Tibet Post International (TPI) takes digital integrity and the cybersecurity of its website and services with the utmost seriousness.
There are a few Joomla 5.x plugins and components—such as the JA Extension Manager—which, on certain occasions, may be mistakenly or falsely identified by some antivirus software as containing malicious code, thereby prompting browsers to issue warnings or alert users to the presence of supposedly unsecured website content. However, we wish to unequivocally affirm that these components do not contain viruses, and we strongly encourage readers not to be alarmed by such alerts—this assurance is based on multiple comprehensive scanning procedures conducted through extensive efforts, including downloading and auditing the entire website on several separate occasions, none of which produced any indication of a threat.
We remain highly suspicious of certain groups or entities that may be benefiting from associations with specific branches or sub-divisions of the authoritarian communist government of China—or of those branches themselves—who may be directly or indirectly involved in exerting influence over, or even fabricating, these warning reports directed at browsers, antivirus companies, or their associated tools.
There are also a few reasonable suspicions surrounding particular companies or individuals—some of whom may be pretending to support, or may in fact be operating as support groups for, the people of Tibet—who may be directly or indirectly participating in the creation or distribution of such misleading and harmful antivirus warnings, either independently or in coordination with external actors. These actions may be motivated by personal gain, wherein such individuals or groups position themselves as intermediaries claiming, “we” or “I” can help resolve these issues for free of charges or even so-called “Chinese attacks,” by first obtaining full access to all media agency credentials and sensitive details, and subsequently charging exorbitant fees—based on deliberately fabricated diagnoses of serious cyberattacks—even falsely attributing these so-called attacks to China without credible evidence.
We remain strongly vigilant in identifying and exposing those responsible for these deceptive practices, including determining who they are and uncovering the underlying motives behind such fraudulent schemes, and we will continue to gather credible evidence in order to inform our readers both promptly and publicly.