70, University of Toronto, February 2016. Acknowledgements The Citizen Lab would like to thank Seth Hardy from Lookout for assistance with this report. Jeffrey Knockel’s research for this project was supported by the Open Technology Fund’s Information Control Fellowship Program. Sarah McKune’s research was supported by a grant from the Open Society Foundations (Ronald J. Deibert, Principal Investigator), and Adam Senft’s from the John D. and Catherine T. MacArthur Foundation (Ronald J. Deibert, Principal Investigator). About the Citizen Lab, Munk School of Global Affairs and Public Policy, University of Toronto The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs and Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security. We use a “mixed methods” approach to research that combines methods from political science, law, computer science, and area studies. Our research includes investigating digital espionage against civil society, documenting Internet filtering and other technologies and practices that impact freedom of expression online, analyzing privacy, security, and information controls of popular applications, and examining transparency and accountability mechanisms relevant to the relationship between corporations and state agencies regarding personal data and other surveillance activities. Contents Key Findings 5 Introduction and Overview 6 Responsible Disclosure and Notification 7 Baidu Browser: Brief Background 7 Technical Analysis 8 “Easily decryptable” encryption 9 Part 1: Insecure transmission of personal data 11 Android Version 11 a. Leaks sensitive data on startup 11 b. Leaks sensitive data and address bar contents when inputting into address bar 12 c. Phones home with sensitive data about every page view 13 d. Insecurely checks for software updates 13 Windows Version 14 a. Leaks address bar contents when inputting into address bar 15 b. Communicates with Baidu servers via an easily decryptable protocol 15 c. Phones home information about every page view that includes hardware serial numbers 16 e. Updates list of website domains triggering proxying 17 Part 2: Proxying of foreign-hosted websites 18 kv_auth resource 19 fg_pac resource 19 kv_report resource 20 Analysis 21 Part 3: Vulnerabilities in other Baidu products and third-party apps 24 Global editions of Baidu Browser 24 Sensitive data leaks in Baidu Mobile Tongji (Analytics) SDK 25 Discussion 27 Questions for Baidu 29 Analysis of Android client version 6.4.14.0 29 a. Leaks sensitive data on startup and Phones home with sensitive data about every page view 30 b. Leaks sensitive data and address bar contents when inputting into address bar 30 c. Insecurely checks for software updates 30 Analysis of Windows client version 8.2.100.3090 30 a. Leaks address bar contents when inputting into address bar 30 b. Communicates with Baidu servers via an easily decryptable protocol and Phones home information about every page view that includes hardware serial numbers 30 c. Insecurely checks for software updates 31 CITIZEN LAB RESEARCH REPORT NO. 70 阅读报告的主要发现 Key Findings › Baidu Browser, a web browser for the Windows and Android platforms, transmits personal user data to Baidu servers without encryption and with easily decryptable encryption, and is vulnerable to arbitrary code execution during software updates via man-in-the-middle attacks. › The Android version of Baidu Browser transmits personally identifiable data, including a user’s GPS coordinates, search terms, and URLs visited, without encryption, and transmits the user’s IMEI and a list of nearby wireless networks with easily decryptable encryption. › The Windows version of Baidu Browser also transmits a number of personally identifiable data points, including a user’s search terms, hard drive serial number model and network MAC address, URL and title of all webpages visited, and CPU model number, without encryption or with easily decryptable encryption. › Neither the Windows nor Android versions of Baidu Browser protect software updates with code signatures, meaning an in-path malicious actor could cause the application to download and execute arbitrary code, representing a significant security risk. › The Windows version of Baidu Browser contains a feature to proxy requests to certain websites, which permits access to some websites that are normally blocked in China. › Analysis of the global versions of Baidu Browser indicates that the data leakage is the result of a shared Baidu software development kit (SDK),1 which affects hundreds of additional applications developed by both Baidu and third parties in the Google Play Store and thousands of applications in one popular Chinese app store. › Please see the “Update: Analysis of updated versions of Baidu Browser” section at the end of this report for updates on these issues, following our disclosure to the vendor and our analysis of the latest versions released prior to publication. 1 software development kit is a set of tools used for developing software applications. 