MIUI Privacy en
MIUI Privacy en
MIUI Privacy en
1
MIUI 11 Security and Privacy White Paper
Contents
1 Summary 1
4 Application Security 22
Mi Account 32
Xiaomi Cloud 35
Mi Pay 40
MIUI 11 Security and Privacy White Paper
Mi AI 43
Image Intelligence 46
Location-based Services 48
MiPush 49
7 Peroration 55
Statement
Due to the upgrade, adjustment of Xiaomi products or services and other reasons, the
contents of this document may change. Xiaomi has the right to add, modify, delete and
abolish such contents. Please download the latest version from the official website in
time.
This document is only used as a reference guide for users to understand the information
security and privacy protection of MIUI and Xiaomi Cloud. Xiaomi provides the
corresponding introductions based on the current MIUI version and the main hardware
architecture in service. However, due to the potential problems such as technological
upgrading, product iteration, changes in applicable laws and regulations, and consistency
of wording, Xiaomi hereby explicitly declares that it does not make any express or implied
guarantee for the completeness, accuracy, and applicability of the contents hereof.
The intellectual property rights of all original contents of Xiaomi in this document,
including but not limited to pictures, architecture design, text description, etc., are owned
by Xiaomi Technology Co. Ltd and its affiliated companies (hereinafter referred to as
"Xiaomi") in accordance with law. Without Xiaomi's prior written permission, no unit,
company or individual is allowed to extract, translate or copy part or all of the contents
hereof without authorization.
If any errors occur in this document or you have any questions about the contents hereof,
please contact Xiaomi via email [email protected].
MIUI 11 Security and Privacy White Paper
01
Summary
1
MIUI 11 Security and Privacy White Paper
Summary
As the world's leading smartphone manufacturer, Xiaomi relentlessly builds amazing
products with affordable prices to let everyone in the world enjoy a better life through
innovative technology, which is also act as their corporate mission. In the era of Internet of
Things, given the essential basic needs of security and privacy for products users, Xiaomi
attaches great importance to users' security and privacy.
The MIUI developed by Xiaomi takes security and usability as its core. Every Mi phone
combines software, hardware and services to integrate tightly and work together for end
to end security protection, which includes the basic security capabilities such as hardware
chips, system kernels and data security, as well as information security and privacy
protection of a series of key services such as Mi account, Mi pay, Xiaomi Cloud, voice AI
and image AI.
MIUI's security technology originates from the root of trust built from hardware, and then
transfer the chain of trust to the operating system by secure boot. The running state of
applications is monitored by using and strengthening the Android security kernel to ensure
the security of operating systems and applications. The security of file system and user
data is protected through encryption and data protection functions. The cloud services
are comprehensively protected by division of service function and “Defence-in-Depth”
protection. Figure below indicates the logical structure of Xiaomi MIUI Security and Privacy
White Paper, which is also the narrative structure of this document.
2
MIUI 11 Security and Privacy White Paper
Hardware and System Security: Mi phone is the platform of a software and hardware
integration, which includes hardware-supported TEE, secure boot, security kernel, network
and communication security, device control and system software update.
Encryption and Data Security: The encryption application provided by the data protection
architecture based on MIUI, can not only ensure the security of user data, but also improve
the usability and convenience of MIUI as well.
Application Security: The basic protection mechanism and a series of application security
features enables apps to run with security and protect the security of user data.
Internet Service Security: Capabilities of MIUI to protect users' privacy and data security
for the main internet services by implementing protection measurements to the great
extent.
3
MIUI 11 Security and Privacy White Paper
02
Hardware and System Security
4
MIUI 11 Security and Privacy White Paper
With the tight integration of hardware, system and service, MIUI ensures that every
component has a security verification mechanism from the initial boot, to system software
update, then to the application. These mechanisms ensure that user data is protected to
its greatest extent.
MIUI supports the TEE (Trusted Execution Environment) secure operating system. TEE
is a small, independent operating environment isolated from the main operating system,
allowing applications with higher security and privacy demands to run with isolation from
Android system.
5
MIUI 11 Security and Privacy White Paper
The software and hardware resources that TEE can access are separated from the main
operating system. TEE provides a secure execution environment for trusted applications,
it also enforces the protection of confidentiality, integrity, and access permissions to the
data and resources belonging to those trusted applications. To guarantee the trustworthy
of the root of trust, the TEE needs to be verified and isolated from the main operating
system during the secure boot process.
Inside the TEE, each trusted application is independent from each other, and cannot
access the security resources from another trusted application without authorization.
TEE's internal API mainly includes resources and services such as key management,
cryptographic algorithm, secure storage, secure clock and extended trusted UI.
The trusted UI means that when display sensitive information and perform sensitive operations
(e.g. enter a PIN or password), hardware resources such as screen display and keyboard are
completely controlled by TEE, and the software in Android system cannot access them.
Device Attestation
To ensure the trustworthy of Mi phones, Xiaomi has pre-installed a device certificate in
TEE to uniquely identify each mobile phone, and the public keys of these certificates are
centrally managed by Xiaomi's servers. In the scenarios where a higher level of security is
required, the application can send the verification requests to Xiaomi servers to verify the
authenticity of the device.
The HUK (Hardware Unique Key), which is solidified on the motherboards during initial
manufacture, varies by phone and cannot be tampered with. It is accessible only by the
hardware cryptographic engine, and it guarantees the uniqueness of the keys used for
lockscreen password protection and file system encryption.
Encryption and decryption are very complicated operations, which requires great
computing power. For mobile devices, computing speed, energy conservation and security
are equally important. Mi phone has taken these factors into consideration in its design,
and equipped the device with a high-performance hardware cryptographic engine * to
ensure that the device achieves a balance in terms of running speed, battery life and data
security. The main algorithms supported by the cryptographic engine are:
● 3DES
6
MIUI 11 Security and Privacy White Paper
● AES-128、AES-256
● SHA-1、SHA-256
● HMAC-SHA1、HMAC-SHA256
● RSA-1024、RSA-2048
● ECDSA-256
*Note: Some models are not equipped with hardware cryptographic engines.
Secure Boot
Secure boot is a program that verifies the digital signature of files and applications using
the corresponding public keys to ensure the integrity and authenticity of the boot file or
program, so as to prevent unauthorized programs from being loaded and run during the
boot process.
Under the secure boot mechanism, the digital signature of each boot file (e.g. start the
Bootloader, kernel image, baseband firmware) shall be verified prior to getting allowed to
load and run. At any stage of the boot process, if the signature verification fails, the boot
process will be terminated.
The ROM SoC Bootloader is written into its read-only ROM when the chip is manufactured.
