Are Chinese EVs Dangerous? The "Undisclosed Evidence" Leading to a Chain of Distrust

Are Chinese EVs Dangerous? The "Undisclosed Evidence" Leading to a Chain of Distrust

1) The Changing Nature of Fear with the Rise of "Running Computers"

Today's cars are more like "running computers" than mere collections of engines and motors. Maps, communication, sensors, cameras, microphones, and smartphone integration. Behind this convenience, cars constantly generate data about their surroundings and drivers.


In Germany, concerns about the "destination of this data" have surged. The focus is on connected cars (internet-connected vehicles) from Chinese manufacturers. Vehicles approaching sensitive areas like politics, military, and research and development could unintentionally or intentionally become gateways for information gathering—a perspective that is spreading through authorities and media.


2) Why Extracting Data is Problematic: The Dangers of Location Information Alone

When people hear "cars send location information," they often think of traffic avoidance or theft prevention. However, in the context of national security, the meaning changes.


For example, if cars frequently move around military facilities, police stations, or critical infrastructure, and their stop times and routes are accumulated, it could lead to the estimation of facility operation patterns and VIP movements. If in-car microphones, onboard cameras, and sensors for surrounding monitoring are added, it could create a three-dimensional picture of "who was where, when, and doing what." German reports cite location information, in-car microphone conversations, and images from driving cameras as examples of data that authorities are concerned about.


3) Not a "Spy Movie" but "Data Extraction"—The Essence Indicated by Authorities

The complexity of this issue lies in the fact that imagining "movie-like spy activities" leads to mismatched discussions. According to statements from German state-level officials, the concern is less about classical espionage and more about "large-scale data extraction." The data collected by cars on a daily basis may be trivial individually, but its value skyrockets with volume and continuity.


The worst-case scenarios in the cyber realm are also discussed. According to comments from German agencies, attackers could illegally access a car's communication interface, gain access to driving data, technical information, and possibly even in-car records, with the worst-case scenario being "control of the car." At this point, the issue extends beyond privacy to physical safety.

4) "Countermeasures" Happening in Reality: Stricter Handling in Military and Intelligence Agencies

The anxiety is not just rhetoric; changes in real-world operations are beginning to heighten people's tension. According to reports, IT experts from the German federal government have investigated Chinese-made cars, and the results are classified. Additionally, there are moves to exclude or restrict certain Chinese brand cars from facility operations (restrictions on parking and entry) by the military and intelligence agencies.


However, this "non-disclosure" adds fuel to the fire. "Is there really dangerous evidence?" "Is it not disclosed because nothing was found?" The more information is withheld, the more fertile the ground for speculation and conspiracy theories.


5) "Is China the Only One to Blame?"—Three Divisive Points on Social Media

This topic gains traction on social media because it is filled with value-laden landmines. When reactions are visualized, they split into three major points.


Point A: It's Natural for National Security to Tighten "Important Areas" First
The stance is that places to be protected, such as military, police, critical infrastructure, and government surroundings, are clear. In fact, comments from officials indicate that these areas are considered "high risk," and research and development companies could be "medium to high" risk depending on conditions. Those who agree with this argue, "Forget about ordinary households; at least important facilities should adopt zero trust."


Point B: Isn't It the Same for Western Cars? Opposition to "China Only" Targeting
On the other hand, there is strong opposition that "as a function, all manufacturers do similar things." In fact, articles analyzing reader comments show that OTA (online updates), remote diagnostics, and communication modules are "standard for modern cars," and it is unreasonable to view only specific countries as dangerous. On social media, there are noticeable "boomerang" type counterarguments like "What about Tesla and big American tech?"


Point C: Where's the Evidence? Why Hide the Results? Distrust Born from "Non-Disclosure"
On LinkedIn, a WDR/NDR investigation introduced that multiple manufacturers' cars were inspected and the results were kept secret, leading to suspicions in the comments like "Was it because nothing was found?" or "Speculation is more politically useful." Conversely, there are views that "under China's cloud and legal system, government access is possible," showing that the same "non-disclosure" leads to completely opposite conclusions.

6) "Regulation Solves Everything" Isn't the Answer: The Complexity of the Connected Era

So, can regulation cut through the issue? The reality is a bit more complex.


Firstly, in-car data is also a source of safety, quality, and convenience. Accident analysis, predictive maintenance, software improvement, and driver assistance learning. These cannot function without data. In fact, there has been a history of discussions about cooperation frameworks between Germany and China regarding data and standards in the autonomous driving and connected fields. The higher the security alert, the more the conflict with industrial policy and international cooperation.


Secondly, it is difficult to verify "where the data goes" from the outside. While there is an explanation that EU type approval (vehicle certification) requires cybersecurity measures, it is reported that customers find it hard to see the reality of data generation and transmission, and it is even harder to track usage overseas. In the end, users tend to buy "peace of mind" with consent screens and terms of use.


7) Where is the Middle Ground: A Realistic Defense Line Premised on Car "Communication"

What is needed from here is not a binary choice of "exclude because it's scary" or "ignore because it's convenient." Realistically, the middle ground can be considered in the following layers.

  • Clarify Operational Rules for Important Facilities and VIP Routes (Restrictions on bringing in, parking, smartphone integration)

  • Visualize the Handling of In-Car Microphones, Cameras, and Outward Sensors (What is recorded and when it is transmitted)

  • Minimize Data and Process On-Device (Avoid sending what doesn't need to be sent)

  • Ensure Auditability (Third-party verification, logs, transparency of updates)

  • Cross-Cutting Rules Beyond National Discussions (If it ends with "only Chinese cars," another country will be targeted next)


The division on social media is, in a way, evidence that society is beginning to recognize the trade-off between "convenience" and "surveillance." The topic of Chinese cars is merely a trigger. What we are truly being asked is how much we will tolerate and where we will draw the line in an era where cars have become "running smartphones."



Source URL