5 BAIDU'S AND DON'TS Introduction and Overview Baidu Browser is a free web browser for the Windows and Android platforms, produced by Baidu, one of China’s largest technology companies. The browser offers a number of features beyond those found in standard browsers, including video and audio download tools and built-in torrent support. This report provides a detailed analysis of how Baidu Browser manages and transmits user data during its operation. The report identifies security concerns in both the Windows and Android versions of the browser that may expose personal user data, including a user’s geolocation, hardware identifiers, nearby wireless networks, web browsing data and search terms. Such user data is transmitted, in both the Windows and Android versions, unencrypted or with easily decryptable encryption, which means that any in-path actor could acquire this data by collecting the traffic and performing any necessary decryption. In addition, neither version of the application secures its software update process with a digital signature, which means that a malicious in-path actor could cause the browser to download and execute arbitrary code. This report is a continuation of our prior work examining the security and privacy of popular mobile applications in Asia. Our previous research includes a report on similar concerns with UC Browser, a popular mobile web browser owned by China-based e-commerce giant Alibaba. That report documented UC Browser’s unencrypted transmission of sensitive user information, including IMSI, IMEI, Android ID, Wi-Fi MAC Address, geolocation data and user search queries. The security issues in UC Browser were identified in documents leaked by Edward Snowden that indicated the Five Eyes intelligence alliance, consisting of intelligence agencies from Canada, the United States, the United Kingdom, Australia and New Zealand, had used these vulnerabilities as a means of identifying users. In previous work, we have analyzed the auto-update mechanisms in popular third party software. The remote code execution via man-in-the-middle attack vulnerabilities that we found in Baidu Browser’s auto-update mechanisms are consistent with vulnerabilities common in other third party software. In addition, we have conducted research into keyword censorship and surveillance in TOM-Skype and keyword censorship in messaging platform Sina UC, as well as a comparative analysis of mobile chat applications popular in Asia, including WeChat, LINE and KakaoTalk. 6 CITIZEN LAB RESEARCH REPORT NO. 70 We have also published an overview of privacy and security in mobile communications, entitled The Many Identifiers in Our Pockets. This primer on mobile technology identifiers is useful background for some of the technical issues raised in this report. Additionally, we have published, in collaboration with Open Effect, an analysis of privacy and security concerns in fitness trackers. Responsible Disclosure and Notification On November 26, 2015, we notified Baidu of our findings and our intent to publish this report. We indicated that we would not publish sooner than 45 days after notification,
Recommended publications
  • Towards Understanding Modern Web Traffic”
    Towards Understanding Modern Web Traffic Sunghwan Ihm† Vivek S. Pai Department of Computer Science Department of Computer Science Princeton University Princeton University [email protected] [email protected] ABSTRACT popularity of social networking, file hosting, and video streaming As Web sites move from relatively static displays of simple pages sites [29]. These changes and growth of Web traffic are expected to rich media applications with heavy client-side interaction, the to continue, not only as the Web becomes a de facto front-end for nature of the resulting Web traffic changes as well. Understanding many emerging cloud-based services [47], but also as applications this change is necessary in order to improve response time, evalu- getmigratedtotheWeb[34]. ate caching effectiveness, and design intermediary systems, such as Understanding these changes is important for overall system de- firewalls, security analyzers, and reporting/management systems. sign. For example, analyzing end-user browsing behavior can lead Unfortunately, we have little understanding of the underlying na- to a Web traffic model, which in turn can be used to generate a syn- ture of today’s Web traffic. thetic workload for benchmarking or simulation. In addition, ana- In this paper, we analyze five years (2006-2010) of real Web traf- lyzing the redundancy and effectiveness of caching could shape the fic from a globally-distributed proxy system, which captures the design of Web servers, proxies, and browsers to improve response browsing behavior of over 70,000 daily users from 187 countries. times. In particular, since content-based caching approaches [28, Using this data set, we examine major changes in Web traffic char- 49, 50] are a promising alternative to traditional HTTP object-based acteristics that occurred during this period.