It cannot be modified after leaving the factory. This piece of code is first to be executed
after the device is powered on.
7
MIUI 11 Security and Privacy White Paper
After the device is powered on, the ROM SoC Bootloader will first perform the basic
system initialization, and load the level I Bootloader from the Flash memory chip. It will
then utilize the public key stored in the Fuse space inside the main chip to verify the
digital signature of the level I Bootloader image, and run the level I Bootloader after the
successful verification. After completing the above steps, the level I Bootloader will load,
verify and execute the TEE OS image. Once the TEE OS is in operation, it will verify, load
and execute the level II Bootloader together with Level I Bootloader. The entire system
will be booted in such a manner that ensures the chain of trust is transferred along the
process, and no unauthorized program will be loaded and allowed to run.
MIUI system supports the function of Android's Verified Boot 2.0 (AVB2.0). During the
boot process, before entering the next stage the digital signature of the code must be
verified to ensure its integrity and free of any known security defects. It verifies the
components from the hardware root of trust, to the Bootloader, then to the boot partition
and other verified partitions (including system, vendor and optional OEM partitions). AVB
8
MIUI 11 Security and Privacy White Paper
helps prevent persistent Rootkit from holding ROOT privilege and ensures the security of
the device during boot process.
Security Kernel
MIUI supports Android's native SELinux features, and enforces mandatory access control
on the operations of all resources in the system, such as processes, files, and directories.
Any process that intends to perform operations in the SELinux system must obtain
permissions in the security policy configuration file first. The access control policy file will
be protected during the boot process and is tamper proof by third parties. With SELinux,
MIUI can prevent malicious processes from reading and writing protected data, bypassing
security mechanisms of the kernel, or attacking other processes.
MIUI supports KASLR (Kernel Address Space Layout Randomization) and allocates the
kernel address space layout randomly for each boot. KASLR results in unpredictable
kernel address space layout, and increases the difficulty to perform code-reuse attacks. It
reduces the possibility of many complicated attacks, and further strengthen the security
of the system kernel.
MIUI's WLAN connection supports WEP, WPA/WPA2 PSK, 802.1×EAP, WAPI and other
authentication methods to provide users with different levels of security.
The WLAN hotspot function of MIUI is disabled by default. When the user enables
the function, the WPA2 PSK authentication method is used by default to ensure the
connection security. At the same time, WLAN hotspot function supports the device MAC
address blacklisting.
Fake base station is a type of malicious radio communication device that takes advantage
9
MIUI 11 Security and Privacy White Paper
MIUI provides users with a fake base station protection function * which prevents mobile
phones from connecting to fake base stations. Users can turn on this function through
"Settings"-"Additional settings"-"Privacy"-"protection from fake base stations" (in off
state by default).
*Note: Only the Mi phones with Qualcomm chip support this function.
Through the AI machine learning model of the mobile terminal, the suspected degree
of the fake base station is judged and the fake base station short message is identified
according to the characteristics of the fake base station accessing the mobile phone and
the text characteristics of the fake base station short message.
The WLAN probe sniffer identifies each user by listening to Wi-Fi signals sent by other
electronic devices in the air and obtaining its MAC address from the data packet. MIUI is
capable of sending data packets with random MAC addresses to prevent Wi-Fi probes
from obtaining the real MAC address of the mobile phone *.
*Note: Most devices using MIUI 11 already supports Wi-Fi probe protection in the unconnected state. In
addition, mobile phones upgraded to Android Q support Wi-Fi probe protection in connected state.
Device Control
Find Device
MIUI provides users with the find device function, helping users find lost mobile phones,
and protecting the data security of mobile phones. This function is turned off by default
and can be used only when the user turns it on manually. Once the user enable this
function, in case that the phone is lost, the user can log in to the Xiaomi Cloud web page
10
MIUI 11 Security and Privacy White Paper
Get the current location of the mobile phone through the network or
Locate
short message command, and display it intuitively on the map.
Make the mobile phone ring through the network or short message
Sound
command to find the mobile phone that may be nearby.
In the situations when the user loses the mobile phone or forgets the password of Mi
account, the mobile phone may be locked. MIUI has designed a variety of security policies
to protect user's rights under this circumstance.
After turning on the Find device function, if the mobile phone is restored
Activation
to the factory settings, the credentials used when turning on this
locking
function must be verified before reactivating the device.
11
MIUI 11 Security and Privacy White Paper
In case that the user forgets the Mi account password and cannot
retrieve it, MIUI provides an unlocking code on the mobile phone locking
Customer
interface for the user to unlock the phone through customer service
service
channel. Users who request to use the unlocking code must submit
unlocking
a complaint application, and can only get the phone unlocked after
detailed manual review by customer service personnel.
In addition, when the mobile phone is lost, due to the existence of the screen lock
password, it is very likely that it will be forced to be rooted. MIUI stores the mapping
between the account and the device to its cloud server (some devices write the mapping
into a special partition that is tamper-proof to root), thus ensures its integrity. When
booting, the device is required to connect to the network and obtain the mapping from
the server. If the current login account is different from the record on the server, MIUI will
require the user to switch back to the recorded account before continuing to use it.
On the BL unlocked device, the mobile phone lock can be bypassed by using a non-MIUI system
or tampered MIUI system. However, this kind of ROM cannot use the function of OTA (Over the
Air) and cannot login to Mi account normally. When the devices switches back to MIUI system, it
will be protected by the "Find device" function again.
MIUI users can create a separate space completely independent of the original system
through MIUI second space. This allows the complete isolation of users' accounts,
applications and data from the main space, and separated encryption protection.
Additionally, user can set different unlock passwords for the main space and the second
space, thus realizing a virtual mobile phone experience like having a second device.
Users can save all kinds of private files, pictures and other information, install private
applications, etc. Moreover, this independent space is similar to a "sandbox". Any
operation in this "sandbox" will not affect the main space of the mobile phone.
12
MIUI 11 Security and Privacy White Paper
For applications that use device policy manager permissions abnormally, the system control
policy shall be implemented according to the MDM standard, including but not limited to:
suggest the user to close the application through obvious reminders, and prohibit the
application from obtaining service or permission interfaces.
For applications that can cause harm to user data or device security through the use
of the device policy manager, the following operations will be strictly performed: the
application will be taken off from the Xiaomi GetApps, and it will be prohibited to obtain
relevant service interfaces or displayed in the device policy manager application list.
Before the system software is updated, the system update program verifies the integrity
of the ROM which is downloaded via OTA or copied offline. It verifies the size and hash
value of the file, etc. After the verification is passed, the mobile phone restarts to initiate
the underlying recovery mode, and verifies the integrity of the signing key again. Only
after the verification is passed, will the recovery mode write the updated contents of ROM
into the system storage.
