link1s.site

Exclusive: Nornickel in talks with China Copper to move smelting plant to China, sources say

HONG KONG, July 9 (Reuters) - Nornickel (GMKN.MM), opens new tab is in talks with China Copper to form a joint venture that would allow the Russian mining giant to move its entire copper smelting base to China, four sources with knowledge of the matter told Reuters.

If the move goes ahead, it would mark Russia's first uprooting of a domestic plant since the U.S. and Britain banned metal exchanges from accepting new aluminium, copper and nickel produced by Russia.

It also means Nornickel's copper will be produced within the country where it is most consumed.

Nornickel said in April it planned to close its Arctic facility and build a new plant in China with an unnamed partner.

Executives at China Copper, owned by the world's largest aluminium producer Chinalco (601600.SS), opens new tab, flew to Moscow in June to discuss a possible joint venture, one of the sources said, adding that details of the structure and investment are still under discussion.

Nornickel declined to comment. Chinalco and China Copper did not respond to requests for comment via email and phone.

Sites being considered in China include Fangchenggang and Qinzhou in the Guangxi region, the two sources said, with another source saying Qingdao in Shandong province was also possible.

A decision on a joint venture will be made over the next few months, a fifth source said, adding that Nornickel's Chinese output is likely to be consumed domestically.

The new facility will have capacity to produce 450,000 tonnes of copper annually, two of the sources said, amounting to around 2% of global mined supplies estimated at around 22 million metric tons this year.

Nornickel, which according to its annual report produced 425,400 tonnes of refined copper last year, processed all of its concentrates in 2023 at the Arctic plant, its only operation producing finished copper suitable for delivery to exchanges.

Doctors visited the White House 8 times? White House: Biden did not receive treatment for Parkinson's disease
White House spokeswoman Karina Jean-Pierre denied a report in the U.S. media on the 8th that President Joseph Biden did not receive treatment for Parkinson's disease. Biden had the first televised debate of the 2024 presidential election with Republican opponent Donald Trump on June 27, and his poor performance on the spot triggered discussions about his physical condition. The New York Times reported that a doctor specializing in the treatment of Parkinson's disease had "visited" the White House eight times from August last year to March this year. Facing the media's questions about Biden's health, Jean-Pierre asked and answered himself at a regular White House press conference on the 8th: "Has the president received treatment for Parkinson's disease? No. Is he currently receiving treatment for Parkinson's disease? No, he is not. Is he taking medication for Parkinson's disease? No." Jean-Pierre said Biden had seen a neurologist three times, all related to his annual physical examination. She also took out the report issued by the doctor after Biden's most recent physical examination in February this year. The report said, "An extremely detailed neurological examination was once again reassuring" because no symptoms consistent with stroke, multiple sclerosis or Parkinson's disease were found. The doctor who went to the White House mentioned by the New York Times is Kevin Kanal, a neurology and movement disorder expert at the Walter Reed National Military Medical Center in Maryland and an authority on Parkinson's disease. Jean-Pierre suggested that the doctor might have come to treat military personnel on duty at the White House.
OpenAI's internal AI details stolen in 2023 breach, NYT reports
July 4 (Reuters) - A hacker gained access to the internal messaging systems at OpenAI last year and stole details about the design of the company's artificial intelligence technologies, the New York Times reported, opens new tab on Thursday. The hacker lifted details from discussions in an online forum where employees talked about OpenAI's latest technologies, the report said, citing two people familiar with the incident. However, they did not get into the systems where OpenAI, the firm behind chatbot sensation ChatGPT, houses and builds its AI, the report added. OpenAI executives informed both employees at an all-hands meeting in April last year and the company's board about the breach, according to the report, but executives decided not to share the news publicly as no information about customers or partners had been stolen. OpenAI executives did not consider the incident a national security threat, believing the hacker was a private individual with no known ties to a foreign government, the report said. The San Francisco-based company did not inform the federal law enforcement agencies about the breach, it added. OpenAI in May said it had disrupted five covert influence operations that sought to use its AI models for "deceptive activity" across the internet, the latest to stir safety concerns about the potential misuse of the technology. The Biden administration was poised to open up a new front in its effort to safeguard the U.S. AI technology from China and Russia with preliminary plans to place guardrails around the most advanced AI Models including ChatGPT, Reuters earlier reported, citing sources.
Zuckerberg surfed and drank beer on vacation, Musk: I prefer to work
After Meta CEO Mark Zuckerberg posted a video on his Facebook and Instagram accounts of his free time during the Independence Day holiday on the X platform, Musk said, "I prefer to work." Zuckerberg posted a video of himself surfing on a hydrofoil in a tuxedo, waving an American flag and drinking a beer, and wrote: "Happy birthday America." The video quickly went viral, and after greg shared it on the X platform, Musk replied: "I hope he continues to have fun on the yacht." I prefer to work." Musk, a workaholic, attended the 29th annual Barron Investment Conference in November 2022, where he said: "My workload went from 78 hours a week to 120 hours a week..." In 2018, he slept on the floor of the Gigafactory in Fremont in an effort to ramp up production of the Tesla Model 3.
How to evaluate the product impact of the iPhone 16
At the Apple Developer Conference held earlier, the iPhone 16 series will be equipped with iOS 18 has been revealed. At the event, Apple showed off a series of convenient interactive experiences brought by Apple Intelligence, including a more powerful Siri voice assistant, Mail app that can generate complex responses, and Safari that aggregates web information. These upgrades will no doubt make the iPhone 16 line even more attractive. In order to use Apple Intelligence, a new feature of iOS 18, the iPhone 16 and 16 Pro series are equipped with A18 chips. An external blogger found in Apple's back end that the iPhone 16 series will use the same A-series chip, and the back end code mentions A new model unrelated to the existing iPhone. It includes four iPhone 16 series models, and the four identifiers all start with the same number, indicating that Apple is attributing them to the same platform. The new iPhone will have a stainless steel battery case, which will make it easier to remove the battery to meet EU market standards, while also allowing Apple to increase the density of the battery cell in line with safety regulations.
The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.