    [Show full text]
  • Chinese Internet Companies and Their Quest for Globalization
    International Conference on Information, Business and Education Technology (ICIBIT 2013) Chinese Internet Companies and Their Quest for Globalization Harlan D. Whatley1 1Swiss Management Center, Zurich, Switzerland Abstract players in the technology market (Sun, 2009). Chinese internet companies have seen an This qualitative research paper unprecedented growth over the past explores the quest for globalization of decade. However, very few are two successful Chinese internet recognized brands outside of China while companies: Baidu and Tencent Holdings. some seek to develop their brands in In this case study, the focus is on the foreign markets. This paper analyzes the marketing strategies of these expanding marketing strategies of two internet multinational enterprises and the companies: Baidu and Tencent and their challenges they face to become quest for globalization. recognized as global brands. All of the firms in this study were founded as Keywords: Baidu, Tencent, internet, private enterprises with no ownership ties branding, marketing, globalization, China to the Chinese government. Furthermore, an analysis of the countries and markets 1. Introduction targeted by the firms is included in the study. In addition to a review of the Innovation efforts by technology current academic literature, interviews companies in China are driven by adding were conducted with marketing and significant value to imported foreign strategy professionals from the technologies or by developing new perspective firms as well as journalists products to satisfy specific domestic that closely follow Chinese internet firms demands (Li, Chen & Shapiro, 2010). and the technology sector. This study on Firms in the emerging market of China do the globalization of Chinese internet not possess the R&D resources that their firms will contribute to marketing developed Western counterparts have.
    [Show full text]
  • Search Engine Optimization (SEO)
    SEO 360: The Essentials of Search Engine Optimization By Chris Adams, Director of Online Marketing & Research INTRODUCTION Effective Search Engine Optimization is not a highly technical or complex task, if you get the basics right: Invest in relevant, quality content Follow best practices in optimizing the content Update your site frequently with relevant content Leverage social media and Search Engine Marketing (SEM) efforts Manage the entire process with analytics, refining and improving the process based on results We call it SEO 360⁰; whatever you call it, it is likely to be your lowest-cost, highest-quality site traffic. Strong organic web traffic comes from great, well-optimized content so search engines and travelers can easily find and understand it. This whitepaper focuses on the essential best practices. CONTENTS A. THE IMPORTANCE OF SEARCH ENGINE TRAFFIC B. THE ESSENTIAL SIX BUILDING BLOCKS OF SEO C. WHY SEO 360⁰? D. THE SIX BUILDING BLOCKS OF SEO EXPLAINED E. WHAT'S NEXT? F. THE ESSENTIAL SEO TOOL KIT Figure 1. Strong organic traffic (from search engine referrals) underpins the reach and audience of most travel and tourism websites milespartnership.com | Whitepaper ©2012 Miles Media Group, LLLP Measure & Market: An Online Analytics Framework 2 By Chris Adams, Director of Online Media A. The Importance of Search Engine Traffic Search Engine Optimization (SEO) is the process of making your website and its content highly visible to search engines, ranking well in relevant searches, and boosting organic traffic to your Figure 2. Search engine traffic dominates the way in which travelers find destination (and other tourism) web sites.
    [Show full text]
  • FAANG+ UCITS Fund Is a Sub-Fund Within AQA Broad Representation of the Market, the Due to Their High Growth Potential
    + www.castlestonemanagementllc.com Fund Objective The investment objective of the Sub-Fund is to generate capital growth mainly through exposure to the development, advancement and use of technology. The Sub-Fund will be invested in global technology equities some of which are familiarised by the acronym “FAANG” defining the most well-known technology equities. Apart from the FAANG equities, the Sub-Fund will also invest in other large technology stocks. Up to 100% of the assets of the Sub-Fund may be invested in equities. Why invest in FAANG+ UCITS Growth Market Leaders in Inflows from Passive Broad Exposure to Global Story Different Sectors Investors Technology Companies FAANG+ offers exposure UCITS diversified portfolio The S&P 500 is a market FAANG+ holds names to companies that of the leading technology capitalisation weighted Index. diversified across the dominate the stocks in the S&P 500 The market cap of the Information Technology, technology sector and Index and MSCI World FAANG+ stocks represent Communication Services, have a history of strong Index. Exposure to some approximately 23% of the Financial and Consumer growth over the long- of the largest tech S&P 500 Index. This means Discretionary sectors, spread term. companies in the US, that for every $100 being throughout four global China, Taiwan, Korea, invested into the S&P 500 geographic locations. Europe. Index, approximately $23 is being invested into FAANG stocks and Microsoft. Sectors and Weightings (%) SECTORS & WEIGHTINGS (%)* TOP 10 HOLDINGS (%)* INFORMATION TECHNOLOGY
    [Show full text]
  • Wenbo Chen-Thesis.Pdf (517.6Kb)
    Contextual Innovation and R&D Strategy 1 Contextual Innovation and R&D Strategy An Analysis of the Competitive Advantage of Social Media Companies in China Senior Research Thesis Presented in partial fulfillment of the requirements for graduation with Research Distinction in Economics in the undergraduate colleges of The Ohio State University by Wenbo Chen Bachelor of Arts The Ohio State University October 2014 Thesis Committee: Professor Bruce W. Bellner (Chair) Department of Economics, College of Arts and Sciences Professor Mona Makhija Department of Management and Human Resources, Fisher College of Business Professor Oded Shenkar Department of Management and Human Resources, Fisher College of Business Contextual Innovation and R&D Strategy 2 Copyright statement: This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognize that the copyright rests with its author and that no quotation from the thesis and no information derived from it may be published without the prior written consent of the author and of the university (as may be appropriate). ©2014 Wenbo Chen All Rights Reserved Contextual Innovation and R&D Strategy 3 Acknowledgement I sincerely thank my project advisor professor Bruce W. Bellner for introducing me to the field of strategic management and sharing his insights on both economics and business. I thank professor Mona Makhija for her tremendous insights on helping me develop my initial research question and providing rigorous training on research. I thank professor Oded Shenkar for his interest on my research and providing guidance on research methods. I thank all of you for your interest on social media in China.
    [Show full text]
  • A Survey on Search Engine Optimization (SEO)
    Int'l Journal of Computing, Communications & Instrumentation Engg. (IJCCIE) Vol. 4, Issue 1 (2017) ISSN 2349-1469 EISSN 2349-1477 A Survey on Search Engine Optimization (SEO) Anis ISMAIL and Firas ABDALLAH Abstract— With the growth of Internet in the recent years, search engine such as Google, Bing and Yahoo are becoming more and more important. The role of the search engines is to index billions of web pages and display only the most relevant results for a given search query. When creating the website, many webmasters forget to take into consideration an essential factor, which is making the world aware of their website. Most of times, main focus is set on making the website as user-friendly as possible, stable, fast and secure. In this paper, we present may techniques that are sometimes useless. The aim of these techniques is to verify if the website does not have visitors or simply not found. Fig. 1.Different SEO Techniques [3] Most of the times, SEO is just simply a method of building Keywords—Internet, Google, Bing, Yahoo, search engines, the structure of the website in a way that it will allow search SEO. engines to understand what the website is all about. The majority of the web visitors are driven to websites by search I. INTRODUCTION engines such as Google, Bing and Yahoo. Despite the fact that Search engine is an application used to help find information social media such as Facebook, Twitter and even Youtube and on the internet. The search engine is usually accessed through a many others can still be the source of visitors to a website, page on a website that allows a user to search the content of search engines remains the primary method of locating and billions of websites on the web by entering a set of keywords into a search textbox [1].
    [Show full text]
  • Google Analytics User Guide
    Page | 1 What is Google Analytics? Google Analytics is a cloud-based analytics tool that measures and reports website traffic. It is the most widely used web analytics service on the Internet. Why should we all use it? Google Analytics helps you analyze visitor traffic and paint a complete picture of your audience and their needs. It gives actionable insights into how visitors find and use your site, and how to keep them coming back. In a nutshell, Google Analytics provides information about: • What kind of traffic does your website generate – number of sessions, users and new users • How your users interact with your website & how engaged they are – pages per session, average time spent on the website, bounce rate, how many people click on a specific link, watch a video, time spent on the webpage • What are the most and least interesting pages – landing and exit pages, most and least visited pages • Who visits your website – user`s geo location (i.e. city, state, country), the language they speak, the browser they are using, the screen resolution of their device • What users do once they are on your website – how long do users stay on the website, which page is causing users to leave most often, how many pages on average users view • When users visit your website – date & time of their visits, you can see how the user found you. • Whether visitors came to your website through a search engine (Google, Bing, Yahoo, etc.), social networks (Facebook, Twitter, etc.), a link from another website, or a direct type-in.