13
MIUI 11 Security and Privacy White Paper
03
Encryption and Data Security
14
MIUI 11 Security and Privacy White Paper
In MIUI, the key used for file encryption is encapsulated by Class Key, which is encrypted
and protected by Keymaster Key derived from Hardware Unique Key (HUK), and users need
to be authenticated and authorized through lock screen password or fingerprint before
decrypting data by Class Key.
15
MIUI 11 Security and Privacy White Paper
*Note: This schematic diagram is suitable for Mi phones that use Qualcomm chips and support FBE.
Each Mi phone that supports FBE contains two storage positions for a user:
● Credential Encrypted (CE) storage area: CE area is the default storage area and only
accessible after the user has input their authentication credentials.
● Device Encrypted (DE) storage area: DE area is accessible after the device has
powered on regardless of whether screen is unlocked.
Credential Encrypted (CE) storage area is the default storage area of applications to
store data in MIUI to ensure application security and application data security. Applications
(e.g. wireless authentication, alarm clock, ringtone, Bluetooth, etc.) only store some data
in device encrypted (DE) storage area to ensure that some necessary services can be
running before users provide credentials and simultaneously the system can still protect
user private information.
Secure Storage
The secure storage function of MIUI is achieved by a TEE-based Secure File System
(SFS), which is used for the secure storage of sensitive information (e.g. keys, certificates,
fingerprint templates). The trusted application (TA) running in the TEE uses a storage API
to encrypt and store data. The encrypted data is only accessible to the TA, but cannot be
accessed by external applications. The secure storage in MIUI adopts AES-256 encryption
16
MIUI 11 Security and Privacy White Paper
algorithm. The secure storage keys are derived from the hardware unique key (HUK) and
stored in TEE. Data encrypted using the keys cannot be decrypted outside the TEE.
MIUI further provides Flash-based RPMB (Replay Protected Memory Block) to protect
certain system data from unauthorized deletion and access. RPMB is directly controlled by
the TEE and bound with the keys derived from the hardware unique key (HUK). Only the
TEE can access the RPMB-protected data, and the external Android does not provide any
interface for accessing the RPMB. RPMB defends replay attacks through built-in counters,
keys and HMAC verification mechanism to ensure that data cannot be maliciously
overwritten or tampered with.
Secure Erasure
The common "Reset phone" does not allow users to thoroughly erase data stored in
physical storage. In order to improve efficiency, it is usually implemented by deleting
logical address. However, physical address space is not actually cleared and the data can
be restored. MIUI provides users with the option of "Format mock SD card" when they
want to reset phones. Once the option is chosen, the system will format the storage
space and completely erase the data to protect data security for users who want to resale
or dispose of devices.
Key Management
The MIUI's key management function allows application developers to manage the
lifecycle of keys and certificates, and provides remote certification for device certificates
in the TEE. Key management has the following functions:
MIUI's key management provides a key storage mechanism protected by hardware. The
key generated in the application is encrypted and can only be used by the corresponding
device.
2) Encryption and decryption
When applications need to use the key, the previously generated encrypted key and the
data to be encrypted are sent back to the TEE of the corresponding device. Data can only
be encrypted and decrypted using keys in the TEE of the corresponding device.
3) Key attestation
In each Mi phone, the device certificate issued by Google is injected during manufacturing,
17
MIUI 11 Security and Privacy White Paper
and any generated key can be authenticated through the Google's certificate. The
network service can authenticate MIUI devices by key attestation function.
The technical basis of MIUI's key management is Android Keystore which prevents
the unauthorized use of key materials outside of and on the device by key extraction
prevention and key use authorization:
1) Extraction prevention
Key material can be protected from unauthorized use outside of MIUI devices. When an
application performs encryption operations using an Android Keystore key, behind the
scenes plaintext, ciphertext and messages to be signed or verified are fed to a system
process which carrying out the encryption operations, rather than application process.
Therefore, even if the application process is compromised, the attacker may not be able
to extract the key material.
At the same time, MIUI also bounds key material to the secure hardware (e.g. TEE) of the
Mi phone, so key material is never exposed outside of secure hardware. Even if the MIUI
OS is compromised or an attacker can read the device’s storage area, the key material
bounded to secure hardware cannot be extracted from the device.
2) Key use authorization
In order to mitigate unauthorized use of keys on the MIUI device, Android Keystore lets
applications specify ways of authorized use of their keys when generating or importing
them. Once a key is generated or imported, its authorization cannot be changed.
Authorization are then enforced by the Android Keystore whenever the key is used.
Supported key use authorizations in MIUI fall into the following categories:
● Cryptography: authorized key algorithm, operations or purposes (encrypt, decrypt,
sign, and verify), padding scheme, block modes and digests with which the key can be
used.
● Temporal validity interval: interval of time during which the key is authorized for use.
● User authentication: the key can only be used if the user has authenticated recently.
Encryption Application
Fingerprint Recognition
18
MIUI 11 Security and Privacy White Paper
MIUI's fingerprint data is encrypted using AES-256, which is achieved by invoking Keystore.
The key for encrypting fingerprint cannot be obtained externally, ensuring that user's
fingerprint data is not leaked. The MIUI does not send or back up fingerprint template data
to any external storage media including cloud servers.
Face Recognition
Face recognition uses the facial feature that is a biometric identification technology to
identify personal identities. Based on the AI face recognition algorithm, MIUI intelligently
detects facial features for high-precision matching, and the device is unlocked after a
successful match.
The user's face feature data belongs to personal biometric information in personal
sensitive information. In order to ensure security, MIUI collects facial images, extracts
features, compares features in the TEE, and facial data cannot be transferred outside of
the TEE. Android external third-party applications can only initiate facial authentication
19
MIUI 11 Security and Privacy White Paper
and receive authentication results by the external facial framework, and cannot collect
facial data.
The facial feature data is encrypted and decrypted using built-in security chip, and key for
encrypting facial data cannot be obtained externally, ensuring that the facial feature data
is not leaked. The MIUI does not send or back up facial features to any external storage
media including cloud servers.
Electronic Identification
The MIUI's mobile wallet client supports the whole lifecycle management of eID, which
allows users to open, download, use and deregister personal eID on the phone at any time.
MIUI screen lock passwords support patterns, digits and hybrid characters, each of which
has a minimum password length requirement to ensure a more secure password.
● Hybrid password: support 4-16 bits of any combination of uppercase and lowercase
letters, numbers and symbols.
20
MIUI 11 Security and Privacy White Paper
MIUI screen lock passwords are protected by the hardware unique key (HUK) and
encrypted in the TEE. When a user creates or modifies a lock screen password, or unlocks
the screen using the screen lock password for verification, the screen lock password is
processed in the TEE.
