link1s.site

Exclusive: Nornickel in talks with China Copper to move smelting plant to China, sources say

HONG KONG, July 9 (Reuters) - Nornickel (GMKN.MM), opens new tab is in talks with China Copper to form a joint venture that would allow the Russian mining giant to move its entire copper smelting base to China, four sources with knowledge of the matter told Reuters.

If the move goes ahead, it would mark Russia's first uprooting of a domestic plant since the U.S. and Britain banned metal exchanges from accepting new aluminium, copper and nickel produced by Russia.

It also means Nornickel's copper will be produced within the country where it is most consumed.

Nornickel said in April it planned to close its Arctic facility and build a new plant in China with an unnamed partner.

Executives at China Copper, owned by the world's largest aluminium producer Chinalco (601600.SS), opens new tab, flew to Moscow in June to discuss a possible joint venture, one of the sources said, adding that details of the structure and investment are still under discussion.

Nornickel declined to comment. Chinalco and China Copper did not respond to requests for comment via email and phone.

Sites being considered in China include Fangchenggang and Qinzhou in the Guangxi region, the two sources said, with another source saying Qingdao in Shandong province was also possible.

A decision on a joint venture will be made over the next few months, a fifth source said, adding that Nornickel's Chinese output is likely to be consumed domestically.

The new facility will have capacity to produce 450,000 tonnes of copper annually, two of the sources said, amounting to around 2% of global mined supplies estimated at around 22 million metric tons this year.

Nornickel, which according to its annual report produced 425,400 tonnes of refined copper last year, processed all of its concentrates in 2023 at the Arctic plant, its only operation producing finished copper suitable for delivery to exchanges.

