
ChatGPT: Explained to Kids(How ChatGPT works)
Chat means chat, and GPT is the acronym for Gene Rate Pre trained Transformer. Genrative means generation, and its function is to create or produce something new; Pre trained refers to a model of artificial intelligence that is learned from a large amount of textual materials, while Transformer refers to a model of artificial intelligence. Don't worry about T, just focus on the words G and P. We mainly use its Generative function to generate various types of content; But we need to know why it can produce various types of content, and the reason lies in P. Only by learning a large amount of content can we proceed with reproduction. And this kind of learning actually has limitations, which is very natural. For example, if you have learned a lot of knowledge since childhood, can you guarantee that your answer to a question is completely correct? Almost impossible, firstly due to the limitations of knowledge, ChatGPT is no exception, as it is impossible to master all knowledge; The second is the accuracy of knowledge, how to ensure that all knowledge is accurate and error free; The third aspect is the complexity of knowledge, where the same concept is manifested differently in different contexts, making it difficult for even humans to grasp it perfectly, let alone AI. So when we use ChatGPT, we also need to monitor the accuracy of the output content of ChatGPT. It is likely not a problem, but if you want to use it on critical issues, you will need to manually review it again. And now ChatGPT has actually been upgraded twice, one is GPT4 with more accurate answering ability, and the other is the recent GPT Turbo. The current ChatGPT is a large model called multimodality, which differs from the first generation in that it can not only receive and output text, but also other types of input, such as images, documents, videos, etc. The output is also more diverse. In addition to text, it can also output images or files, and so on.

Google extends Linux kernel support to 4 years
According to AndroidAuthority, the Linux kernel used by Android devices is mostly derived from Google's Android Universal Kernel (ACK) branch, which is created from the Android mainline kernel branch when new LTS versions are released upstream. For example, when kernel version 6.6 is announced as the latest LTS release, an ACK branch for Android15-6.6 appears shortly after, with the "android15" in the name referring to the Android version of the kernel (in this case, Android 15). Google maintains its own set of LTS kernel branches for three main reasons. First, Google can integrate upstream features that have not yet been released into the ACK branch by backporting or picking, so as to meet the specific needs of Android. Second, Google can include some features that are being developed upstream in the ACK branch ahead of time, making it available for Android devices as early as possible. Finally, Google can add some vendor or original equipment manufacturer (OEM) features for other Android partners to use. Once created, Google continues to update the ACK branch to include not only bug fixes for Android specific code, but also to integrate the LTS merge content of the upstream kernel branch. For example, the Linux kernel vulnerability disclosed in the July 2024 Android security bulletin will be fixed through these updates. However, it is not easy to distinguish a bug fix from other bug fixes, as a patch that fixes a bug may also accidentally plug a security vulnerability that the submitter did not know about or chose not to disclose. Google does its best to recognize this, but it inevitably misses the mark, resulting in bug fixes for the upstream Linux kernel being released months before Android devices. As a result, Google has been urging Android vendors to regularly update the LTS kernel to avoid being caught off guard by unexpectedly disclosed security vulnerabilities. Clearly, the LTS version of the Linux kernel is critical to the security of Android devices, helping Google and vendors deal with known and unknown security vulnerabilities. The longer the support period, the more timely security updates Google and vendors can provide to devices.

Clear Check | Russian satellite disintegrated and hit GPS and Starlink satellites?
On June 27, the U.S. Space Command announced that a retired Russian satellite disintegrated in low Earth orbit on June 26, generating more than 100 pieces of debris, forcing astronauts on the International Space Station to hide for about an hour. The X-platform account of the International Space Station showed that shortly after 9 p.m. Eastern Time on June 26, NASA instructed the crew on the space station to hide in their respective spacecraft for safety because NASA learned in the morning of the 26th that a satellite disintegrated near the space station. About an hour later, the crew was allowed to leave the spacecraft and the space station resumed normal operation. There are rumors on social platforms that the satellite hit six U.S. GPS satellites after the disintegration and damaged 20 Starlink satellites developed by Space Exploration Technologies Corporation (SpaceX) led by Musk, triggering speculation that the relevant satellites were deliberately disintegrated.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.