The MIUI limits the times upon input of incorrect password. After attempting incorrect
password multiple times in succession, the phone will be locked to prevent the screen
lock password brute forcing.
With the increase of built-in account system applications, it is more difficult for users to
set different high-strength passwords for each application of phones and users often
forget usernames and passwords. Smart password manager * is a secure account password
management tool created by MIUI for users. Smart password manager is provided to
store application login information (usernames and passwords) centrally and associate
login information with touch fingerprints and screen lock passwords. When users log in to
applications, login information is auto-filled, making it easy to use strong passwords.
Currently, smart password manager does not provide cloud synchronization and cloud
backup and can only be used after being authorized by user on the device, so there is no
need to worry that the managed password bank will be stolen or cracked.
21
MIUI 11 Security and Privacy White Paper
04
Application Security
22
MIUI 11 Security and Privacy White Paper
Application Security
On the basis of MIUI's underlying hardware security, system security framework and data
security protection mechanism, the application runtime environment is protected through
application layer security technologies, such as application signature, runtime protection
and application security testing.
At the same time, MIUI further provides a series of security functions for users to choose,
thus achieving further data security and privacy protection, such as: App lock, secure
keyboard, blocklist setting and private space.
MIUI verifies the integrity and sources authority of the application package (hereinafter
referred to as "APK"), in order to:
The developer generates the public key and the private key, signs the APK with the private
key, and packages the public key into the APK. When the application is installed, the public
key is used to verify that the APK has not been tampered with.
When updating the installed application, the application signature verification is also
required. Only application with the same signature as the updated application are allowed
to be updated, so as to prevent malicious applications from replacing existing applications.
The APP ID of the APK and the certificate used to verify the signature are signed with the
official private key. If developer A signs developer B's APK with his own private key and
packages this certificate file into the APK, the official signature verification will fail when
developer A uploads it to the application store.
The permission list, APP ID and certificate are all signed with the official private key. When
installing the application, the consistency of the permission list and the system service
actually called, and if not, the calling of MIUI service will fail.
23
MIUI 11 Security and Privacy White Paper
Runtime Protection
MIUI supports Android native Address Space Layout Randomization (ASLR) and Data
Execution Prevention (DEP). ASLR is a security technique used to prevent the exploit
of buffer overflow vulnerabilities. It randomizes the layout of linear areas such as heaps,
stacks and shared libraries, making it harder for attackers to predict target addresses and
preventing them from locating attack code, which leads to reduced overflow attacks.
ASLR makes it more difficult for attackers to take advantage of memory vulnerabilities.
DEP marks specific memory areas as non-executable to prevent attacks exploiting
memory vulnerabilities.
24
MIUI 11 Security and Privacy White Paper
In addition, MIUI also uses the application sandbox mechanism of native Android to ensure
that each application runs in the sandbox and is isolated from each other, thus ensuring
the security of the runtime application.
Xiaomi GetApps conducts automatic testing, security scanning and manual review on each
application to ensure the source security of the application.
For the device, MIUI provides system protection and detection mechanisms such as virus
killer embedded with various antivirus engines and application installation monitor.
In addition, the "Security"-"Solve problems" also provides ROOT security detection and
anomaly detection of mobile phone performance, operation, power consumption, etc. to
protect application security. The following functions are included:
Power
consumption Detect whether there are too many auto-boot applications (more
anomaly than 5), and whether the hot spot has turned on.
detection
Detect whether the system is rooted, and prompt the user that
Other anomaly
the application cannot be installed when the storage space is less
detection
than 5%.
25
MIUI 11 Security and Privacy White Paper
payment risk.
MIUI has a built-in white list of payment applications or pages, which will only take effect
when users open the any listed application or page. The list covers common mainstream
applications in the market. Relevant detections include:
Wi-Fi security
Detect whether Wi-Fi is at risk.
scanning
Input method Detects whether the user's input method is an authorized secure
security detection input method in the white list.
On this basis, MIUI adds a number of custom permissions such as auto-boot management,
chain start management (mutual wake-up), background pop-up window notification,
lock screen display notification, etc. to restrict various behaviors such as long-term
background process of applications, non-reason mutual wake-up, malicious promotion.
MIUI monitors the behavior of calling the camera and microphone in the background *. If
such behavior is found, it will prompt in the status bar and send out the color prompt of
notification light to warn the user.
26
MIUI 11 Security and Privacy White Paper
MIUI uses “*” to partially shield private information involved in Android native logs (such
us base station location, IP address and device identifier) in order to further protect the
private information.
The App lock can not only protect the security of application data, but also prevent the
private information in the application from being seen by others.
MIUI users can enter the "App lock" module through "Apps" and set various styles
of unlocking passwords (patterns, digits and mixed) for the application. Through this
module, users can set to lock after exiting the application or one minute after exiting the
application, and then verify the App lock when opening the application again after locking
the screen. In order to increase the convenience and security of unlocking, MIUI adds a
fingerprint biometric unlocking mechanism.
Secure Keyboard *
The user sets to enable the secure keyboard in "Settings"-"Languages & input"-"Secure
keyboard". MIUI automatically enables the secure keyboard when inputting the password.
The secure keyboard does not have association and memory function, as well as network
27
MIUI 11 Security and Privacy White Paper
Some bank APPs use self-developed input methods, and the MIUI secure keyboard will not take effect.
Website Detection*
Aiming at the increasingly severe network security situation, Xiaomi provides malicious
website detection service, which identifies malicious websites based on a massive website
category knowledge base. When users access malicious websites by Mi Browser, short
messages or other accesses, pop-up windows will prompt risk notification. The service
has the following characteristics:
● High throughput: Enable to support 25 million website detection requests per day.
● Low latency: The average response time of the service is within 100ms.
● High detection accuracy: The detection accuracy rate of millions of labeled samples is
above 97%.
● Protect user privacy: No other information will be collected except the websites.
Blocklist Setting
MIUI blocklist setting can provide users with comprehensive blocklist setting functions,
which are able to effectively intercept unwanted phone calls and spam short messages
such as advertising promotion and real estate intermediary. Users can quickly add phone
numbers from "Call records" and "Contacts" to the black/white list. Users can also add
regions to the white/black list to intercept phone calls and release known numbers. The
28
MIUI 11 Security and Privacy White Paper
real-time updated yellow pages database can provide users with accurate yellow pages
information of numbers and prevent users from being bothered by strange numbers.
MIUI provides a variety of interception rules that users can manually configure as needed.