Musk is the billionaire who lost the most money in the first half of 2024: $5 billion a month
At the beginning of this year, Elon Musk had a fortune of $251 billion and could almost single-handedly solve world hunger. However, Tesla's stagnant sales, the endless struggle to buy Twitter, and the volatility of Tesla's stock price meant he lost a lot of money this year. According to Forbes, Musk is the billionaire with the most losses so far this year, with his wealth shrinking at a rate of about $5 billion a month. According to the website, his wealth shrank by more than 10% from the end of 2023 to June 28, 2024. As the website explains: Between December 31, 2023, and June 28, the last day of regular stock market trading for the first half of the year, Musk's net worth fell from $251.3 billion to $221.4 billion, a bigger drop than any other billionaire tracked by Forbes, but Musk remains the richest person on the planet. The main reason for the dip in Musk's pocketbook is that a Delaware judge in January canceled Musk's then-record Tesla compensation package worth $51 billion, which led Forbes to cut the value of the equity award by 50 percent because of uncertainty about whether Musk would receive those stock options. Excluding that bonus, Musk's wealth has remained volatile over the past six months, with the value of his 13 percent stake in Tesla shrinking by about $20 billion as falling profits and car deliveries sent the stock down 20 percent. But that was partly offset by the growth of Musk's stake in his generative artificial intelligence startup xAI to $14.4 billion (Musk also has a roughly $75 billion stake in private aerospace company SpaceX, a $7 billion stake in social media company X, And smaller stakes in other companies, such as brain experimentation startup Neuralink).
Avi Bruce appointed as head of IDF Central Command
On the evening of July 8, local time, the Israel Defense Forces issued a statement saying that Major General Avi Bluth replaced Yehuda Fox as the commander of the Israeli Central Command. Earlier that day, the Israeli army held a handover ceremony, which was presided over by the Israeli Chief of Staff Halevy. Avi Bluth joined the Israel Defense Forces in 1993 and commanded the Israeli military operations in the West Bank. In May this year, Bruce was promoted to major general and served as a military commander in the Israeli Central Command. CCTV reporters learned that in late April this year, Yehuda Fox, then commander of the Israeli Central Command, requested to resign and retire from the army in August this year. Fox had previously stated that he should bear part of the responsibility for the military intelligence failure on October 7 last year, and "must end his term like everyone else." According to the official website of the Israeli Defense Forces, the Central Command is one of the four major commands of the Israeli army, headquartered in Jerusalem, and its responsibility covers nearly one-third of Israel's territory.
Stanford AI project team apologizes for plagiarizing Chinese model
An artificial intelligence (AI) team at Stanford University apologized for plagiarizing a large language model (LLM) from a Chinese AI company, which became a trending topic on the Chinese social media platforms, where it sparked concern among netizens on Tuesday. We apologize to the authors of MiniCPM [the AI model developed by a Chinese company] for any inconvenience that we caused for not doing the full diligence to verify and peer review the novelty of this work, the multimodal AI model Llama3-V's developers wrote in a post on social platform X. The apology came after the team from Stanford University announced Llama3-V on May 29, claiming it had comparable performance to GPT4-V and other models with the capability to train for less than $500. According to media reports, the announcement published by one of the team members quickly received more than 300,000 views. However, some netizens from X found and listed evidence of how the Llama3-V project code was reformatted and similar to MiniCPM-Llama3-V 2.5, an LLM developed by a Chinese technology company, ModelBest, and Tsinghua University. Two team members, Aksh Garg and Siddharth Sharma, reposted a netizen's query and apologized on Monday, while claiming that their role was to promote the model on Medium and X (formerly Twitter), and that they had been unable to contact the member who wrote the code for the project. They looked at recent papers to validate the novelty of the work but had not been informed of or were aware of any of the work by Open Lab for Big Model Base, which was founded by the Natural Language Processing Lab at Tsinghua University and ModelBest, according to their responses. They noted that they have taken all references to Llama3-V down in respect to the original work. In response, Liu Zhiyuan, chief scientist at ModelBest, spoke out on the Chinese social media platform Zhihu, saying that the Llama3-V team failed to comply with open-source protocols for respecting and honoring the achievements of previous researchers, thus seriously undermining the cornerstone of open-source sharing. According to a screenshot leaked online, Li Dahai, CEO of ModelBest, also made a post on his WeChat moment, saying that the two models were verified to have highly similarity in terms of providing answers and even the same errors, and that some relevant data had not yet been released to the public. He said the team hopes that their work will receive more attention and recognition, but not in this way. He also called for an open, cooperative and trusting community environment. Director of the Stanford Artificial Intelligence Laboratory Christopher Manning also responded to Garg's explanation on Sunday, commenting "How not to own your mistakes!" on X. As the incident became a trending topic on Sina Weibo, Chinese netizens commented that academic research should be factual, but the incident also proves that the technology development in China is progressing. Global Times
Israeli strike kills 16 at Gaza school, military says it targeted gunmen
CAIRO/GAZA, July 6 (Reuters) - At least 16 people were killed in an Israeli strike on a school sheltering displaced Palestinian families in central Gaza on Saturday, the Palestinian health ministry said, in an attack Israel said had targeted militants. The health ministry said the attack on the school in Al-Nuseirat killed at least 16 people and wounded more than 50. The Israeli military said it took precautions to minimize risk to civilians before it targeted the gunmen who were using the area as a hideout to plan and carry out attacks against soldiers. Hamas denied its fighters were there. At the scene, Ayman al-Atouneh said he saw children among the dead. "We came here running to see the targeted area, we saw bodies of children, in pieces, this is a playground, there was a trampoline here, there were swing-sets, and vendors," he said. Mahmoud Basal, spokesman of the Gaza Civil Emergency Service, said in a statement that the number of dead could rise because many of the wounded were in critical condition. The attack meant no place in the enclave was safe for families who leave their houses to seek shelters, he said. Al-Nuseirat, one of Gaza Strip's eight historic refugee camps, was the site of stepped-up Israeli bombardment on Saturday. An air strike earlier on a house in the camp killed at least 10 people and wounded many others, according to medics. In its daily update of people killed in the nearly nine-month-old war, the Gaza health ministry said Israeli military strikes across the enclave killed at least 29 Palestinians in the past 24 hours and wounded 100 others.
The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.