Drilling down on Uncle Sam's proposed TP-Link ban

Trust in Hardware and Firmware

  • Several commenters argue that nobody really knows what commercial chips are doing; true assurance would require local fabrication and trusted toolchains, which we don’t have.
  • Even with OpenWRT or similar, core components (Wi‑Fi radios, SoC boot firmware, Intel ME–like subsystems) remain opaque blobs with DMA access, so swapping the OS is only partial mitigation.
  • Some conclude that all vendors and countries pose surveillance risks; the “choice” is mostly which government you’re more willing to be spied on by.

TP-Link Security, Quality, and Support

  • Experiences are sharply split:
    • Critics report unstable Deco mesh systems, routers needing scheduled reboots, short effective support lifetimes, and hardware revisions with downgraded specs under the same model name, eroding trust.
    • Others say their TP-Link routers, switches, and Deco units receive firmware updates for many years (including very old models) and are rock solid for home/SOHO use, especially at TP-Link’s price.
  • Some see TP-Link as clearly better value than Netgear/D-Link/Linksys; others report the opposite and praise Ubiquiti, Mikrotik, AVM Fritz! or custom OPNsense/OpenWRT setups.

Geopolitics vs Technical Risk

  • Many see the proposed ban as primarily political: anti-China signaling, trade leverage, or even rent‑seeking/extortion, with little concrete public evidence of TP-Link doing state-directed spying.
  • Others counter that, regardless of corporate reorganization and US HQ branding, TP-Link remains heavily Chinese in ownership, staffing, and manufacturing, and is therefore subject to Chinese state pressure.
  • There’s extensive pushback that singling out Chinese gear is hypocritical given documented US/EU backdoors and lawful‑intercept abuses (Cisco, Crypto AG, etc.). Non‑US commenters often say they distrust US tech at least as much as Chinese.

Regulation, Liability, and Incentives

  • Several argue that consumer routers in general are a national security problem because of pervasive crappy firmware, not one brand; they call for security standards or “building codes” for network software instead of brand bans.
  • Ideas floated: enforce long-term patching, make no‑liability clauses illegal, impose product liability for security failures, or even subscription models dedicated to maintenance (others fear those would be abused).
  • Skeptics note that companies and executives rarely face real consequences for security failures, so they rationally underinvest.

Alternatives, Practices, and Market Impact

  • Many recommend OpenWRT/OPNsense with separate “dumb” APs, or vendor ecosystems like UniFi or Omada, managed locally.
  • There’s frustration at TP-Link’s move toward forced cloud accounts and dark patterns in apps, especially for smart plugs.
  • Commenters worry that bans will reduce competition, push people toward ISP-controlled or US‑backdoored gear, and further normalize insecure, consumer‑hostile networking hardware.