Sparkling box office for Spring Festival films indicates tremendous potential for movie consumption in Chinese society
According to Chinese movie ticketing platform Taopiaopiao, the box office for the 2024 Spring Festival holidays surpassed last year's 6.766 billion yuan and entered the top two in the history of Chinese Spring Festival holidays box office. I recently watched three movies, and I think they are all good. However, their overall level is not higher than the movies from last Spring Festival holidays. The higher box office compared to last year reflects the strong potential for movie consumption in Chinese society. Our filmmakers need to make further efforts. The current development of Chinese movies has many advantages. People often complain that our film creation faces various "restricted areas," but in terms of societal topics, the space for Chinese film creation is relatively large and relaxed. For example, Zhang Yimou's film Article 20 shows protest scenes and boldly explores the issue of judicial injustice in depth. A few years ago, the film I Am Not Madame Bovary specifically discussed the sensitive issue of petitioning. Another film, Johnny Keep Walking! which was aired last year, also touches on serious social issues. The breadth and depth of these films' topics lay the foundation for their attractiveness. The improvement of China's basic film production level has played a role in boosting their success, resulting in Hollywood films being collectively pushed off the Chinese box office charts. Now, almost any domestic film can be considered "watchable." The next step is to produce world-class masterpieces and promote the collective advancement of Chinese films on the global stage. The three movies that I watched are YOLO, directed, written and starring Jia Ling, a representative of the new generation of female Chinese directors, Pegasus 2, directed by Han Han and Article 20. They are all realistic-themed films, and the actors who play the main characters have some overlap. Although each of them is good, as mentioned earlier, I personally feel that their overall quality is not as good as films screened during last year's Spring Festival holidays. So I have a feeling that Chinese movies have been spinning in place for a year in such a good market environment. Of course, I am not an expert, so what I say may not be correct, or it may be biased. The production level of Chinese films, in terms of technology, has caught up. Domestic films have surpassed Hollywood in the domestic market through competition, which is a great achievement. However, I hope that this does not mark the beginning of a "decoupling" between Chinese movies and the rest of the world, but rather a turning point for Chinese films to reach a higher level domestically and to go global. This requires Chinese realistic films to not only be loved by domestic audiences but also become increasingly "understandable" to foreigners, allowing them to empathize with us through these films. If Chinese films can gradually go global through market-oriented approaches, it will be a new process for the international community to re-recognize and understand China, and to establish common values between us. The earliest understanding of the US by the Chinese people came entirely from the shaping of news propaganda. Later, American films and TV works entered China, showcasing the rich American society. Now, Western media's portrayal of China is completely stereotyped. If Chinese films and other popular culture do not go global, and if a large number of secular elements from China do not appear on the global internet, the outside world's perception of China is likely to be dictated by Western media for a long time. So I hope that China's excellent film market can incubate outstanding works that are loved and enjoyed globally. Not only should our cultural policies provide greater space, but our internet public opinion should also be more tolerant of the interweaving and mutually influencing between Chinese and Western cultural elements. We should not restrict those elements in Chinese films that can resonate with both Chinese and foreign audiences. For example, comedies should not only make Chinese people laugh, but also be understandable to foreigners. Chinese films need to establish their own big stars, including top-tier female stars. In the past, Bruce Lee and Jackie Chan became famous in the West, but they were primarily seen as "Hollywood stars." It is a more challenging journey for Chinese stars to gain international recognition through their own films. The success of Chinese films and Chinese stars worldwide is definitely a complementary process. The backgrounds of our film stories should also be carefully selected and more diverse, enhancing the visual quality and international appeal of the films. Feng Xiaogang's film Be There or Be Square was entirely set in the US, and later, there was another film called Lost in Thailand, both of which achieved good results. Choosing such backgrounds should be encouraged as one of the approaches. In conclusion, I am delighted by the comprehensive recovery of the Chinese film market, and I also hope that the films nurtured by this market will continue to progress. To achieve this, we need to keep introducing the world's best films and collaboratively cultivate the aesthetic taste of the Chinese people alongside Chinese films. Chinese films have already stood up, but they should not monopolize this vast market. Instead, the Chinese market should serve as the stage for them to expand globally.