Sophie Schmidt, daughter of Google Chief Eric Schmidt, revealed intriguing tidbits of their recent visit to North Korea such as a bugged guesthouse. They were afraid of malware, so they left their laptops and smartphones behind in China. She said Internet connectivity is inevitable and North Korea can’t keep it out. In North Korea, the Democratic People’s Republic of Korea (DPRK), the only people with access to the Internet are those with “special authorization.” Very few details have been revealed about what happened during Google Executive Chairman Eric Schmidt’s recent visit to North Korea…other than that he urged DPRK to “embrace” open access to the Internet. The trip wasn’t for Google, since a Google spokeswoman told Wired, “We do not comment on personal travel.” But now his daughter has provided interesting insight by writing a blog post called “It might not get weirder than this” — Sophie in North Korea.In case you don’t know, before Schmidt and former New Mexico Governor Bill Richardson visited North Korea, the State Department advised against it. Richardson told CBS This Morning, “I don’t work for the U.S. government; neither does Eric Schmidt.” So then State Department spokeswoman Victoria Nuland said, “They are private citizens. They are traveling in an unofficial capacity. They are not going to be accompanied by any U.S. officials. They are not carrying any messages from us.”Eric Schmidt’s daughter Sophie wrote about her impressions of Pyongyang and DPRK.“Speaking as a tech person, just getting to speak to officials in the most closed country on earth about the virtues of the Internet–and having them (appear to) listen–seemed extraordinary.” She included many interesting tidbits about their visit to North Korea, including that none in the nine-person delegation to DPRK had tech along on the visit. We left our phones and laptops behind in China, since we were warned they’d be confiscated in NK, and probably infected with lord knows what malware.Ms Schmidt included an image of her “favorite” customs declaration form which did ask about GPS, cell phones, hand phones and “other communication means.” She warned that you should “leave your ‘killing device’ and ‘publishings of all kinds’ at home.” Sophie Schmidt gives what seems like an honest and sometimes amusing opinion. “Ordinary North Koreans live in a near-total information bubble,” she wrote. “They’re hostages in their own country, without any real consciousness of it.” To better explain the situation in DPRK, she added, “The best description we could come up with: it’s like The Truman Show, at country scale.” The group was assigned two DPRK-approved “minders” and had “zero interactions with non-state-approved North Koreans and were never far from our two minders.”Before traveling, the group received security advice about lodgings in North Korea.We were told well ahead of time to assume that everything was bugged: phones, cars, rooms, meetings, restaurants and who knows what else. I looked for cameras in the room but came up short. But then, why bother with cameras when you have minders?…My father’s reaction to staying in a bugged luxury socialist guesthouse was to simply leave his door open.Her frank assessment also included “an aside: For a country that banned religion, and has sent thousands of practicing Christians to prison camps, the Christmas trees were rather incongruous.” She has posted numerous photos and intriguing details. In the ultimate “police state,” the only art and music are government-approved. It’s nearly impossible to imagine living in such conditions, with no Internet, no privacy and government-sponsored news. She added, “Trucks equipped with loudspeakers roam the streets. ‘For the propaganda,’ Minder 2 told me, with a tone that suggested You idiot.”On the tech front:Everything that is accessible is accessible only in special tiers.Their mobile network, Koryolink, has between 1-2 million subscribers. No data service, but international calls were possible on the phones we rented. Realistically, even basic service is prohibitively expensive, much like every other consumption good (fuel, cars, etc.). The officials we interacted with, and a fair number of people we saw in Pyongyang, had mobiles (but not smart phones).North Korea has a national intranet, a walled garden of scrubbed content taken from the real Internet. Our understanding is that some university students have access to this.That’s not to say everyone is without ‘real’ Internet in North Korea. Last spring when it was announced that America is losing the cyberwar and China has hacked every major U.S. company, the commander of U.S. Forces Korea, Army General James Thurman, told Congress that the North Korea military was becoming better at cyberwarfare.“North Korea employs sophisticated computer hackers trained to launch cyber infiltration and cyber attacks.” He added that cyber attacks from North Korea’s military “have been increasingly employed against a variety of targets including military, governmental, educational and commercial institutions.”At one point, Sophie Schmidt talked about her father answering a few tech questions. Eric fielded questions like, “When is the next version of Android coming out?” and “Can you help us with e-Settlement so that we can put North Korean apps on Android Market?” Answers: soon, and No, silly North Koreans, you’re under international bank sanctions.Lastly, in a bit of good news for DPRK, Ms Schmidt wrote:They seemed to acknowledge that connectivity is coming, and that they can’t hope to keep it out. Indeed, some seemed to understand that it’s only with connectivity that their country has a snowball’s chance in hell of keeping up with the 21st century. But we’ll have to wait and see what direction they choose to take.It’s an excellent overview and the most eye-opening news yet of the groups’ trip to North Korea. I highly recommend you take the time to read Sophie Schmidt’s post. In fact, you may chuckle at the snarky opening line that ridicules Google sites and mentions “f’d up layouts.”Like this? Here’s more posts:Critical Infrastructure Malware Infections: From ICS-CERT report to SCADA StrangelovePolice State starts in tiny Arkansas townIE fix easily broken; Espionage hacker gang has endless supply of zero-daysChrome, Firefox, IE to block fraudulent digital certificateDon’t faint: Microsoft applauds hacker for Windows RT jailbreaking attemptOracle releases emergency Java patch; experts warn flaws may take 2 years to fixValve’s Steam Box controllers may use biometrics and gaze tracking20 Seconds to jailbreak Windows RTPhys.Org Hacked, serving up malware? Google blocks site, but Bing doesn’tUnpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradiseMeet Red October, the latest cyber-spy malware for digital espionageFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe