Greg
@jamyang.net
460 followers 790 following 150 posts
Posts Media Videos Starter Packs
Reposted by Greg
joemenn.bsky.social
Print version of my dive into the growing threats of hackers getting access to victim organizations’ #AI. Thanks to experts from NCC, SentinelOne, Endor and elsewhere.
Reposted by Greg
joshchin.bsky.social
This is yet another story about authoritarianism — but one that hits a little different. Phurba is resilience incarnate, a person born for these times. And his tale is bonkers. I hope you enjoy reading it as much we did reporting it. Gift link: www.wsj.com/world/asia/t...
The Daring Caper of a Faithful Tibetan Who Outfoxed China
He escaped from police and crossed thousands of miles of wilderness on a decadelong odyssey toward freedom.
www.wsj.com
Reposted by Greg
handle.invalid
Our latest case of #transnationalrepression: a young Chinese woman studying in France has disappeared some seven weeks ago while on a trip to visit her family in Hunan province.

She is an editor for the digital platform “Chinese Youth Stand for Tibet” (CYST)
www.tibetanreview.net/chinese-intl...
Reposted by Greg
opentechfund.bsky.social
“This is very frightening,” @interseclab.bsky.social's Marla Rivera explained the technical details of new @opentechfund.bsky.social - supported research into Geedge Networks’ censorship and surveillance technologies to @wired.com.
Reposted by Greg
fleerultra.bsky.social
so many dead canaries and we just keep on mining
Reposted by Greg
handle.invalid
The Chinese artificial intelligence engine #DeepSeek often refuses to help programmers or gives them code with major security flaws when they say they are working for #Tibetans, or other communities considered sensitive by the Chinese government, new @crowdstrike.com research shows:
joemenn.bsky.social
New research shows #DeepSeek suggests less-secure code when it is asked to help groups out of favor with the Chinese government. With its open-source model being adopted widely, this soft influence and hackability could spread. Gift link with email address etc. wapo.st/46jEZrb
AI firm DeepSeek writes less-secure code for groups China disfavors
Research by a U.S. security firm points to the country’s leading player in AI providing higher-quality results for some purposes than others.
wapo.st
Reposted by Greg
financialtimes.com
Exclusive: China’s internet regulator has told the country’s biggest technology companies to stop buying Nvidia’s artificial intelligence chips on.ft.com/468o6Rv
Reposted by Greg
dakekang.bsky.social
1/THREAD: @AP has published our investigation into how US tech firms enabled China’s digital police state. We obtained multiple, massive leaks of internal and classified Chinese government and corporate documents running into the tens of thousands:
apnews.com/article/chin...
Silicon Valley enabled brutal mass detention and surveillance in China, internal documents show
U.S. technology firms such as IBM, Dell and Cisco largely designed and built China’s surveillance state, an AP investigation finds. The tech companies deny wrongdoing.
apnews.com
Reposted by Greg
opentechfund.bsky.social
New @opentechfund.bsky.social-supported research from @interseclab.bsky.social and partners uncovers how Chinese company Geedge Networks is exporting a comprehensive, turnkey surveillance and censorship system worldwide.

Learn more:
buff.ly/R7FJAyD
Reposted by Greg
Silicon Valley’s Surveillance Technology Transfer Problem
(Davi Ottenheimer) www.flyingpenguin.com?p=72174
Historians Produce Pattern Recognition

The Associated Press investigation into Silicon Valley’s role in building China’s surveillance state reads like an old 1940s playbook. The birth of Silicon Valley was unlimited federal funding to develop radar technology for Allied forces. Eventually the results threatened American planes over Korea in a devastating turnabout. The cultural shock resuled in a “Top Gun” project that only escalated the cycles. This context matters greatly when considering tech giants like IBM, Dell, Cisco, and Intel spending over two decades essentially building the world’s most sophisticated digital prisons and handing the keys to America’s most obvious geopolitical rival.

The scale of stupidity is sobering. American companies sold billions of dollars in surveillance technology to Chinese police and government agencies, as if emboldened by repeated Congressional warnings that these tools were being used to crush dissent and target minorities.

Can you imagine a CEO at a tech firm giving an executive team presentation that “these elected politicians are telling us if we get rich helping China we also can destroy democracy and instrument racism globally, hell yeah!”
China controls ~70% of global cellular #IoT modules. Dependence risks go beyond supply chains: firmware backdoors or sudden cut-offs could be weaponised, argues Charles Parton:
congeostrategy.bsky.social
🚨 Governments remain ignorant to the threat posed by dependence on 🇨🇳 cellular IoT modules in our critical national infrastructure

Warns Charles Parton OBE, Chief Adviser to our #ChinaObservatory, in fDi Intelligence
We must face China’s rare earths 2.0 moment
Western reliance on Chinese cellular IoT modules can spiral into another pernicious addiction
www.fdiintelligence.com
Reposted by Greg
nytimes.com
In Opinion | “Even if you regard widespread surveillance as a reasonable precaution against crime, there is no way to be sure how this data could be used in the future, and no system in place to protect or regulate it,” Elizabeth Daniel Vasquez writes.
Opinion | What You Need to Know About Police Surveillance
New tools allow law enforcement agencies to track us at an unimaginable scale.
nyti.ms
Reposted by Greg
handle.invalid
#Surveillance systems used to monitor #Tibetans are sometimes built with Silicon Valley technology- exported, repurposed, and weaponised for repression.

turquoiseroof.org/weaponising-...
Silicon Valley’s Surveillance Technology Transfer Problem
(Davi Ottenheimer) www.flyingpenguin.com?p=72174
Historians Produce Pattern Recognition

The Associated Press investigation into Silicon Valley’s role in building China’s surveillance state reads like an old 1940s playbook. The birth of Silicon Valley was unlimited federal funding to develop radar technology for Allied forces. Eventually the results threatened American planes over Korea in a devastating turnabout. The cultural shock resuled in a “Top Gun” project that only escalated the cycles. This context matters greatly when considering tech giants like IBM, Dell, Cisco, and Intel spending over two decades essentially building the world’s most sophisticated digital prisons and handing the keys to America’s most obvious geopolitical rival.

The scale of stupidity is sobering. American companies sold billions of dollars in surveillance technology to Chinese police and government agencies, as if emboldened by repeated Congressional warnings that these tools were being used to crush dissent and target minorities.

Can you imagine a CEO at a tech firm giving an executive team presentation that “these elected politicians are telling us if we get rich helping China we also can destroy democracy and instrument racism globally, hell yeah!”
Reposted by Greg
campuscodi.risky.biz
Suspected Indian APT group Sidewinder is using the recent Nepalese Gen-Z protests to phish and infect with Android malware whatever is left of the local government

strikeready.com/blog/sidewin...
Sidewinder APT leverages Nepal protests to push mobile malware
Sidewinder APT is leveraging the ongoing turmoil in Nepal to distribute mobile malware.
strikeready.com
Reposted by Greg
older.bsky.social
look at the dismissive tone in this article (gift link). Is it because it's Nepal and not, say Taiwan? Because the protestors have been branded young? or just a determination to keep following the disingenuous line that the protests were about social media bans and now there's ✨irony✨?
Nepal’s Social Media Ban Backfires as Politics Moves to a Chat Room
www.nytimes.com
RAND: (2014) Internet freedom gains #resilience from synergy across projects, and many small bets: a portfolio of diverse, redundant tools beat any single solution, any day. #InternetFreedom www.rand.org/pubs/researc...