These configurations can be backed up to the cloud to implement functions such as
cross-terminal synchronization:
● Blacklist and whitelist keywords: Release short messages containing whitelist keywords
and intercept messages containing blacklist keywords.
● Blacklist and whitelist area: Release phone calls and short messages of whitelist areas
and intercept phone calls and short messages of blacklist areas.
● Smart interception: Filter unwanted calls and spam short messages through yellow
pages database and interception engine.
*Note: The functions of blacklist areas, call forwarding and overseas number are available in mainland China;
the smart interception is available in mainland China and India.
Private Space
MIUI provides users with a series of private space functions such as private short
messages, private photo albums, private folders and private notes.
29
MIUI 11 Security and Privacy White Paper
Users can also set whether to display private short message notifications on the
conventional interface.
If users set up the second space on their device, the above functions will jointly change
to: Display private content in the second space and regular content in the main space.
30
MIUI 11 Security and Privacy White Paper
05
Internet Service Security
31
MIUI 11 Security and Privacy White Paper
Mi Account
Mi Account is an identification used to identify Xiaomi users. Users can use a series of
products and services provided by Xiaomi through Mi account, including but not limited
to Xiaomi Cloud, Mi Pay, Xiaomi Online Store, Mi Home APP, Mi Community, Mi Music, etc.
Users can also purchase Mibi through Mi account to use Xiaomi's various virtual products
and value-added services (e.g. games, e-books, etc.).
In order to prevent unauthorized use, Xiaomi has taken the following technical measures
and management measures to ensure the security of users’ accounts.
When registering or changing passwords, users need to set a strong password with 8-16
characters, including at least two of the following three types: numbers, letters and
special symbols. After the successful login, users can add a recovery phone number or a
recovery email to the Mi account, set the security question *, and turn on the cross-device
authentication in the account security settings. These security authentication methods
will be used to verify users’ identity when they change account information or reset the
password.
Login Protection
The login of Mi account is protected by account smart risk control service, effectively
reducing the risk of unauthorized login and account theft.
When users log in, in order to ensure the login security, Mi account will detect the login
environment and users’ operation methods. After login failing for several times, Mi
32
MIUI 11 Security and Privacy White Paper
account will switch to the interactive verification method such as picture verification
code, sliding or clicking on picture for environment security detection. When abnormal
login is identified, if it is determined as a login risk, users are required to carry out extra
secure authentication. If it fails, the services allowed to be accessed for this account will
be restricted according to the risk level. When identified as a serious risk, this account will
be frozen and forced out of all current logins, and the current password cannot be used or
reused.
Abnormal login behaviors defined by the account smart risk control service include:
● Log in Mi account in untrusted environment.
● Access private data (e.g. Use web pages to view albums, short messages, contacts,
etc. stored in Xiaomi Cloud).
● Modify the settings in "Security" (e.g. The change bound recovery phone number or
email, etc.).
Verification methods include but are not limited to cross-device verification, short
messages verification and email verification.
When the user’s behavior of an account changes (e.g. change the password, log in the
Mi account on a new device, etc.), if it is determined as an abnormal risk, Xiaomi will send
an e-mail and messages to notify the user, prompting the user to change the password
immediately.
In addition, Mi account has the following secure features to further ensure account login
security:
● Identify the secondary recycling phone number in various ways. While guiding new
users to register Mi account, the original users are prohibited from using the same
phone number to log in Mi account.
● APP whitelist technology is introduced when third-party applications call Mi account
for login, which means only authorized applications can call Mi account.
● When the system distributes domain names and IP, it uses the interface independently
developed by Xiaomi to prevent Mi account from DNS hijacking during login.
Data Security
Xiaomi encrypts the personal information entered during registration, including:
33
MIUI 11 Security and Privacy White Paper
When the user registers or logs in the Mi account, the account-related information is
transmitted to the server over HTTPS encrypted channel. Users’ personal information is
encrypted and stored in a specialized database and carried out multi-copy backup. The
security protection degree of the backup data is equivalent to that of online data. Xiaomi
performs role-based multi-level access control on user data and accepts corresponding
security audits.
The encryption and decryption keys of user data are managed by the Key Center key
management platform independently developed by Xiaomi. The platform is operated
and maintained by an independent team to separate the management responsibilities of
business, data and keys. Role-based access control ensures that no individual can obtain
all the permissions required to decrypt user data. In addition, the servers and databases
that store user data have also deployed real-time monitoring mechanisms to alert
abnormal access behaviors.
34
MIUI 11 Security and Privacy White Paper
In order to ensure the security of the key stored in Key Center, keys are encrypted by a
4096-bit Root Key, and the Root Key is generated by a hardware encryption machine.
Mi account provides QR code scanning login function. Users can scan the QR code on the
web page to log in Mi account. The QR code will be invalid after a certain period of time,
and the user needs to refresh the QR code web page.
Mi account supports the binding authorization of third-party accounts, which means users
can log in Mi account using third-party accounts. Currently, users in China area can login
by accounts of Weibo, WeChat, Alipay and QQ, while users in overseas area can login by
accounts of Facebook and Google. Mi account adopts OAuth2.0 (Open authorization
standard), which follows the standard OAuth2.0 protocol and process to authorize third-
party account login. The secure mechanism of OAuth2.0’s ensures that Mi account
related information will not be transmitted to third parties.
Xiaomi Cloud
35
MIUI 11 Security and Privacy White Paper
Xiaomi cloud can store the user contacts, messages, albums, call records, notes and other
information, and allow these information to be automatically synchronized among user
devices. At the same time, users can retrieve data as much as possible when the device is
damaged or lost. Users can browse and manage their own data anytime and anywhere on
other devices or through the web (https://i.xiaomi.com).
After users turns on the Xiaomi cloud service, they can choose to synchronize the
following data contents or set it to "Off" at any time.
36
MIUI 11 Security and Privacy White Paper
Browser synchronization The user's local browser bookmarks, history, labels, etc.
Album synchronization The data in the local album and the data in the folders
specified by the user to be synchronized
Security center/Device The black and white list of the contacts set by the user, VIP
manager list, DND mode, etc.
37
MIUI 11 Security and Privacy White Paper
the algorithm is embedded in the Xiaomi cloud server. When the photos are automatically
synchronized to the user's cloud space, the picture smart algorithm model is invoked to
classify the photos. Afterwards, the category labels are distributed to the album on the
device, and the classified photos can be browsed in the album.
Data Security
In order to prevent user data from being stolen or tampered, HTTPS encrypted
communication channel is used for transmission among Web terminal, phone and server
during the data synchronization process. In addition, the Cloud service website has a 15
minutes session time-up and auto logoff mechanism.
