{"id":325779,"date":"2026-03-06T23:32:09","date_gmt":"2026-03-06T23:32:09","guid":{"rendered":"https:\/\/www.newsbeep.com\/il\/325779\/"},"modified":"2026-03-06T23:32:09","modified_gmt":"2026-03-06T23:32:09","slug":"chinas-agentic-ai-controversy-lawfare","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/il\/325779\/","title":{"rendered":"China\u2019s Agentic AI Controversy | Lawfare"},"content":{"rendered":"<p>A powerful new artificial intelligence (AI) agent called OpenClaw and Moltbook, a social networking site just for AI agents, has <a href=\"https:\/\/www.cnbc.com\/2026\/02\/02\/openclaw-open-source-ai-agent-rise-controversy-clawdbot-moltbot-moltbook.html\" rel=\"nofollow noopener\" target=\"_blank\">rocked the tech world with fear and excitement<\/a> about what an AI future could look like. Just three months earlier, China gave us a glimpse of that future with its own controversy erupting over the <a href=\"https:\/\/pstaidecrypted.substack.com\/p\/bytedance-and-zte-push-the-envelope\" rel=\"nofollow noopener\" target=\"_blank\">first-ever smartphone<\/a> with an AI agent embedded in the operating system. These developments have unleashed fierce debate in China and around the world about the security and privacy trade-offs that come with the expansive permissions necessary for agentic AI to succeed. The outcome of these debates in China will have ripple effects on AI everywhere.<\/p>\n<p>The Doubao AI phone quickly became among <a href=\"https:\/\/m.mpaypass.com.cn\/news\/202512\/05205126.html\" rel=\"nofollow noopener\" target=\"_blank\">the hottest products<\/a> in China\u2019s fiercely competitive market. \u201cI got my hands on one,\u201d a friend in Beijing boasted late last year. He had bagged a limited edition ByteDance ZTE AI smartphone, also called the Nubia M153, released to much fanfare in China in early December 2025. Nothing like it exists beyond China, and it is upending the way that users interact with their devices, and revolutionizing how information flows among apps. \u201cIt has ushered in a profound transformation when it comes to control of traffic entry points, the boundaries of data security, and the future paradigm of human-computer interaction,\u201d proclaimed a readout from a <a href=\"https:\/\/www.ccf.org.cn\/YOCSEF\/xwdt\/lt\/2025-12-17\/854113.shtml\" rel=\"nofollow noopener\" target=\"_blank\">special forum<\/a> held in Beijing days after the phone\u2019s release.<\/p>\n<p>Indeed, the AI phone has caused an uproar in China. Within days, many of <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">China\u2019s biggest apps blocked<\/a> the Doubao phone. They saw it as a serious risk to data security. Built into the operating system of the phone itself, it has a kind of master key that gives the embedded AI agent blanket access to the screen, all app content, and the ability to tap or click as if it were a user. Critics dubbed the agent a \u201cburglar\u201d with \u201c<a href=\"https:\/\/www.secrss.com\/articles\/85807\" rel=\"nofollow noopener\" target=\"_blank\">god\u2019s fingertips<\/a>\u201d increasing <a href=\"https:\/\/www.ccf.org.cn\/YOCSEF\/xwdt\/lt\/2025-12-17\/854113.shtml\" rel=\"nofollow noopener\" target=\"_blank\">risks of malicious input<\/a> and intrusion attacks by criminal actors. For <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">the banks<\/a>, it was impossible to distinguish actions taken by the agent and those of the user, creating myriad vulnerabilities for fraud and hacking.<\/p>\n<p>But defenders dismissed concerns as competitive kvetching in a <a href=\"https:\/\/www.ccf.org.cn\/YOCSEF\/xwdt\/lt\/2025-12-17\/854113.shtml\" rel=\"nofollow noopener\" target=\"_blank\">battle for commercial dominance<\/a> and control of traffic and data. The Doubao phone has \u201ctaken a bite out of someone else\u2019s cake, and may even want to take the whole cake away,\u201d <a href=\"https:\/\/www.ccf.org.cn\/YOCSEF\/xwdt\/lt\/2025-12-17\/854113.shtml\" rel=\"nofollow noopener\" target=\"_blank\">pointed out<\/a> Sang Jitao, a Beijing Jiaotong University professor, at the Beijing forum.<\/p>\n<p>Other businesses also repelled the Doubao phone. Alibaba\u2019s e-commerce site Taobao blocked it, as did its payments arm, Alipay. China\u2019s most ubiquitous superapp, WeChat, followed suit, <a href=\"https:\/\/www.yicaiglobal.com\/news\/wechat-some-chinese-banking-apps-reportedly-restrict-devices-with-bytedances-new-ai-voice-assistant\" rel=\"nofollow noopener\" target=\"_blank\">saying<\/a> the phone triggered its high-risk security controls. Owned by Tencent, WeChat is essential to communicating with anyone in China, a kind of universe unto itself with its own bookings, payments, e-commerce, and more.<\/p>\n<p>With the Doubao phone\u2019s release, two of China\u2019s most influential internet behemoths are at loggerheads. Will anybody purchase the phone if it means sacrificing services essential to existing in Chinese society? Will Tencent back down and give ByteDance all the user internet traffic and the data formerly walled off inside WeChat?