    [Show full text]
  • Web Analytics Tools and Benefits for Entrepreneurs
    Web analytics tools and benefits for entrepreneurs LAHTI UNIVERSITY OF APPLIED SCIENCES Degree programme in Business Information Technology Bachelor’s Thesis Autumn 2017 Cao Truong Hoang Phuong Nguyen Thi Huyen Trang Lahti University of Applied Sciences Degree programme in Business Information Technology Cao Truong, Hoang Phuong Nguyen Thi, Huyen Trang: Web analytics tools and benefits for entrepreneurs Bachelor’s Thesis in Business Information Technology, 79 pages Autumn 2017 ABSTRACT Online marketing nowadays is not an unfamiliar phenomenon anymore but entrepreneurs may not utilize it to bring out the best in their business. All business companies have their own website but most of them only use it as an advertisement tools or a news tools. However, web analytics tools are designed to change that and help entrepreneurs gathering useful data from their websites. The purpose of the thesis is to provide understanding about what web analytics tools are and they can use them to enhance their business strategy. The thesis will focus on deductive approach and make a conclusion through qualitative research. Google analytics tools and Woopra analytics tools will be used as a demonstration to how to use web analytics tools and how the analysis process can help making proper adjustment to the business. Keywords: Online marketing, data analysis, web analytics, web analytics tools, Google Analytics, Woopra TABLE OF CONTENTS 1 INTRODUCTION 1 1.2 Thesis structure 2 2 RESEARCH METHODS 4 2.1 Objectives 4 2.2 Research approach 4 2.3 Research methodology
    [Show full text]
  • How to Make YOUR Advertising Money on Baidu Truly Work for YOU ?
    2013 How to make YOUR advertising money on Baidu truly work for YOU ? Innovative Technology Solutions from Silicon Valley Bring the Best ROI to You GLOGOU INC. 2068 Walsh Ave, Suite C Santa Clara, CA 95050 Ph.: 508-309-2110 Fax: 978-568-1788 [email protected] English Interface to Baidu Ad Platform http://glogou.com/adbaidu/ Glogou Inc. 2068 Walsh Ave, #C, Santa Clara, CA, 95050 U.S.A. How to make YOUR advertising money on Baidu truly work for YOU ? Dear Potential Customers: You have considered using advertising programs on Baidu. We want to congratulate you! China has one of the world fastest growing economies and the world's 2nd largest market. And Baidu is the dominant search engine in China. By choosing to use advertising programs on Baidu, you have made a wise decision and open your business to the world's most dynamic market. Baidu’s advertising programs are very similar to Google’s Adwords and Adsense, based on Pay-Per- Click(PPC). (Baidu also has banner ads and a few other marketing tools.) By spending some advertising money on Baidu, you will be sure to get some web-traffic from China which is brought to you by Baidu. However, one frustration many foreign businesses have often experienced is that this web-traffic does not always convert to customers or to deals. Often, web visitors from China do not take any action on the customers’ websites and leave the websites quickly. Since Baidu’s ad programs are PPC, not Pay- Per-Action(PPA) or Pay-Per-Transaction(PPT), Baidu will not guarantee that this web-traffic will convert to your customers.
    [Show full text]
  • Online Platforms and Market Power Part 6: Examining the Dominance of Amazon, Apple, Facebook, and Google Questions for the Recor
    Online Platforms and Market Power Part 6: Examining the Dominance of Amazon, Apple, Facebook, and Google Questions for the Record from the Honorable David N. Cicilline, Chairman, Subcommittee on Antitrust, Commercial and Administrative Law of the Committee on the Judiciary Questions for Mr. Tim Cook, CEO, Apple, Inc. 1. You testified that Apple’s apps “go through the same rules” that third-party apps are required to follow. The App Store Guidelines (“Guidelines”) are designed to ensure that the App Store remains a safe and trusted place for consumers to discover and download software for their Apple devices. The Guidelines apply to any app, Apple or third-party, that is available on the App Store in the first instance. a. How many Apple apps are pre-loaded on current iPhone models? The first iPhone included 13 integrated Apple apps. There were no third-party apps available for that iPhone. Apple’s subsequent decision to open the iPhone to third-party app development unleashed a wave of innovation and competition. Thirteen years later, there are more than 1.8 million third-party apps available through the App Store and only about 40 Apple apps integrated into the current iPhone models. Apple’s focus has always been to deliver a great consumer experience out of the box. That is why the iPhone comes with Apple apps like Phone, Notes, Settings, Files, Clock, Tips, Measure, and Reminders to provide basic functionality. In addition, apps like FaceTime, iMessage, Apple Music, TV, and others help differentiate the iPhone in a competitive smartphone market. The few apps that Apple has integrated into the iPhone are a drop in the bucket of the overall app ecosystem.
    [Show full text]
  • Roger A. Ikeda, Et Al. V. Baidu, Inc., Et Al. 20-CV-02768-Order Granting
    Case 5:20-cv-02768-LHK Document 60 Filed 04/07/21 Page 1 of 31 1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 NORTHERN DISTRICT OF CALIFORNIA 10 SAN JOSE DIVISION 11 12 ROGER A. IKEDA, et al., Case No. 20-CV-02768-LHK 13 Plaintiffs, ORDER GRANTING MOTION TO DISMISS WITH LEAVE TO AMEND 14 v. Re: Dkt. No. 50 15 BAIDU, INC. et al., 16 Defendants. 17 Lead Plaintiff Robert J. Allustiarti, individually and on behalf of all other persons similarly United States District United States Court Northern District of CaliforniaNorthern of District 18 situated (“Plaintiff”), alleges that Defendants Baidu, Inc.; Yanhong Li; and Cheng-Chun Yu 19 (collectively, “Defendants”) violated federal securities laws. Before the Court is Baidu’s motion to 20 dismiss Plaintiff’s Amended Complaint. ECF No. 50. Having considered the parties’ submissions, 21 the relevant law, and the record in this case, the Court GRANTS Baidu’s motion to dismiss with 22 leave to amend. 23 I. BACKGROUND 24 A. Parties 25 Plaintiff sues Defendant Baidu, Inc. (“Baidu”), which is a Cayman Islands corporation with 26 its headquarters in Beijing, China. ECF No. 41 (“AC”) ¶ 25. Since at least 2005, Baidu has 27 1 28 Case No. 20-CV-02768-LHK ORDER GRANTING MOTION TO DISMISS WITH LEAVE TO AMEND Case 5:20-cv-02768-LHK Document 60 Filed 04/07/21 Page 2 of 31 1 sponsored American Depositary Shares (“ADSs”) that trade on the NASDAQ. Id. ¶ 26. 2 Plaintiff also sues Defendants Yanhong Li (“Li”) and Cheng-Chun Yu (“Yu”) (collectively, 3 “the Individual Defendants”).
    [Show full text]
  • Analysis on China Cross-Border E-Commerce Under COVID-19 Shiqin Song
    Advances in Economics, Business and Management Research, volume 166 Proceedings of the 6th International Conference on Financial Innovation and Economic Development (ICFIED 2021) Analysis on China Cross-Border E-Commerce Under COVID-19 Shiqin Song Pinewoodprep School, South Carolina 29483, the United States *Corresponding author. Email: [email protected] ABSTRACT Cross-border e-commerce refers to an international business activity in which transaction subjects belonging to different customs enter into transactions, conducting payment and settlement through e-commerce platforms, and deliver goods and complete transactions through cross-border logistics[4]. This article mainly describes the losses suffered by cross-border e-commerce under the COVID-19, the future development trend, and the advantages of taking China's cross-border electronic commerce as an example to make cross-border electronic commerce. Keywords: Chinese Cross-border e-commerce, the Covid-19, international business 1. INTRODUCTION global trade[5]. Let me give you an example that most of people know about: cross-border company Amazon. As the trade between countries is increasing, more First of all, their CEO has become the richest man in the and more people have found the business opportunities. world, which shows that the development of As a mainstream market, cross-border e-commerce has cross-border companies is very obvious. Secondly, in become more and more well-known, but there is no the first quarter of this year, Amazon's online sales clear concept. I want to introduce the cross-border soared by 24%, the fastest growth rate in 4 years. e-commerce market in this article.
    [Show full text]