During the data storage process, each file has been divided into multiple blocks, with
each block encrypted separately using AES algorithms with key length of at least 128-
bit, namely that, in absence of the key, the data cannot be decrypted even with physical
access to the disk.
38
MIUI 11 Security and Privacy White Paper
In order to prevent the loss of users' cloud storage data due to force majeure factors,
Xiaomi has chosen several public cloud service providers to provide data storage and
backup services. For public cloud service providers that store user data, Xiaomi has
formulated strictly secure requirements and evaluation standards, and has strictly selected
service providers that meet the requirements. Xiaomi only stores the encrypted data
blocks on the third-party public cloud and will not share the encryption keys.
Users have the right to change or delete the data uploaded to cloud space. When the user
deletes the data proactively, the corresponding data in the cloud space will be marked as
deleted and temporarily stored in the recycle bin. Within 30 days, the user can still recover
the data through the recycle bin to reduce the loss caused by the unintended deletion.
Data emptied manually or automatically after 30 days in the recycle bin will be
permanently deleted from the server and cannot be recovered. If the user unsubscribe
the Mi account, the user data in the cloud space will also be completely deleted.
39
MIUI 11 Security and Privacy White Paper
Mi Pay
Mi Pay is a mobile payment service provided by Mi Wallet. Mi Pay can complete the
payment after verify the user's fingerprint, instead of the verification of the bank card
and PIN. In order to ensure payment security, at the hardware level, Mi phone implements
hardware level encryption of payment fingerprint information and safe storage of bank
card information to achieve physical isolation of payment information; at the system
software level, MIUI will automatically detect whether the payment environment is secure
and reliable when paying. Meanwhile, the transaction only occurs among users, merchants
and card issuers, which means Mi Pay service does not collect any transaction information
of users during the payment process.
Mi Pay Component
● Secure element: the Secure Element (SE) is an industry-standard, certified chip
running the Java Card platform, which complies with digital payment requirements in
the finance industry.
● NFC controller: The NFC controller processes the Near Field Communication (NFC)
Protocols, transmitting information between the App processor and the secure
element, and between the secure element and the POS terminal.
● Mi Wallet: Users can add bank cards to Mi Wallet, manage and view the added cards,
and query other information provided by card issuers (e.g. privacy policy of card
issuers, recent transactions, etc.). They can also add and manage transit cards, virtual
access cards, etc. in Mi Wallet.
● TEE: On Mi Phones, TEE is responsible for managing the fingerprint verification process
to ensure the transaction security.
● Mi Pay server: Mi Pay server manages the settings of bank cards, transit cards and
virtual access cards in Mi Wallet, as well as the device card numbers stored in the
secure element. The Mi Pay server can communicate with the device and the card
issuer server.
*Note: The functions of transit card and virtual access card are only available in some models.
40
MIUI 11 Security and Privacy White Paper
The secure element includes dedicated applets for managing Mi Pay, as well as applets
certified by payment network or card issuers. Encrypted bank card information sent by
payment network or card issuers is stored in these applets and protected by the security
function provided by secure element. During the transaction, the POS terminal uses a
dedicated hardware bus to communicate directly with the secure element through the
NFC controller.
As the access gateway to the secure element, the NFC controller ensures that all
contactless transactions are made through POS terminals located within the close range
of the device, and the NFC controller only marks contactless payment requests from POS
terminal in the radio frequency field as communicable requests.
When the user uses the fingerprint to complete Mi Pay payment, the NFC controller will
send the contactless response prepared by the payment applet embedded in the secure
element to the radio frequency field. The payment authorization details of the transaction
are encrypted by the secure element and then sent directly to the payment network
without being disclosed to the App processor.
When users add bank cards to Mi Pay, information such as card number, expiration date
and CVV code is needed. Users can manually add this information in Mi Wallet. They can
also use the camera or NFC Reader/Writer application on the device to automatically
enter the information and the captured bank card identification information will be
released from RAM immediately after it is successfully entered, and will not be saved on
the device or uploaded to the server.
After the bank card information are entered, Mi Wallet will send the card number to the
Mi Pay server and then transmit it to the card issuer for verification. Mi Wallet will return
the bank’s user agreement to the user after passing the verification, and only after the
user accept the agreement can the adding process continue. Other bank card information
filled in by the user subsequently will be encrypted by the "UnionPay Editor Control Class
for Security Service" and then sent to the Mi Pay server, which will then transmit the
information to the card issuer. Meanwhile, Mi will also share the device model, SE number
and the approximate location of the user when adding the bank card (if the user currently
41
MIUI 11 Security and Privacy White Paper
enables the "Location Based Services") with the card issuer. The card issuer will determine
whether to approve the addition of bank cards to Mi Pay based on the above information.
Payment Authorization
On devices equipped with TEE, the SE will allow payment only after receiving authorization
from TEE. On Mi phone, users can authorize payment through fingerprint authentication.
TEE and SE are connected through the serial interface, and ECC encryption algorithm is
used for data signature based authentication to ensure communication security. In order
to further enhance the payment security, MIUI implements activation controls for Mi Pay,
which means that the fingerprint authentication for Mi Pay card payment is required by
default.
Users can login to Mi Wallet and manually remove the added bank cards. For the added "Mi
Pay bank card", when "Lost Mode" or "Clear Data" function of "Find Device " is on, Mi Pay
42
MIUI 11 Security and Privacy White Paper
will notify the card issuer to stop the card in Mi Wallet automatically. Even if the device
is not connected to the network, the payment network or the card issuer can disable the
payment of the card on this device. In addition, the user can also suspend or remove the
bank card by making a phone call to the card issuer.
Mi AI
Users can wake up the supported smart device by saying Mi AI” to start a conversation,
check weather, make phone calls, control smart home devices, etc. Developers can make
users interact with hardware devices (e.g. phones, televisions, speakers, etc.) based on Mi
Speech Engine of AI technology.
Basic Architecture
1) Automatic Speech Recognition (ASR) module is responsible for translating the spoken
language into text;
3) Intelligence Search Engine & Execution (ISEE) module is responsible for controlling
smart home devices through commands converted from the text, or searching high-
quality content and services (e.g. music playing, weather query, etc.) to respond in the
results that best meet the user’s needs and the current context;
4) Text To Speech (TTS) module converts return results of Intelligence Search into voices
as outputs by converting text into voice, and then integrates with above modules to
achieve smooth and natural human-computer interaction.
43
MIUI 11 Security and Privacy White Paper
When the user says "xiao ai tong xue", the device will start to record user's voice, and
recordings (including subsequent speech commands) will be sent to the server. The voice
transmitted to the microphone will not be recorded and uploaded before Mi AI wakes up.
