Meter.net News American government vs. TP-Link: Will the ban on routers and other devices pass?

American government vs. TP-Link: Will the ban on routers and other devices pass?

The American government has launched an investigation into the Chinese company TP-Link, which controls 65% of the router market. The reason is national security concerns following the use of their devices in ransomware attacks.

American government vs. TP-Link: Will the ban on routers and other devices pass?

Do you have TP-Link products at home? Then we have bad news for you. The USA has launched an investigation into this company, which controls 65% of the US router market. The reasons are serious national security concerns and possible cyber threats.

Your router may be a backdoor for hackers

Microsoft recently revealed that compromised TP-Link routers were used in ransomware attacks. Experts therefore warn against the slow resolution of security flaws, which can serve as an entry point for espionage, data theft, or infrastructure disruption.

TP-Link is no ordinary manufacturer — its routers occupy 6 out of the 10 top spots in the best-selling models on Amazon. The most popular models are the Archer AX21 and AX1800.

At the same time, key American departments — commerce, defense, and justice — have joined the investigation. American authorities are now examining whether the company sells devices below manufacturing costs, which could conflict with antitrust laws. The situation resembles the fate of other Chinese giants like Huawei and ZTE, who have already faced restrictions on the American market.

What does this mean for regular users?

A potential ban could dramatically change the router market and affect millions of households relying on affordable solutions. TP-Link responded with a statement highlighting its willingness to cooperate with authorities and prove their security practices meet standards.

So far, there is no reason to panic. The investigation is still ongoing, and TP-Link remains open to addressing all security challenges. Nevertheless, it's good to consider whether your router is regularly updated and whether you use all available security measures.

Artificial intelligence can write articles, analyze data, and generate videos. However, there are skills and professions that this technology cannot (yet) replace. In the article, we will look at where humans still have the upper hand, why AI needs human supervision, and which abilities will become increasingly valuable to develop in the digital world.

Does your video keep buffering or game lag, even though you pay for 'fast internet'? Perhaps you simply don't have the right one for what you do at home. What internet speed do you need for watching TV, streaming movies, working from home, or online gaming? Find a clear comparison in the article.

Phishing attacks often appear credible and convincing today. Thanks to artificial intelligence, they sound personal, mimic well-known companies, and can be hard to detect. In this article, you'll learn how modern phishing works, why you should watch out for it, and how you can effectively protect yourself from it.

Forgotten passwords, recycled combinations, and fear of data leaks. Traditional login methods have their weak points. A new way to verify identity, known as passkeys, aims to change that. Without the need to remember anything and with a focus on security. How do they work, who is already using them today, and why are they becoming the new standard?

Do you know edge computing? It is a method of data processing that shifts computing power closer to the data source. This significantly reduces latency and enables faster real-time decision-making. This technology is becoming key for IoT, autonomous vehicles, or smart cities and is gradually changing the internet as we know it. What does edge computing mean and how will it impact our future?

Digital identity is becoming an integral part of modern society. What does it reveal about us? How does it work today, and what might it look like in the future? From blockchain to virtual IDs – let's look at the technologies changing the way we verify ourselves and protect our privacy in the world.