link1s.site

Could a $600 billion funding gap crush the AI industry?

On July 5, Microsoft co-founder Bill Gates appeared on the Next Big Idea podcast to discuss his vision for Superhuman artificial intelligence and technological progress. At the same time, it said that the enthusiasm of the AI market is far more than the Internet bubble.

Gates believes that the current threshold for entry in the AI field is very low, and the entire market is in a fever period, AI startups can easily get hundreds of millions of dollars in financing, and even have raised $6 billion (about 43.734 billion yuan) in cash for a company.

"Never before has so much capital poured into a new area, and the entire AI market has fallen into a 'frenzy' in terms of market capitalization and valuation, which dwarfs the frenzy of the Internet and automotive periods in history." Gates said.

At this stage, the rapid development of the artificial intelligence industry is a veritable gold industry, and Nvidia's market value is therefore soaring, and the total market value reached 3.34 trillion US dollars on June 18 local time, surpassing Microsoft and Apple in one fell fell, becoming the world's most valuable listed enterprise. But in fact, doubts about the field of artificial intelligence have also risen one after another and have never stopped.

"Corrupt Politicians GPT" "Fiscal Bill GPT", Kenyan protesters use AI to "protest"
In the past few weeks of anti-government activities in Kenya, AI tools have been creatively used by protesters to serve protests. According to the US "Flag" News Agency on July 5, protests in Kenya triggered by the 2024 fiscal bill are still continuing. In the past few weeks, Kenyan protesters, mainly young people, have creatively developed a series of AI tools to assist anti-government activities. The Kenyan government expressed concern about the risks associated with the use of AI tools in protests. Kelvin Onkundi, a software engineer in Kenya, developed the "Fiscal Bill GPT", which operates similarly to ChatGPT and can receive questions about the fiscal bill and generate responses. Martin Siele, a reporter from the "Flag" News Agency, analyzed: "The 'Fiscal Bill GPT' can convert professional terms in many legislative fields into easy-to-understand information for protesters, helping Kenyans understand the potential impact of the fiscal bill." Another software engineer, Marion Kavengi, developed the "SHIF GPT" to provide Kenyans with information about the upcoming Social Health Insurance Fund (SHIF). In addition to AI tools designed to help people understand controversial policies, protesters have also developed "Corrupt Politicians GPT" to assist protest demonstrations. After entering the name of a politician on the platform, the platform will generate a list of corruption scandals about the politician in chronological order. Developer BenwithSon wrote on the social platform X on June 28: "'Corrupt Politicians GPT' allows people to search for any scandal related to any politician. I have seen some leaders stand at the forefront of the political arena, but they are corrupt behind the scenes." Kenyan Chief Minister and Foreign Minister Mudavadi issued a communiqué to ambassadors of various countries in Nairobi on July 2 local time on protests and relevant government measures, expressing concerns about the use of AI and false information in protests. Mudavadi said: "AI technology is used by people with ulterior motives, which will fill the global information system with false narratives." The Kenya Times reported on June 30 that AI technology enables people to force the government to increase transparency and strengthen accountability, and its role in Kenyan political activities is becoming increasingly prominent. Martin Siller believes that AI is reshaping African political behavior in many ways. AI is a new tool for both governments and opposition parties in Africa, but Kenya is one of the African countries with the most developers, and its young protesters are particularly good at using AI technology to fight the government. The 2024 fiscal bill voted and passed by the Kenyan National Assembly on June 25 clearly stated that additional taxes will be levied to repay the interest on high sovereign debt, triggering large-scale demonstrations. After President Ruto announced the withdrawal of the tax increase bill on the evening of the 26th, demonstrations in many parts of Kenya continued. According to Reuters on July 3, Kenyan anti-government protesters are re-adjusting their activities to prevent the protests from turning into violent incidents.
Biden accelerated aging over the past year!