<\/p>\n<p>The Chinese public too are <a href=\"https:\/\/m.mp.oeeee.com\/a\/BAAFRD0000202512151493862.html\" rel=\"nofollow noopener\" target=\"_blank\">sounding the alarm<\/a>. What would the Doubao phone mean for how their personal information is seen, where it is saved, and who has access to it? A <a href=\"http:\/\/xhslink.com\/o\/6PhNkmAXOFt\" rel=\"nofollow noopener\" target=\"_blank\">viral video<\/a> showed one user finding that their bank balance was visible not just on the Doubao phone, but in a mirror of it on other devices where they were also logged into Doubao AI. Videos rippled across the Chinese social media platform Little RedNote <a href=\"https:\/\/m.mpaypass.com.cn\/news\/202512\/05205126.html\" rel=\"nofollow noopener\" target=\"_blank\">showing other users experimenting<\/a> with the Doubao phone to find out that their private financial data was easily accessible the same way (including card balances, outstanding bill balances, digital RMB wallets, digital wealth management accounts, etc.). (The original video has been removed, but the Chinese social media site Little RedNote contains <a href=\"http:\/\/xhslink.com\/o\/6PhNkmAXOFt\" rel=\"nofollow noopener\" target=\"_blank\">a post with a screen recording<\/a> of the full video; see image below.) Was the Doubao phone somehow sending personal data to the ByteDance cloud to train its AI? What were the boundaries between the data on the phone and the cloud, and who would determine access? And what of bystanders whose data was just part of shared chats or files?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/il\/wp-content\/uploads\/2026\/03\/china-agentic-ai-phone.png\" height=\"689\" style=\"display:block;margin-left:auto;margin-right:auto;\" width=\"522\" alt=\"\" class=\"-align-center\" sf-size=\"100\"\/><\/p>\n<p>Little RedNote screen recording of a viral video (since removed) on Chinese social media showed one user finding that their bank balance was visible not just on the Doubao phone, but in a mirror of it on other devices where they were also logged into Doubao AI. \u201cMy bank account was leaked?!\u201d<\/p>\n<p>While the phone is coveted by Chinese consumers, it has sparked a flurry of discussion among China\u2019s legal scholars and technologists about how regulators should address the unprecedented challenges agentic AI poses to <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">data security and privacy<\/a>. Moreover, it illustrates how risks to privacy can become tangled in other objectives, like consolidating commercial power and monetizing traffic and data.<\/p>\n<p>No matter where one stands on the question of commercial challenge or data security risk, the controversy surfaces a much bigger debate in China and around the world: who owns the data generated on our devices, and who gets to decide where the guardrails belong? And the frenzy the Doubao phone unleashed speaks to the subject of my forthcoming book (Chicago, 2027): How can society balance the prizes and perils of open data when trust is in crisis?<\/p>\n<p>Agentic AI could transform who and what has access to user data and internet traffic, fundamentally shifting the center of gravity away from apps. With the Doubao AI phone as a test case, Chinese technology experts are now grappling with vexing questions about interoperability and power within the nation\u2019s tech ecosystem. Amid China\u2019s fiercely competitive technology landscape, Chinese internet platforms, smartphone manufacturers, and state-owned telecommunications firms are battling to shape standards in agentic AI. The outcome will affect how users in China and beyond interact with Chinese AI.<\/p>\n<p>This debate within China holds lessons good and bad\u2014for governing data inside the United States and for how AI may play out worldwide. At a moment when security experts in the U.S. are calling out the \u201c<a href=\"https:\/\/www.cnbc.com\/2026\/02\/02\/openclaw-open-source-ai-agent-rise-controversy-clawdbot-moltbot-moltbook.html\" rel=\"nofollow noopener\" target=\"_blank\">lethal trifecta<\/a>\u201d of risks over OpenClaw, China\u2019s experiment provides a lens into the trade-offs in data privacy and security that could accompany the shifts to agentic AI. Chinese and western experts sounding the alarm over the \u201cprofound\u201d issues raised for security and privacy. Agentic AI is \u201cthreatening to break the blood-brain barrier between the application layer and the OS layer by conjoining all of these separate services [and] muddying their data,\u201d Signal President <a href=\"https:\/\/techcrunch.com\/2025\/03\/07\/signal-president-meredith-whittaker-calls-out-agentic-ai-as-having-profound-security-and-privacy-issues\/\" rel=\"nofollow noopener\" target=\"_blank\">Meredith Whitaker warned onstage at the SXSW conference<\/a> last year.<\/p>\n<p>When I visited Beijing just after the Doubao phone\u2019s release, Chinese industry contacts told me that regulators were observing the phone in the wild before deciding on what form government intervention might take, and this may have been the goal: to create a test case first before regulating. Will the government intervene to mediate among its warring tech platforms as control over data and traffic is up for grabs? What new guardrails will be built in response to concerns voiced by citizens and scholars?