When user is using Mi AI, data (e.g. Mi Account, Hash of IMEI, etc.) that can identify the
user will be uploaded through the encrypted transport layer. These data cannot be directly
related to recordings of the user in the server because Mi Account will be mapped to the
pseudonymized random ID.The ID mapping form is encrypted and stored in a database
isolated from other user data, and keys are stored in Key Center. No personnel in Xiaomi
can be granted access to the ID mapping form and keys simultaneously.
Recording segments uploaded to the server are trained with speech model using speech
recognition module to optimize the accuracy of speech wake-up and recognition. These
recordings are only associated with the above-mentioned randomized and encrypted ID
and cannot be used to identify the user.
44
MIUI 11 Security and Privacy White Paper
Users of Mi AI can record voiceprint* himself, then only the voice mapping with the preset
voiceprint can wake up the device. Also, the feature of voiceprint is only associated with
the above-mentioned randomized and encrypted ID and cannot be used to identify the
user.
The user who has upgraded Mi AI to v4.8 can make the following settings through Privacy
Switch * in MIUI or voice device APP:
● Whether upload wake-up audio frequency and voiceprint data and use them for the
optimization of speech wake-up.
*Note 2: The setting path and content of Privacy Switch are different for some devices.
When the user calls someone in contacts using Mi AI, Mi AI can screen out the closest
one or multiple contacts according to the provided name. The screened data encrypted
by AES-128 are uploaded to the server via encrypted transport layer to be processed by
NLP. The NLP processed data are then downloaded to the device to match the phone
number so that Mi AI can make the phone call. When making phone calls, phone numbers
in contacts will not be uploaded, and contact names will not be stored in the server.
In addition, to improve the accuracy of speech recognition, users can set whether to train
the data of contacts name using ASR through the privacy switch in MIUI or voice device
APP. Name data will not uploaded to the server.
Voice Broadcast
When user turns on the voice broadcast function, Mi AI can broadcast messages, missed
calls, WeChat messages, etc for user. TTS can only be run on the device, so the message
content and user data will not be uploaded to the server.
When user log in smart home devices with the same Mi account, the devices supporting
Mi AI can be controlled by Mi AI.
For device control, when users send a voice command* to Mi AI, Mi AI will connect with
45
MIUI 11 Security and Privacy White Paper
Mijia server and obtain the devices information (e.g. device name, room, status, etc.)
under the Mi account. These information stored in the Mi AI server are only used for
device control rather than analyzing user's living habits or interests.
*Note: For Mi TV control, user need to match Mi AI with nearby Mi TV through WIFI scan or Bluetooth and
obtain the MAC address at first.
Data Minimization
Mi AI strictly follows the principle of data minimization for collecting and sharing user
data, which means Mi AI only collects or shares the least data fields to achieve business
functions, for example:
● Xiaomi may cooperate with external service providers to use their ASR and TTS
capabilities as backup resource (e.g. multilingual translation) under specific scenarios.
While invoking relevant APIs, Mi AI will not provide any other user personal data
for partners except for the audio frequency to be recognized and the text to be
synthesized.
Data Security
All the data, transmitted among user devices, servers and third parties, are encrypted at
the transport layer over HTTPS or encrypted WebSocket. User’s Mi accounts, device
identifiers and the above-mentioned random IDs are encrypted by AES-128 and stored
in the database. The encryption and decryption keys are stored in the Key Center.
Xiaomi performs role-based and multi-level access control for user data and accepts
corresponding security audits.
Image Intelligence
Image intelligence provides MIUI users with smart album, image recognition, smart camera
and other services based on smart vision processing technology:
● Smart album can help users edit, manage and use pictures conveniently. It provides
46
MIUI 11 Security and Privacy White Paper
The AI algorithms for image are trained in the research and development environment.
Afterwards, the algorithm model will be embedded in MIUI's photo album and camera.
Iteration of the model is achieved by the upgrade of photo album and camera. Users'
personal information will not be used for the development, testing and optimization of the
algorithm.
When users use the services provided by image intelligence, Xiaomi only collects the user
data which is necessary for service providing, and all functions are given priority to be
implemented on the device. When the user chooses to use the smart photo classification
function of Xiaomi Cloud, user data will be uploaded to the server in an encrypted manner,
see Section 5.2.2 hereof for details.
47
MIUI 11 Security and Privacy White Paper
Location-based Services
Location-based Services of Xiaomi provide device-based positioning capabilities for
Xiaomi and third-party applications and websites on MIUI, including GPS, network
positioning and hybrid positioning. The information collected by various positioning is as
follows:
● Network positioning: the collected information includes Wi-Fi hotspot and base station
information.
Wi-Fi hotspot information includes: name (SSID), MAC address (BSSID), Received
Signal Strength Indication (RSSI), channel (FREQUENCY) of the connected and
scanned AP.
The base station information includes: Mobile Country Code (MCC), Mobile Network
Code (MNC), Location Area Code (LAC), Cell Identity (CID), and Received Signal
Strength Indication (RSSI) of the connected and scanned base station.
● Hybrid positioning: Base on GPS and then combine the GPS data with the data of
network positioning and sensor.
When location services are turned on by users and there are applications request to
receive location data, location-based services will upload the Wi-Fi hotspot information
and base station information near the device to the server in an anonymous and
encrypted manner. These data will be used to expand the crowd-sourced database of Wi-
Fi hotspot and base station locations and cannot be used to identify the user's identity.
The data collected from location-based services are from API with authentication
mechanism, encrypted using AES-128 (AES session key interacts with the server by Pre-
shared key) and encoded using Base64, and then transmitted over HTTPS.
Users can determine whether to turn on the location-based services through the "Location-
based Services" switch and the setting path in MIUI is "System Security"-"Privacy Settings"-
"Location Information".
48
MIUI 11 Security and Privacy White Paper
MiPush
MiPush provides developers with the service of pushing messages to client applications in
real time by establishing a stable and reliable long connection between the cloud server
and the client.
MiPush supports notification bar messages and pass-through messages, and also provides
two message distribution channels, API and operation platform respectively. MiPush
SDK supports Android, iOS client and server mainstream languages, which can help the
developers to better meet the complex business needs based on their own business logic.
● Developers shall agree that MiPush collects, stores, uses, discloses and protects
personal information in accordance with Xiaomi Privacy Policy, in order to use MiPush
Service.
● Developers shall develop and publish the privacy policy and obtain the consent of
end users. Moreover, the standards for the policy must be no lower than the privacy
protection standards of MiPush.
● Mi strongly recommends that the developers include the critical clauses from Xiaomi
Privacy Policy in their end user-facing product privacy policy to ensure that end users
agree MiPush Service to collect and use the data. Developers shall not use MiPush
Service without end user consent.
