- 9 Posts
- 14 Comments
randomname@scribe.disroot.orgOPto Technology@beehaw.org•China is building a cyber army of hackers, report findsEnglish41·1 month agoAs a response to several of the posts in this thread: It is really amazing how many people here on Lemmy are downplaying or even denying China’s crimes (even many admins and mods). You can post articles critical of the US, EU, Australian or any other government, but if you post a China-critical text you are whatabouted to death. The tonality of many of these comments alone is very telling.
randomname@scribe.disroot.orgto Technology@beehaw.org•Open source AI models favor men for hiring, study findsEnglish2·1 month ago“These biases stem from entrenched gender patterns in the training data as well as from an agreeableness bias induced during the reinforcement learning from human feedback stage.”
No surprise.
randomname@scribe.disroot.orgOPto Technology@beehaw.org•China is building a cyber army of hackers, report findsEnglish2·1 month agoRemoved by mod
randomname@scribe.disroot.orgOPto Technology@beehaw.org•China is building a cyber army of hackers, report findsEnglish3·1 month agoRemoved by mod
randomname@scribe.disroot.orgOPto Technology@beehaw.org•China is building a cyber army of hackers, report findsEnglish4·1 month agoQuick question also to you: Do you fundamentally disagree with what Israel and the US are accused of but fully support China’s domestic surveillance, transnational repression, supression of free speech and freedom of the press, bullying of its neighbours, aggression against Taiwan, just because they are perpetrated by “the good guys”?
randomname@scribe.disroot.orgOPto Technology@beehaw.org•China is building a cyber army of hackers, report findsEnglish4·1 month ago'China has almost doubled their aggression in cyber’, experts say
Today, Western governments have been more outspoken in linking China to cyber attacks and sanctioned organizations linked to malicious cyber activity. Despite this growing awareness of the threat posed by China-backed groups, … people still don’t have a firm grasp on the extent to which China has infiltrated enterprise systems …
randomname@scribe.disroot.orgOPto Technology@beehaw.org•China is building a cyber army of hackers, report findsEnglish21·1 month agoRemoved by mod
randomname@scribe.disroot.orgOPto Technology@beehaw.org•China is building a cyber army of hackers, report findsEnglish13·1 month agoThis is not about ‘bolstering cybersecurity’ but rather about attacking other countries. There is nothing even remotely similar to a ‘Tianfu Cup’ in any other country.
As I asked already in another thread: Why is it that whenever one posts something critical of China here on Lemmy, there is some commentary arguing that the US is doing the same? I don’t understand that.
That’s whataboutery back and forth.
randomname@scribe.disroot.orgOPto Technology@beehaw.org•Chinese researchers can access medical information from half a million UK GP records through UK Biobank, despite western intelligence agencies’ security fearsEnglish3·2 months agoThere are also articles about this. Feel free to apply the whataboutery also there. (s/ just to be safe, it would indeed be better to stop whataboutering and stay on topic.)
randomname@scribe.disroot.orgOPto Technology@beehaw.org•Chinese researchers can access medical information from half a million UK GP records through UK Biobank, despite western intelligence agencies’ security fearsEnglish1·2 months ago… indicating that [China’s] BGI units’ “collection and analysis of genetic data poses a significant risk of contributing to monitoring and surveillance by the government of China, which has been utilised in the repression of ethnic minorities in China”. It also claimed “the actions of these entities concerning the collection and analysis of genetic data present a significant risk of diversion to China’s military programs”.
randomname@scribe.disroot.orgto Technology@beehaw.org•China admits to being behind Volt Typhoon cyber activity targeting USEnglish6·2 months agoOne of the more elaborated news on that topic:
Chinese officials have implicitly acknowledged responsibility for a series of sophisticated cyber intrusions targeting critical U.S. infrastructure.
During a high-level meeting in Geneva with American officials, representatives from China’s Ministry of Foreign Affairs indirectly linked years of computer network breaches at U.S. ports, water utilities, airports, and other critical targets to increasing U.S. policy support for Taiwan […]
Wang Lei, a top cyber official with China’s Ministry of Foreign Affairs, made the comments after U.S. representatives emphasized that China appeared not to understand how dangerous prepositioning in civilian critical infrastructure was, and how such actions could be viewed as an act of war […]
The admission is considered extraordinary, as Chinese officials have typically denied involvement in cyber operations, blamed criminal entities, or accused the U.S. of fabricating allegations.