<\/p>\n<p>One thing is clear: The next chapter of the AI story isn\u2019t just about chips or a single app. It is also about access to data, control of traffic, and permissions for agents to work seamlessly across fragmented landscapes of edge devices and services.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Agentic AI and Its Discontents<\/p>\n<p>Agentic AI systems get tasks done with little <a href=\"https:\/\/www.newamerica.org\/oti\/briefs\/ai-agents-and-memory\/\" rel=\"nofollow noopener\" target=\"_blank\">human supervision<\/a>. They operate proactively, across different environments, and take many steps autonomously before needing a human nudge. According to Tsinghua University Professor Chen Tianhao, AI agents directly <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">modify the real-world environment<\/a><a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">\u00a0<\/a>rather than being passive tools. Like \u201ca highly intelligent and efficient intern,\u201d as Caiwei Chen put it in the <a href=\"https:\/\/www.technologyreview.com\/author\/caiwei-chen\/\" rel=\"nofollow noopener\" target=\"_blank\">MIT Technology Review<\/a>, this kind of AI completes workflows that traditionally required human labor and thought. In China, an AI agent is <a href=\"https:\/\/digichina.stanford.edu\/work\/lexicon-how-china-talks-about-agentic-ai\/\" rel=\"nofollow noopener\" target=\"_blank\">sometimes called a proxy<\/a> (daili \u4ee3\u7406) or an actor (z\u00eczh\u01d4 zh\u00ecn\u00e9ngt\u01d0 \u81ea\u4e3b\u667a\u80fd\u4f53).<\/p>\n<p>Such assistants might make travel reservations, place food orders, or sort out automatic payments and cancellations. They might engage with different websites or service providers. Or they could be part of a mobile phone\u2019s operating system, saving users from having to open and navigate multiple applications. That would require agents to independently authenticate user identity and credentials to secure transactions\u2014between the user and the relevant application, and between every application or service provider involved.<\/p>\n<p>Agentic AI typically operates as a layer, atop traditional large language models (LLMs) such as ChatGPT or DeepSeek. Unlike a chatbot responding to individual user prompts, AI agents are doers. They take a command, break it down into tasks, and then complete workflows. Asking an AI agent to \u201cplan a weekend of good theater and cheap eats in Beijing\u201d wouldn\u2019t result in an itinerary, or a menu of options weighing the pros and cons of several itineraries, such as a chatbot might provide.<\/p>\n<p>Instead, an AI agent could theoretically act like an executive assistant. It would book tables at the best restaurants, purchase theater tickets and deliver receipts, tickets, calendar appointments, and travel maps. In China, that might mean buying tickets through a platform like Maoyan (\u732b\u773c) or Damai (\u5927\u9ea6), making dinner reservations through Meituan or Dianping, and doing all that through automated payment systems within Alipay. In the United States, a similar process would call upon platforms like Ticketmaster, Open Table, and Apple Pay or Google Wallet.<\/p>\n<p>China and the United States are developing technical standards to enable AI agents to work across digital systems. These standards <a href=\"https:\/\/interconnect.substack.com\/p\/from-race-to-co-opetition?utm_source=post-email-title&amp;publication_id=1084918&amp;post_id=179929988&amp;utm_campaign=email-post-title&amp;isFreemail=false&amp;r=22w&amp;triedRedirect=true&amp;utm_medium=email\" rel=\"nofollow noopener\" target=\"_blank\">are emerging in ways<\/a> that both converge and diverge. OpenClaw creator <a href=\"https:\/\/x.com\/steipete\/status\/2015817998150295565?s=20\" rel=\"nofollow\">Peter Steinberger recommends<\/a> running the agent on the models made by the Chinese AI company MiniMax. Many developers in China and the United States use the Model Context Protocol (MCP), introduced by American frontier AI company Anthropic in November 2024. This kind of \u201cinvisible infrastructure,\u201d as <a href=\"https:\/\/www.newamerica.org\/oti\/briefs\/ai-agents-and-memory\/\" rel=\"nofollow noopener\" target=\"_blank\">Matt Steinberg and Prem M. Trivedi explain<\/a>, allows for interoperability, just as \u201ca USB-C port increasingly operates as a universal plug.\u201d Gaode Map (\u9ad8\u5fb7\u5730\u56fe), one of China\u2019s main mapping applications, and Feishu (\u98de\u4e66), an office suite application, have integrated MCP. But the Chinese ticket seller Meituan has not opened up to third-party apps and does not support MCP. This would make the trip-booking example harder to achieve.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Fragmentation Two Ways<\/p>\n<p>One thing China and the United States have in common when it comes to AI agents is that they only succeed if they can operate seamlessly across different applications and connected devices. That kind of interoperability requires broad permissions so that AI agents can do things like access calendars, emails, chat logs, and credentials. But these broad permissions necessary for agentic AI\u2019s development come at a cost to data privacy and security\u2014and this is the crux of the <a href=\"https:\/\/www.youtube.com\/watch?v=p9acrso71KU\" rel=\"nofollow noopener\" target=\"_blank\">controversy over OpenClaw<\/a> in the western world and the Doubao phone in China.<\/p>\n<p>Some of these challenges in interoperability and access are unique to China. That is because the nation\u2019s mobile ecosystem is more fragmented than any other. Different apps and programs don\u2019t interoperate or share data. Users can spend all their time within the universe of one without touching another. This Balkanization takes two forms: superapp fragmentation and device fragmentation. Both are big problems for AI agents, which must call on services across multiple superapps and devices.<\/p>\n<p>The first kind of fragmentation is a result of China\u2019s \u201c<a href=\"https:\/\/techaffinity.com\/blog\/superapp-development\/#:~:text=A%20superapp%2C%20super%20app%2C%20or,services%20offered%20by%20the%20app\" rel=\"nofollow noopener\" target=\"_blank\">do everything<\/a>\u201d apps. These combine the core functions of Facebook, WhatsApp, Amazon, Uber, Google Maps, the App Store, and a bank app in one seamless interface. (Attempts to make American apps like X <a href=\"https:\/\/www.businessinsider.com\/why-elon-musk-attempt-twitter-x-super-app-doomed-fail-2023-7\" rel=\"nofollow noopener\" target=\"_blank\">superapps have not gone so well<\/a>.) The main superapps are WeChat and Alipay; increasingly Meituan, Doyin, and Taobao have bundle offerings too. Through Alipay, people in China can use a universe of services\u2014each itself an ecosystem\u2014for payments, social networking, ride hailing, and more. (For users outside of China, Alipay works more like a basic digital bank card.)<\/p>\n<p>In many ways, a superapp is like an operating system. Just as developers build for Apple, Windows, or Android in the United States, developers build for WeChat or Alipay in China. And like Apple and Windows, WeChat and Alipay are walled gardens. Designed to lock in user traffic and interactions, they tend not to share data nor offer services that connect externally. Quite the opposite.<\/p>\n<p>What this means for AI agents is that when they go to call on an app to complete a task\u2014for example, accessing the contents of a text message in WeChat discussing plans to meet for dinner\u2014the task will fail without the agent having the ability to read and act on the information held within the app\u2019s walled garden. That is why it was such a big deal when WeChat blocked the Doubao phone through its risk controls.<\/p>\n<p>The second kind of fragmentation that is unique to China in the obstacles it creates for AI agents concerns devices. Across the world, on Android phones, a layer of apps and services called Google Mobile Services (GMS) sits atop the Android operating system. That\u2019s why phones built by Samsung, Google, or Motorola share Gmail, Chrome, Google Maps, and the Google Play Store (which, critically, allows app downloading and centralizes security reviews and contractual guarantees). The GMS layer also powers smartphone capabilities such as <a href=\"https:\/\/www.ibm.com\/think\/topics\/firmware#:~:text=Firmware%2C%20also%20known%20as%20&#039;&#039;software%20for%20hardware%2C&#039;&#039;,increase%20a%20device&#039;s%20compatibility%20with%20new%20technologies\" rel=\"nofollow noopener\" target=\"_blank\">firmware<\/a> updates and GPS tracking.<\/p>\n<p>But China blocks Google. So Chinese smartphone manufacturers that produce Android phones have developed an equivalent to GMS that runs on Android\u2019s open source operating system. Chinese users switching from an Android phone made by one manufacturer to a phone made by a different firm must also switch app stores, cloud services, assistants, push notifications, and a range of other services. Developers, meanwhile, must adapt their software for each manufacturer\u2019s proprietary layer if they wish to market apps in different countries. To add to the confusion, Huawei phones are manufactured and sold with a home-grown operating system, HarmonyOS, with its own services.\u00a0<\/p>\n<p>Both flavors of fragmentation are anathema to seamless interoperability and, hence, to agentic AI. Chinese agentic AI will only advance if it overcomes these barriers, which is precisely what the Doubao AI phone aims to do. It is no surprise then that its release sparked such a firestorm in China. Yet, in the long run, whatever company manages to overcome these barriers in China may be able deliver more useful and powerful AI. The difficulties have prompted Chinese scholars, companies, and engineers to build new technologies and debate policies and standards, some unique to China, and some relevant around the world.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Regulating AI Agents<\/p>\n<p>In this context, a battle is unfolding within China to shape the regulations and standards for agentic AI. Stakeholders include the internet platforms that own the superapps, those with the AI agents, device makers, and state-owned telecommunications companies that double as cloud providers. Winners will craft the guardrails for data access, security authentication, and more.