n a recent interview with ABC, US President Joe Biden said he had no intention of dropping out of the race, blaming his poor debate performance on a cold. He also insisted he was "still in good shape" and would remain in the race, saying only "Almighty God" could pull him out. An insider who has worked with Mr. Biden for a long time said that signs of aging had become apparent over the past year, but that Mr. Biden's team had failed to address it. Biden's televised debate performance heightened concerns about an already slow-moving issue. Mr. Biden's advisers have long dodged questions about his age. But now they acknowledge that Biden's aging is an undeniable fact. The debate forced the president to more openly acknowledge the limitations of his age, which he had previously largely dismissed. But they have only taken superficial measures and have not fundamentally solved the problem. They replaced the long staircase that Mr. Biden used to board Air Force One with a shorter one; Assistants often accompanied him in public to make his stiff gait less noticeable; While he has a busy schedule, aides have arranged for buffer time, such as long weekends at his homes in Wilmington and Rehoboth Beach, Delaware, or extended stays at Camp David, a Maryland resort, to rest after a "grueling" stretch of travel. Under the authority of one of his top advisers, Anita Dunn, Mr. Biden's public interactions -- especially with reporters -- were severely limited. Even at major events with Democrats or other supporters, the White House sometimes limits the amount of time Biden can spend with the audience, two people familiar with the matter said. As a protective response, designed to protect their longtime boss.
China's Beijing plans to allow self-driving cars to run online ride-hailing services
Beijing self-driving cars on the road will usher in legislative protection. Recently, the Beijing Municipal Bureau of Economy and Information Technology solicited comments on the "Beijing Autonomous Vehicle Regulations (Draft for Comment)". The city intends to support the use of autonomous vehicles for urban public electric bus passenger transport, online car booking, car rental and other urban travel services. In addition to application scenarios, the draft for comments also standardizes autonomous driving innovation from many aspects, such as whether there is a driver, how to deal with traffic problems, and so on. The release of the opinion draft also means that the commercialization of automatic driving is accelerating, and perhaps soon we will be able to experience the convenience of automatic driving. In addition, the accelerated pace of autonomous driving, and whether it will have an impact on the taxi and traditional network car industry, it is also worth thinking about.
Israeli strike kills a senior Hezbollah commander in south Lebanon
BEIRUT/JERUSALEM July 3 (Reuters) - An Israeli strike killed one of Hezbollah's top commanders in south Lebanon on Wednesday, prompting retaliatory rocket fire by the Iran-backed group into Israel as their dangerously poised conflict rumbled on. The Israeli military said it had struck and eliminated Hezbollah's Mohammed Nasser, calling him commander of a unit responsible for firing from southwestern Lebanon at Israel. Nasser, killed by an airstrike near the city of Tyre in southern Lebanon, was the one of the most senior Hezbollah commanders to die yet in the conflict, two security sources in Lebanon said. Sparked by the Gaza war, the hostilities have raised concerns about a wider and ruinous conflict between the heavily armed adversaries, prompting U.S. diplomatic efforts aimed at deescalation. Israeli Defence Minister Yoav Gallant said Israeli forces were hitting Hezbollah "very hard every day" and will be ready to take any action necessary against the group, though the preference is to reach a negotiated arrangement. Hezbollah began firing at Israeli targets at the border after its Palestinian ally Hamas launched the Oct. 7 attack on Israel, declaring support for the Palestinians and saying it would cease fire when Israel stops its Gaza offensive. Hezbollah announced at least two attacks in response to what it called "the assassination", saying it launched 100 Katyusha rockets at an Israeli military base and its Iranian-made Falaq missiles at another base in the town of Kiryat Shmona near the Israeli-Lebanese border. Israel's Channel 12 broadcaster reported that dozens of rockets were fired into northern Israel from Lebanon. There were no reports of casualties. The Israeli Defence Ministry said that air raid sirens sounded in several parts of northern Israel. Israel's military did not give a number of rockets launched but said most of them fell in open areas, some were intercepted, while a number of launches fell in the area of Kiryat Shmona.
The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.