Sunday, February 9, 2025
HomeAppleApple Confirms Removal of TikTok App US Users

Apple Confirms Removal of TikTok App US Users

Published on

SIEM as a Service

Follow Us on Google News

Apple has confirmed that popular apps developed by ByteDance Ltd., including TikTok, will no longer be available for download or updates in the United States.

This decision, effective January 19, 2025, comes in response to the Protecting Americans from Foreign Adversary Controlled Applications Act, which mandates the removal of apps from specific foreign entities amid ongoing national security concerns.

Affected Applications

The ban not only impacts TikTok, the beloved short-form video platform but also extends to several other applications developed by ByteDance Ltd. The removed apps include:

  • TikTok
  • TikTok Studio
  • TikTok Shop Seller Center
  • CapCut
  • Lemon8
  • Hypic
  • Lark (Team Collaboration)
  • Lark (Rooms Display)
  • Lark Rooms Controller
  • Gauth: AI Study Companion
  • MARVEL SNAP

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Implications for U.S. Users

For users based in the United States who already have these apps installed, the situation is mixed. While the applications will remain on their devices, users will not be able to re-download them if deleted or restore them on new devices.

Furthermore, any in-app purchases or new subscriptions will be unavailable, cutting off a significant revenue stream for content creators and casual users alike.

In addition, users will not receive crucial updates, which are essential for maintaining performance, security, and compatibility with the latest versions of iOS and iPadOS. Consequently, some app functions may become limited or cease to operate entirely over time.

As per a report by Apple, International travelers to the United States will find thatByteDance’s apps are still accessible in all other global markets. However, visitors with an Apple account set to a non-U.S. region will encounter limitations while in the country.

They will be unable to download, update, or make in-app purchases for ByteDance Ltd. apps during their stay within U.S. borders. Once they leave the United States, users will regain full access to all functionalities of their preferred apps.

This development marks a pivotal moment in the broader conversation surrounding digital privacy and the influence of foreign technology firms in the United States.

As Apple complies with the new legislation, millions of American users will have to adapt to a digital landscape without many of their favorite applications, posing challenges for users, influencers, and businesses alike concentrated on social media engagement.

The repercussions of this ban could have long-lasting effects on the app ecosystem and user behavior in the United States.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...