<\/p>\n<p>Things are evolving quickly, sometimes in different directions. Just weeks before the Doubao phone storm, WeChat users in China were reporting that Tencent may have <a href=\"https:\/\/developer.huawei.com\/consumer\/cn\/forum\/topic\/0201195495631590131\" rel=\"nofollow noopener\" target=\"_blank\">blocked Huawei\u2019s AI agent<\/a>, called Xiaoyi or Celia, from starting calls. At the same time, some superapps may be taking steps to give agents greater access. Alipay launched a \u201csuper portal\u201d <a href=\"https:\/\/m.leiphone.com\/category\/ai\/WAvRCwmQ8cpK2FPM.html\" rel=\"nofollow noopener\" target=\"_blank\">called <\/a><a href=\"https:\/\/m.leiphone.com\/category\/ai\/WAvRCwmQ8cpK2FPM.html\" rel=\"nofollow noopener\" target=\"_blank\">Zhixiabao<\/a> that allows AI agents to access functions like food delivery and financial services from within its mini-programs. Alipay promotes Zhixiabao to both Android and iOS users as an \u201cAI Life Manager.\u201d Other companies are more cautious, wary of losing data and traffic to the agents.<\/p>\n<p>A separate power struggle over standards for agentic AI is between state-owned telecommunications companies (e.g., China Mobile, China Telecom) and private internet and cloud platforms (Alibaba Cloud, Tencent Cloud). In China, telecommunications firms also function as state-owned cloud providers\u2014picture Amazon Web Services with its own cell towers. The kind of data each player has is different. Telecommunications companies hold location data, call patterns, and network behavior. Platforms harvest information on user preferences, social demographics, and financial transactions.<\/p>\n<p>The contest for shaping coming regulations and standards remains open, with major consequences for users\u2019 data security and privacy, control over user data, internet traffic, and commercial power in a rapidly evolving market.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Data Security and Privacy<\/p>\n<p>There is no consensus in China about whether the battle to set the standards for agentic AI is more about commercial power or genuine data security and privacy concerns. Regardless, the Doubao phone has forced a reckoning about whether its powerful capabilities require new government intervention to create guardrails on privacy and security in the era of AI. As <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">Chen of Tsinghua University writes<\/a>, AI agents fundamentally disrupt the existing mobile ecosystem, raising questions about how China\u2019s <a href=\"https:\/\/www.chinafile.com\/reporting-opinion\/notes-chinafile\/whats-behind-chinas-laws-protect-privacy\" rel=\"nofollow noopener\" target=\"_blank\">existing laws and regulations<\/a> need to \u201cco-evolve\u201d with developments in the technology. Chinese legal scholars observe that until Chinese regulators determine a path forward, the AI agent embedded in the operating system itself has \u201camplified the privacy paradox in the AI era,\u201d <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">according to Chen<\/a>, where \u201cusers pursuing convenience unconsciously consolidate information originally scattered across various apps, into the hands of a single system-level intelligent agent.\u201d<\/p>\n<p>As China learns from the Doubao phone, governments, citizens, and industry would be wise to take note as they grapple with solutions for this paradox in their own countries. Indeed, U.S. experts responding to what they observed in the first days of the OpenClaw agent (a general-purpose agent hosted locally on a Mac or virtual environment rather than a phone) express similar concerns to those coming from China. \u201cWe\u2019ve spent 20 years building security boundaries around our operating systems,\u201d AI strategist Nate Jones <a href=\"https:\/\/www.youtube.com\/watch?v=p9acrso71KU\" rel=\"nofollow noopener\" target=\"_blank\">said on his YouTube channel<\/a>. \u201cBut agents require tearing that down by the nature of what an agent is\u2014it needs to read your files, access your credentials \u2026. [T]he value proposition requires punching holes in every boundary that security teams spent decades building. That is the bind. A useful agentic AI requires fairly broad permissions, and broad permissions create a massive attack surface.\u201d<\/p>\n<p>In China, the privacy and security fears are not new but, rather, build on years of a<a href=\"https:\/\/lawreview.uchicago.edu\/print-archive\/authoritarian-privacy\" rel=\"nofollow noopener\" target=\"_blank\"> subtle public discourse<\/a> and a proactive, centralized legal framework in China around individual data privacy. Today\u2019s debates build on nearly a <a href=\"https:\/\/www.technologyreview.com\/2020\/08\/19\/1006441\/china-data-privacy-hong-yanqing-gdpr\/\" rel=\"nofollow noopener\" target=\"_blank\">decade of rising demands for privacy among Chinese citizens<\/a> and <a href=\"https:\/\/www.newamerica.org\/cybersecurity-initiative\/digichina\/blog\/how-will-chinas-privacy-law-apply-to-the-chinese-state\/\" rel=\"nofollow noopener\" target=\"_blank\">scholars<\/a>.<\/p>\n<p>Concerns about the Doubao phone thus mark the next stage in the evolution of China\u2019s surprisingly comprehensive regime for regulating data. Citizens, scholars, and private-sector technologists fear that advances in AI further undercut data privacy and security protections. They call for regulators to craft new interventions to enshrine citizens\u2019 control over their data as AI agents expand into new corners of daily life while disrupting the balance of power among tech giants.