49
MIUI 11 Security and Privacy White Paper
● Mi requires developers to comply with all the laws, regulations, policies and industry
standards applicable to MiPush Service regarding to end users' personal information
protection.
MiPush does not use the device identifier (e.g. IMEI) directly to identify the device,
but processes the user's personal information through technical methods such as de-
identification. MiPush hashes the three device identification parameters (device identifier,
serial number and AndroidID) on the device and uploads the generated string to the
server. On the server side, the string is mapped to a random ID which will be returned to
the client. MiPush uses this random ID as the unique identifier of the device.
Data Minimization
MiPush is only used as a message channel and would not extract and use the content
of the message, the user behavior and preferences. The original data, intermediate data
and statistical results by MiPush will not be provided for Mi's partners, nor will partners
be allowed to access these data in any form; MiPush only provides developers with the
background statistics including time and message status dimensions, excluding any
personal information of users.
When the mobile APP initiates a registration request to the MiPush server for the first
time, device information (the device identification field is irreversibly hashed) will be sent
to the server, the server will return the random ID and message content key subsequently.
HTTPS is used to encrypt the data in transit during this process.
MiPush Service requires developers to use HTTPS protocol to send the message content
to the server. The communication between various modules of the server is encrypted
using AES-128 algorithm. After the message is encrypted by symmetric encryption
algorithm, the ciphertext is pushed to the device through AES-128 encrypted channel
established between the server and the device, in order to achieve double encryption.
Data Deletion
Once the message is successfully delivered, the message content will be deleted from
the server. If the message is not delivered due to abnormal circumstances, the server will
keep the message content for 14 days; MiPush Service provides developers with a user
50
MIUI 11 Security and Privacy White Paper
data deletion API that can be invoked to delete the MiPush registration information of the
APP. If the device is not connected to the network within 90 days, the message content
related to the device will also be deleted from the server. If the developer stops accessing
MiPush service or requests to stop the push service, Xiaomi will delete all relevant APP
information according to developer's instructions.
51
MIUI 11 Security and Privacy White Paper
06
Security Certification and Privacy Policy
52
MIUI 11 Security and Privacy White Paper
Upholding the principle of respecting and protecting the privacy of users and let everyone
in the world enjoy a better life through innovation technology, Xiaomi is always committed
to providing the trusted products for users.
To make the most of the extensive implementation of the information security and
privacy protection policies, Xiaomi has formally established the Information Security and
Privacy Committee in 2014, and set up a comprehensive security management system
through technical protection measures, policies and processes, assessment and audit
mechanism, etc. At the same time, in order to comply with the requirements of laws and
regulations of all the countries we serve, Xiaomi has employed the experienced local
lawyers as the data protection officers of Europe union business.
To provide the users with services which complies with laws, regulations and industry
standard requirements, Xiaomi has carried out global compliance projects and been
auditing by external regulatory authority regularly. The internet services of Xiaomi
comply with the requirements of cyber security multi-level protection and have passed
level 3. The infrastructures, development, operations, maintenance and internet services
supporting products and services of MIUI complies with international authoritative
certification system, and have passed the ISO27001, ISO27018 and ISO29151 certifications
of the British Standards Institute (BSI). MIUI operating system, its built-in applications and
cloud services have been evaluated and certified by TrustArc, world's leading data privacy
compliance company. Xiaomi's privacy policies and privacy practices conform to TRUSTe
enterprise privacy standards, and have been granted the TRUSTe Privacy Certification
Seal.
53
MIUI 11 Security and Privacy White Paper
Xiaomi respects and protects the personal privacy right of all users. The privacy
introduces in detail about how Xiaomi collects, uses, discloses, processes and protects
the information you provide to us or we collected while you are using Xiaomi products or
services. Links of privacy policies in different languages: https://privacy.mi.com/all.
*Note: Some products have separate privacy policy links, which can be viewed on the corresponding product
page.
Xiaomi owns a professional security and privacy team, which is responsible for providing
technical support for the security and privacy of Xiaomi products, as well as review
and test of security and privacy for developing and released products. Meanwhile,
Xiaomi collects security issues and security intelligence from researchers around the
world through a range of channels such as the self-built Xiaomi Security Center (SRC),
Hackerone and mailbox, and rewards them according to the priority of the issue or
intelligence.
At the same time, Xiaomi put forward "Xiaomi Smart Life Security Guard Program" and
actively invites security researchers to carry out security tests on Mi products with high
bonuses. Xiaomi will award the confirmed security issues a high priority and solve them as
soon as possible.
54
MIUI 11 Security and Privacy White Paper
07
Peroration
55
MIUI 11 Security and Privacy White Paper
Peroration
Xiaomi is committed to providing digital software and hardware products with complete
functions, security and usability for individuals, families and industry users around the
world. MIUI, as the core component of MI phones, shoulders the responsibility to build
a foundation of trust as well as provide security assurance. MIUI will give a priority to
enhancing security. This paper is a comprehensive presentation of MIUI security design
and implementation.
Xiaomi is trying to root the awareness of security and privacy protection into the hearts
of every business department, every employee and every partner. As mentioned before,
Xiaomi has established a comprehensive security and privacy management system,
integrating security and privacy requirements into product design, development, testing,
operation and other processes, and conducting strict security and privacy audits on
partners, actively monitoring and solving new security issues and threats, to ensure user
data are protected throughout the entire life cycle. In response to the evolving security
situation, Xiaomi will continuously improve security technology capabilities, refine security
and privacy protection functions of products and services, and optimize security and
privacy management system. In addition, all practices will be presented with authoritative
certificates, white papers, privacy policies and other ways so that Xiaomi can build users
confidence in Xiaomi’s products and services as well as users can choose and use them
confidently.
In this era of big data and artificial intelligence, there are some contradictions between
enterprise development and user privacy. However, Xiaomi firmly believes that only
respecting and protecting users' information security and privacy can build users’ long-
term trust in Xiaomi’s products. Therefore, Xiaomi insists on prioritizing information
security and privacy protection, and increasing investment in security and privacy
continuously. Xiaomi would like to share its standardized methods, best practices and
technical capabilities on information security and privacy protection to partners, which
would promote the development and protection for user privacy.
56
MIUI 11 Security and Privacy White Paper
08
Abbreviated Definition Table
57
MIUI 11 Security and Privacy White Paper
58
MIUI 11 Security and Privacy White Paper
59
MIUI 11 Security and Privacy White Paper
60
MIUI 11 Security and Privacy White Paper
61
MIUI 11 Security and Privacy White Paper
62
MIUI 11 Security and Privacy White Paper
L i fe g e t s e a s i e r
miui.com