link1s.site

How China can transform from passive to active amid US chip curbs

On Monday, executives from the three major chip giants in the US - Intel, Qualcomm, and Nvidia - met with US officials, including Antony Blinken, to voice their opposition to the Biden administration's plan of imposing further restrictions on chip sales to Chinese companies and investments in China. The Semiconductor Industry Association also released a similar statement, opposing the exclusion of US semiconductor companies from the Chinese market.

First of all, we mustn't believe that the appeals of these companies and industry associations will collectively change the determination of US political elites to stifle China's progress. These US elites are very fearful of China's rapid development, and they see "chip chokehold" as a new discovery and a successful tactic formed under US leadership and with the cooperation of allies.

Currently, the chip industry is the most complex technology in human history, with only a few companies being at the forefront. They are mainly from the Netherlands, Taiwan island, South Korea, and Japan, most of which are in the Western Pacific. These countries and regions are heavily influenced by the US. Although these companies have their own expertise, they still use some American technologies in their products. Therefore, Washington quickly persuaded them to form an alliance to collectively prevent the Chinese mainland from obtaining chips and manufacturing technology. Washington is proud of this and wants to continuously tighten the noose on China.

The New York Times directly titled an article "'An Act of War': Inside America's Silicon Blockade Against China, " in which an American AI expert, Gregory Allen, publicly claimed that this is an act of war against China. He further stated that there are two dates that will echo in history from 2022: The first is February 24, when the Russia-Ukraine conflict broke out, and the second is October 7, when the US imposed a sweeping set of export controls on selling microchips to China.

China must abandon its illusions and launch a challenging and effective counterattack. We already have the capability to produce 28nm chips, and we can use "small chip" technology to assemble small semiconductors into a more powerful "brain," exploring 14nm or even 7nm. Additionally, China is the world's largest commercial market for commodity semiconductors. Last year, semiconductor procurement in China amounted to $180 billion, surpassing one-third of the global total. In the past, China had been faced with the choice between independent innovation and external purchases. Due to the high returns from external purchases, it is easy for it to become the overwhelming choice over independent research and development. However, now the US is gradually blocking the option of external purchases, and China has no strategic choice but to independently innovate, which in turn puts tremendous pressure on American companies.

Scientists generally expect that, although China may take some detours, such as recently apprehending several company leaders who fraudulently obtained subsidies from national semiconductor policies, China has the ability to gradually overcome the chip difficulties. And we will form our own breakthroughs and industrial chain, which is expected to put quite a lot of pressure on US companies. If domestic firms acquire half of China's $180 billion per year in chip acquisitions, this would provide a significant boost for the industry as a whole and help it advance steadily.

The New York Times refers to the battle on chips as a bet by Washington. "If the controls are successful, they could handicap China for a generation; if they fail, they may backfire spectacularly, hastening the very future the United States is trying desperately to avoid," it argued. Whether it is a war or a game, when the future is uncertain, what US companies hope for most of all is that they can sell simplified versions of high-end chips to China, so that the option of external purchases by China continues to exist and remains attractive. This can not only maintain the interests of the US companies, enabling them to obtain sufficient funds to develop more advanced technologies, but also disrupt China's plans for independent innovation.

This idea is entirely based on their own commercial interests and also has a certain political and national strategic appeal. Hence, there is no shortage of supporters within the US government. US Secretary of the Treasury Janet Yellen seems to be one of them, as she has repeatedly stated that the US' restrictions on China will not "fundamentally" hurt China, but will only be "narrowly targeted." The US will balance its strict suppression on China from the perspective of maintaining its technological hegemony, while also leaving some room for China, in order to undermine China's determination to counterattack in terms of independent innovation.

China needs to use this mentality of the US to its advantage. On the one hand, China should continue to purchase US chips to maintain its economic fundamentals, and on the other hand, it should firmly support the development of domestic semiconductor companies from both financial and market perspectives. If China were to continue relying on exploiting the gaps in US chip policies in the long term, akin to a dependency on opium, it would only serve to weaken China further as it becomes increasingly addicted. China's market is extremely vast, and its innovation capabilities are generally improving and expanding. Although the chip industry is highly advanced, if there is one country that can win this counterattack, it is China. As long as we resolutely continue on the path of independent innovation, this road will definitely become wider. Various breakthroughs and turning points that are unimaginable today may soon occur.