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Personal Information<\/p>\n<p>Some Chinese scholars argue that changes in how data is collected and used by AI agents could require a fundamental reassessment of foundational concepts in China\u2019s data protection legal framework (which was <a href=\"https:\/\/www.technologyreview.com\/2020\/08\/19\/1006441\/china-data-privacy-hong-yanqing-gdpr\/\" rel=\"nofollow noopener\" target=\"_blank\">modeled after the EU\u2019s General Data Protection Regulation<\/a> (GDPR), sometimes referred to as \u201c<a href=\"https:\/\/techinsights.linklaters.com\/post\/102gi62\/gdpr-with-chinese-characteristics-initial-analysis-of-chinas-draft-data-protec\" rel=\"nofollow noopener\" target=\"_blank\">GDPR with Chinese characteristics<\/a>\u201d to capture China\u2019s political system). These concepts include consent, purpose limitation, and minimization as agentic AI could subvert users\u2019 relationship with their personal information. <a href=\"https:\/\/m.jfdaily.com\/sgh\/detail?id=1321908\" rel=\"nofollow noopener\" target=\"_blank\">Wang Yuan<\/a>, a data law scholar and expert in judicial data, warns that AI agents, generative AI, and autonomous systems challenge \u201cpersonal information control\u201d ( \u4e2a\u4eba\u4fe1\u606f\u63a7\u5236\u8bba\u57fa\u7840\u4e4b\u4e0a), writing that \u201c[d]ata generation has blurred the boundaries between data collection and data processing \u2026 rendering many privacy protection laws ineffective.\u201d<\/p>\n<p>Similar to <a href=\"https:\/\/fpf.org\/blog\/event-report-from-consent-centric-frameworks-to-responsible-data-practices-and-privacy-accountability-in-asia-pacific\/\" rel=\"nofollow noopener\" target=\"_blank\">experts in the European Union<\/a> following the rollout of GDPR, Chinese scholars also are increasingly questioning notice and consent as a viable solution to privacy concerns when it comes to AI. In response, Wang recommends creating a dynamic, participatory type of consent to reflect the \u201cconstantly changing nature of data used by AI agents,\u201d but cautions that a welter of pop-up boxes interfere with user experience and become ineffective.<\/p>\n<p>Moreover, the autonomous actions of agentic AI make it \u201cimpossible for information processors to determine the ultimate purpose of information collection and use,\u201d Wang points out. He argues against simply patching existing privacy rules, and calls for a new set of approaches to both law and technology. Alternatives include enabling users to customize settings for \u201cdynamic\u201d consent, privacy by design, deleting data automatically after certain time periods, and stronger anonymization and deidentification. China has <a href=\"https:\/\/www.tc260.org.cn\/upload\/2025-09-16\/1757991247699056052.pdf\" rel=\"nofollow noopener\" target=\"_blank\">standards for anonymization and deidentification<\/a>, but <a href=\"https:\/\/fzzfyjy.cupl.edu.cn\/info\/1035\/16899.htm\" rel=\"nofollow noopener\" target=\"_blank\">lack of consensus<\/a> about which data can be reidentified will only intensify with AI advances.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Hacking Accessibility<\/p>\n<p>For AI agents to work on smartphones, apps need to let them in. Many developers are hesitant to provide this kind of access because it can reduce data, traffic, and advertising revenue. To get around this issue, AI agents can exploit accessibility services, originally designed to help people with disabilities to use their phones hands-free, for instance.<\/p>\n<p>A study by the Nanfang Compliance Technology Research Institute revealed that smartphone AI agents enabled accessibility permissions to access all private screen content and perform operations without notifying users. Assistants could see bank card passwords and chat logs, and then click, long-press, and swipe the screen. Researchers <a href=\"https:\/\/www.21jingji.com\/article\/20250317\/herald\/6410c6c74c64a254bdc041898ecbd76c.html\" rel=\"nofollow noopener\" target=\"_blank\">evaluated six smartphones<\/a> running AI agents and interviewed smartphone manufacturers, engineers, and legal scholars in China. (The think tank is affiliated with a media conglomerate in China called the Southern Finance Omnimedia Corp.) Some of the smartphones turned off the accessibility features after completing a task. Others enabled the feature to hail a ride with the Didi app, and left it enabled.<\/p>\n<p>Chinese experts are weighing\u00a0 risks to security and privacy against how essential accessibility services have been to advancing technology. For example,\u00a0 Zhu Yue at Tongji University Law School points out that LLMs have benefited from accessing data from large volumes of videos, images, and text annotations provided by accessibility services. He <a href=\"http:\/\/www.legalweekly.cn\/whlh\/2025-03\/13\/content_9149253.html\" rel=\"nofollow noopener\" target=\"_blank\">writes<\/a> that these issues around accessibility are an overlooked area of AI law: \u201cSimply by crawling multimedia content and their corresponding descriptions, AI enjoys a free lunch.