Player’s Unknown Battle Ground (PUBG) is an online multiplayer gaming app that is developed by the Battle Royale game and published by PUBG Corporation which is a subsidiary of South Korean video game company Bluehole. It is an internal game studio of Bluehole Studio, which is now a subsidiary of the Krafton Game Union. Chinese tech giant Tencent has a 1.5% stake in Bluehole Studio and wants to increase the stake in the game developer.
As the Government is getting serious about banning the Chinese apps day by day due to security threats and banning the Chinese apps including its clones there are many more chances that the popular gaming app can be banned soon as it is violating the privacy of the users. PUBG will maybe be included in the list of over 250 Chinese backed apps which the ministry has kept an eye for violating the privacy of its users.
These are some apps that will be scrutinized among the all other Chinese backed apps 14MI by Xiaomi – Capcut and FaceU, some of the tech majors like Meitu, Perfect corp, Sina Corp, LBE Tech, Yoozoo Global and Netease games are present in the list. Helsinki based supercells that have investments by Chinese companies are also on the list.
Although Government is formulating a law or a circular or any regulations so that the apps can be determined easily that they are safe for the users or not for now being PUBG is on the radar of the government.
After becoming extremely popular on the PC side, Tencent Games and the PUBG Corporation partnered up to release a mobile version of the game for Android and iOS in 2018. The Mobile version was an instant hit and garnered over 600 million times since launch. Moreover, PUBG is available for Microsoft Windows PCs, Sony PlayStation, Microsoft Xbox, and Google Stadia, as well as for Android phones.
“In India, the game has generated 180.3 million downloads to date and generated $38.6 million [roughly Rs. 289 crores] in lifetime revenue. In the first half of 2020, it was India’s top-grossing mobile game and is assumed that its damning many user’s data and will leads to the security threat.