• 9 Posts
  • 14 Comments
Joined 4 months ago
cake
Cake day: January 29th, 2025

help-circle

  • What does ‘dishonest’ mean in this context?

    Your comment supports exactly what I said. I have been here on Lemmy for only a short period of time, but I have been observing that whenever one posts an article critical of China, this user gets whatabouted to death (and sometimes called “idiot”, “F@ing liberal”, and other names). One user here in this thread even asked me whether I support the war in Israel (!) - because I posted an article on China “building a cyber army of hackers.”

    What is this?

    Such behavior is so widespread here on Lemmy that I argue it must be orchestrated, this doesn’t rise up organically. And it appears to be supported not only by users but also by many admins and mods.

    I will stop responding to this kind of comments, btw. This is off-topic and leads to nowhere.


















  • One of the more elaborated news on that topic:

    Chinese officials have implicitly acknowledged responsibility for a series of sophisticated cyber intrusions targeting critical U.S. infrastructure.

    During a high-level meeting in Geneva with American officials, representatives from China’s Ministry of Foreign Affairs indirectly linked years of computer network breaches at U.S. ports, water utilities, airports, and other critical targets to increasing U.S. policy support for Taiwan […]

    Wang Lei, a top cyber official with China’s Ministry of Foreign Affairs, made the comments after U.S. representatives emphasized that China appeared not to understand how dangerous prepositioning in civilian critical infrastructure was, and how such actions could be viewed as an act of war […]

    The admission is considered extraordinary, as Chinese officials have typically denied involvement in cyber operations, blamed criminal entities, or accused the U.S. of fabricating allegations.

    Dakota Cary, a China expert at cybersecurity firm SentinelOne, noted that such an acknowledgment, even indirectly, likely required instructions from the highest levels of President Xi Jinping’s government.

    Source

    [Edit to insert archived source link.]











  • The guys at HF (and many others) appear to have a different understanding of Open Source.

    As the Open Source AI definition says, among others:

    Data Information: Sufficiently detailed information about the data used to train the system so that a skilled person can build a substantially equivalent system. Data Information shall be made available under OSI-approved terms.

    • In particular, this must include: (1) the complete description of all data used for training, including (if used) of unshareable data, disclosing the provenance of the data, its scope and characteristics, how the data was obtained and selected, the labeling procedures, and data processing and filtering methodologies; (2) a listing of all publicly available training data and where to obtain it; and (3) a listing of all training data obtainable from third parties and where to obtain it, including for fee.

    Code: The complete source code used to train and run the system. The Code shall represent the full specification of how the data was processed and filtered, and how the training was done. Code shall be made available under OSI-approved licenses.

    • For example, if used, this must include code used for processing and filtering data, code used for training including arguments and settings used, validation and testing, supporting libraries like tokenizers and hyperparameters search code, inference code, and model architecture.

    Parameters: The model parameters, such as weights or other configuration settings. Parameters shall be made available under OSI-approved terms.

    • The licensing or other terms applied to these elements and to any combination thereof may contain conditions that require any modified version to be released under the same terms as the original.

    These three components -data, code, parameter- shall be released under the same condition.