\u201d\u00a0 This question of how\u00a0 best to make use of these features while protecting sensitive user data and giving users more control over their data is an open question in China.<\/p>\n<p>Privacy experts interviewed for the Nanfang study point to two ways in which users have some degree of control\u2014in theory. There should be notice and consent notifications before accessibility features are activated, and permission switches that allow users to monitor and control that access. However, the study found that in the smartphones they reviewed, the \u201csituation is rather chaotic.\u201d<\/p>\n<p align=\"center\" style=\"text-align:center;\">Access All Areas<\/p>\n<p>The Doubao AI phone has entered unchartered territory, out ahead of existing legal or standards regime in China or globally. It is also is unique in its level of access. While the Samsung Galaxy S26 series smartphone has been dubbed in Chinese media as the overseas version of the Doubao phone, there are differences in the kind of system permissions each has.<\/p>\n<p>In the Doubao phone, the AI agent comes <a href=\"https:\/\/pstaidecrypted.substack.com\/p\/bytedance-and-zte-push-the-envelope\" rel=\"nofollow noopener\" target=\"_blank\">fused into the operating system<\/a> (OS). It is an elevated OS systems-level permission called INJECT_EVENTS that reads and interprets the screen and clicks buttons in ways that are <a href=\"https:\/\/hellochinatech.com\/p\/bytedance-gui-agent-interface-war\" rel=\"nofollow noopener\" target=\"_blank\">indistinguishable<\/a> from a human user. . (The Samsung Galaxy uses a <a href=\"https:\/\/eu.36kr.com\/en\/p\/3700843732053896\" rel=\"nofollow noopener\" target=\"_blank\">hybrid approach<\/a> where it mainly uses API access granted by the top 200 apps in the app store, but is developing a fallback framework to read and click mimicking human.)\u00a0<\/p>\n<p>The Doubao phone\u2019s\u00a0 system-level symbiosis is only possible through ByteDance\u2019s partnership with the device manufacturer ZTE. <a href=\"https:\/\/mp.weixin.qq.com\/s\/voFNQ5mwJdMFYTMlCzbAKQ?from=singlemessage&amp;isappinstalled=0&amp;scene=1&amp;clicktime=1767649351&amp;enterid=1767649351\" rel=\"nofollow noopener\" target=\"_blank\">ByteDance is now exploring<\/a> partnerships with Lenovo, Vivo, and other device makers. It is INJECT_EVENTS that enables the Doubao agent to read screens, navigate the user interface, and click without having been granted access to the application programming interface (API) of an app. \u201cIt does not ask apps for cooperation. It simply moves through their interfaces as if it were the one holding the device,\u201d <a href=\"https:\/\/substack.com\/home\/post\/p-181209460\" rel=\"nofollow noopener\" target=\"_blank\">write Boyuan Wang<\/a> on his substack.\u00a0<\/p>\n<p>There is no rule preventing more phone manufacturers from granting signature-level permissions like INJECT_EVENTS for AI. And Bytedance has <a href=\"https:\/\/www.yicaiglobal.com\/news\/wechat-some-chinese-banking-apps-reportedly-restrict-devices-with-bytedances-new-ai-voice-assistant\" rel=\"nofollow noopener\" target=\"_blank\">stated<\/a> that it only uses the permission with explicit user consent. All of which begs the question: What kind of personal information\u2014screenshots, texts, and so on\u2014does the phone \u201csee and remember\u201d after completing tasks? What remains on the device, and <a href=\"https:\/\/pstaidecrypted.substack.com\/p\/bytedance-and-zte-push-the-envelope\" rel=\"nofollow noopener\" target=\"_blank\">what is transmitted to ByteDance<\/a> for reasoning? One industry expert explained in the <a href=\"https:\/\/m.mp.oeeee.com\/a\/BAAFRD0000202512151493862.html\" rel=\"nofollow noopener\" target=\"_blank\">Southern Metropolis Daily<\/a> that data is sent to the cloud and processed by the model for inference, but not stored, and data from new tasks overwrites previous content. Users must enable the phone\u2019s global memory function (it\u2019s off by default) for the Doubao agent to remember their preferences. For example, when enabled the agent will remember that the user likes their coffee iced without sugar, and this is stored on the device side. When a task is assigned involving planning and reasoning, images from the screen for each step are uploaded to the cloud for processing, but not stored on the server side nor used for model training.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Seeking a Path Forward<\/p>\n<p>In the wake of the Doubao phone storm, early recommendations for new guardrails are already circulating as regulators take stock of the <a href=\"https:\/\/pstaidecrypted.substack.com\/p\/bytedance-and-zte-push-the-envelope\" rel=\"nofollow noopener\" target=\"_blank\">\u201ccontest for empire\u201d among platforms<\/a> as well as concerns being raised by citizens through platforms like Little RedNote. None of this is resolved but will have sweeping implications for the distribution of commercial power as well as what consumers of Chinese AI in China and beyond will experience.