Wto: Members have more trade promotion measures than restrictions
The latest trade monitor released recently by the World Trade Organization shows that between mid-October 2023 and mid-May 2024, WTO members continued to introduce more trade promotion measures than trade restrictive measures. The WTO said it was an important signal of members' commitment to keep trade flowing amid the current geopolitical uncertainty. According to WTO statistics, during the monitoring period, WTO members adopted 169 trade promotion measures on commodities, more than the 99 trade restrictive measures introduced. Most of the measures are aimed at imports. Commenting on the findings, WTO Director-General Ngozi Okonjo-Iweala said that despite the challenging geopolitical environment, this latest trade monitoring report highlights the resilience of world trade. Even against the backdrop of rising protectionist pressures and signs of economic fragmentation, governments around the world are taking meaningful steps to liberalize and boost trade. This demonstrates the benefits of trade on people's purchasing power, business competitiveness and price stability. The WTO monitoring also identified significant new developments in economic support measures. Subsidies as part of industrial policy are increasing rapidly, especially in areas related to climate change and national security.
The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.
Audi RS e-tron GT intelligent cockpit innovation analysis
RS e-tron GT: Shares J1 platform with Porsche Taycan. The iconic closed hexagonal "big mouth" is quite a brand recognition, and the rear of the car uses a decorative design shaped like a diffuser. Although the difference between it and the regular e-tron GT is very limited, the "RS" nameplate on the rear of the car means that it is not an ordinary person, of course, low-key is also the style of AUD-Sport. The center console continues the family design of the Audi brand, the lines are simple and refined, and the center control screen, the front air conditioning control panel and the function keys below are obviously tilted to the driver's side, echoing the product positioning of the driver's car. Sports seats, leather fabrics with red stitches, etc. appear in the configuration table of the car, rendering the interior sports atmosphere just right, and the overall beauty of the cabin has been affirmed by the reviewers. Although the official model of the cockpit chip selected by the car has not been announced, it has a high score in the evaluation items such as the cold start speed of the car, the start speed of the core application and the navigation search speed, which shows that the car performance is good. In addition, in terms of specifications and accuracy, the car received full marks in the touch accuracy and screen sharpness evaluation, and the daily high-frequency interaction experience is excellent. Of course, if you optimize the voice car control ability, its intelligent experience will be a higher level.
Ukrainian Presidential Office: Russia's attacks on multiple locations in Ukraine have killed 36 people
The Ukrainian presidential office said on July 8 local time that Russia's large-scale attacks on many parts of Ukraine have killed 36 people and injured 140 others. According to the Ukrainian State Emergency Service, a total of 619 rescue workers and 132 equipment participated in the rescue work across Ukraine that day. Ukrainian President Zelensky said on social media on the 8th that Russia launched more than 40 missiles of various types at Ukraine that day. Residential buildings and infrastructure in many cities in Ukraine were damaged in varying degrees of attacks, and a children's hospital was destroyed. Rescue departments are currently conducting emergency rescue on the scene. The Russian Ministry of Defense issued a statement on the 8th local time saying that Ukrainian officials' claim that Russia used missiles to attack Ukrainian civilian facilities was untrue. The damage suffered by Kiev was caused by the fall of missiles launched by the city's air defense system.
China's Beijing plans to allow self-driving cars to run online ride-hailing services
Beijing self-driving cars on the road will usher in legislative protection. Recently, the Beijing Municipal Bureau of Economy and Information Technology solicited comments on the "Beijing Autonomous Vehicle Regulations (Draft for Comment)". The city intends to support the use of autonomous vehicles for urban public electric bus passenger transport, online car booking, car rental and other urban travel services. In addition to application scenarios, the draft for comments also standardizes autonomous driving innovation from many aspects, such as whether there is a driver, how to deal with traffic problems, and so on. The release of the opinion draft also means that the commercialization of automatic driving is accelerating, and perhaps soon we will be able to experience the convenience of automatic driving. In addition, the accelerated pace of autonomous driving, and whether it will have an impact on the taxi and traditional network car industry, it is also worth thinking about.