Dakota Cary, a China expert at cybersecurity firm SentinelOne, noted that such an acknowledgment, even indirectly, likely required instructions from the highest levels of President Xi Jinping’s government.
[Edit to insert archived source link.]
randomname@scribe.disroot.orgOPto Technology@beehaw.org•Hacking Democracy: Russia’s Digital War on German and European ElectionsEnglish3·2 months agoI don’t know where you got this, but do yourself a favor a stay away from whatever it is.
randomname@scribe.disroot.orgBanned from communityOPto Privacy@lemmy.ml•ChatGPT isn't available in China, so should the US ban DeepSeek?English22·4 months agoRemoved by mod
randomname@scribe.disroot.orgBanned from communityOPto Privacy@lemmy.ml•Chinese app DeepSeek blocked on Apple and Google app stores in Italy over data privacy concernsEnglish13·4 months agoRemoved by mod
randomname@scribe.disroot.orgBanned from communityOPto Privacy@lemmy.ml•'‘So what?’: Privacy warnings about DeepSeek fall on deaf earsEnglish47·4 months agoRemoved by mod
randomname@scribe.disroot.orgBanned from communityOPto Privacy@lemmy.ml•'‘So what?’: Privacy warnings about DeepSeek fall on deaf earsEnglish64·4 months agoRemoved by mod
randomname@scribe.disroot.orgBanned from communityOPto Privacy@lemmy.ml•Chinese app DeepSeek blocked on Apple and Google app stores in Italy over data privacy concernsEnglish38·4 months agoRemoved by mod
randomname@scribe.disroot.orgBanned from communityOPto Privacy@lemmy.ml•Chinese app DeepSeek blocked on Apple and Google app stores in Italy over data privacy concernsEnglish410·4 months agoRemoved by mod
randomname@scribe.disroot.orgBanned from communityto Privacy@lemmy.ml•DeepSeek collects keystroke data and more, storing it in Chinese serversEnglish44·4 months agoThe guys at HF (and many others) appear to have a different understanding of Open Source.
As the Open Source AI definition says, among others:
Data Information: Sufficiently detailed information about the data used to train the system so that a skilled person can build a substantially equivalent system. Data Information shall be made available under OSI-approved terms.
- In particular, this must include: (1) the complete description of all data used for training, including (if used) of unshareable data, disclosing the provenance of the data, its scope and characteristics, how the data was obtained and selected, the labeling procedures, and data processing and filtering methodologies; (2) a listing of all publicly available training data and where to obtain it; and (3) a listing of all training data obtainable from third parties and where to obtain it, including for fee.
Code: The complete source code used to train and run the system. The Code shall represent the full specification of how the data was processed and filtered, and how the training was done. Code shall be made available under OSI-approved licenses.
- For example, if used, this must include code used for processing and filtering data, code used for training including arguments and settings used, validation and testing, supporting libraries like tokenizers and hyperparameters search code, inference code, and model architecture.
Parameters: The model parameters, such as weights or other configuration settings. Parameters shall be made available under OSI-approved terms.
- The licensing or other terms applied to these elements and to any combination thereof may contain conditions that require any modified version to be released under the same terms as the original.
These three components -data, code, parameter- shall be released under the same condition.
What does ‘dishonest’ mean in this context?
Your comment supports exactly what I said. I have been here on Lemmy for only a short period of time, but I have been observing that whenever one posts an article critical of China, this user gets whatabouted to death (and sometimes called “idiot”, “F@ing liberal”, and other names). One user here in this thread even asked me whether I support the war in Israel (!) - because I posted an article on China “building a cyber army of hackers.”
What is this?
Such behavior is so widespread here on Lemmy that I argue it must be orchestrated, this doesn’t rise up organically. And it appears to be supported not only by users but also by many admins and mods.
I will stop responding to this kind of comments, btw. This is off-topic and leads to nowhere.