<\/p>\n<p>When it comes to sensitive credentials and transactions like having AI agents access payments and fund transfers, Chen of Tsinghua recommends creating standards (possibly mandatory regulations beyond industry guidelines) where Doubao would detect a higher risk action and <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">automatically suspend the AI takeover<\/a> to return control to users. Meanwhile, a financial technology industry alliance in China has already published <a href=\"https:\/\/e.huawei.com\/marketingcloud\/pep\/asset\/20000001\/Material\/311956ffb988404890f1b4b3d78abfbd\/M3T1A669N1175795695485038726\/%E9%87%91%E8%9E%8D%E6%99%BA%E8%83%BD%E4%BD%93%E5%BA%94%E7%94%A8%E5%8D%8F%E5%90%8C%E6%8C%87%E5%8D%97.pdf\" rel=\"nofollow noopener\" target=\"_blank\">recommendations for financial applications<\/a> of agentic AI in response to the controversy with preliminary guidelines on data processing and case studies for how financial institutions are building and integrating AI agents.<\/p>\n<p>Another <a href=\"https:\/\/opinion.caixin.com\/2025-12-08\/102390945.html\" rel=\"nofollow noopener\" target=\"_blank\">recommendation<\/a> is to require local on-device processing of particularly sensitive information like the contents of chat logs and photo albums data rather than being sent to the cloud. Currently it is <a href=\"https:\/\/pstaidecrypted.substack.com\/p\/bytedance-and-zte-push-the-envelope\" rel=\"nofollow noopener\" target=\"_blank\">not clear what data remains on the device<\/a> and when it is sent to the cloud, as the viral video showing bank account information uncovered. Specific scenarios could be graded according to risk, perhaps similar to the way in which China\u2019s regulations for cross-border data transfer already assign <a href=\"https:\/\/www.skadden.com\/-\/media\/files\/publications\/2021\/11\/chinas_new_data_security_and_personal_information_protection_laws_what_they_mean.pdf#:~:text=Categories%20of%20Data%20%E2%80%9CCore%20data%E2%80%9D%20under%20the,impair%20China&#039;s%20national%20security%20and%20public%20interest.\" rel=\"nofollow noopener\" target=\"_blank\">different risk levels to different types of data<\/a> when it comes to requiring local storage or allowing transfer overseas.<\/p>\n<p>Others are proposing viewing agentic AI through an antitrust lens. China\u2019s Anti-Monopoly Law prohibits certain kinds of data acquisition (\u201ctraffic hijacking\u201d). AI agents could be regulated as digital gatekeepers. For example, Doubao AI could not direct users to the Douyin e-commerce, which is also owned by ByteDance.<\/p>\n<p align=\"center\" style=\"text-align:center;\">Here, Unevenly Distributed<\/p>\n<p>AI agents strain existing laws and safeguards by connecting multiple services and automatically sharing data, making it seemingly impossible to determine who decides how data is used and who controls it. Data privacy and security concerns in China are similar to those being raised by U.S. civil society organizations. \u201cMoving from a chatbot responding to prompts to an AI agent acting on our behalf would require a major leap in data access and memory standards,\u201d write <a href=\"https:\/\/www.newamerica.org\/oti\/briefs\/ai-agents-and-memory\/\" rel=\"nofollow noopener\" target=\"_blank\">New America\u2019s Steinberg and Trivedi<\/a>. Should regulation require such agents to receive authorization from third-party apps based on a set of criteria negotiated between companies? Or since the data belongs to the owner of the device where the agent resides, who has already tasked the agent to act on their behalf with the data, then perhaps no additional permission should be required? By this logic, user intent is already granted.<\/p>\n<p>Until late last year, such recondite questions about interoperability and control were largely academic. Now that there are real-world test cases for these issues the debate has taken on a febrile urgency. Not least because <a href=\"https:\/\/mp.weixin.qq.com\/s\/voFNQ5mwJdMFYTMlCzbAKQ?from=singlemessage&amp;isappinstalled=0&amp;scene=1&amp;clicktime=1767649351&amp;enterid=1767649351\" rel=\"nofollow noopener\" target=\"_blank\">ByteDance may target overseas<\/a> markets next for its AI phones. Industry experts believe that when the technology is better understood, China will come out with new standards and rules for it. The implications will be far-reaching.<\/p>\n","protected":false},"excerpt":{"rendered":"A powerful new artificial intelligence (AI) agent called OpenClaw and Moltbook, a social networking site just for AI&hellip;\n","protected":false},"author":2,"featured_media":325780,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[345,343,344,85,46,125],"class_list":{"0":"post-325779","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-il","12":"tag-israel","13":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/325779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/comments?post=325779"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/posts\/325779\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media\/325780"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/media?parent=325779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/categories?post=325779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/il\/wp-json\/wp\/v2\/tags?post=325779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}