Hotznplotzn

joined 2 months ago
 

cross-posted from: https://lemmy.sdf.org/post/31994855

Archived

The Xiaomi SU7, which has been lauded for its safety features since its March 2024 market launch, has recorded its first widely reported fatal accident, resulting in the deaths of three female university students.

[...]

Initial reports on Chinese social media claimed the vehicle caught fire after a collision, with allegations that the “doors could not be unlocked, preventing escape.” The incident quickly gained attention as the first publicly reported fatality involving Xiaomi’s flagship electric vehicle.

 

cross-posted from: https://lemmy.sdf.org/post/31995242

Archived

Unveiling Trae: ByteDance's AI IDE and Its Extensive Data Collection System

Trae - the coding assistant of China's ByteDance - has rapidly emerged as a formidable competitor to established AI coding assistants like Cursor and GitHub Copilot. Its main selling point? It's completely free - offering Claude 3.7 Sonnet and GPT-4o without any subscription fees. Unit 221B's technical analysis, using network traffic interception, binary analysis, and runtime monitoring, has identified a sophisticated telemetry framework that continuously transmits data to multiple ByteDance servers. From a cybersecurity perspective, this represents a complex data collection operation with significant security and privacy implications.

[...]

Key Findings:

  • Persistent connections to minimum 5 unique ByteDance domains, creating multiple data transmission vectors
  • Continuous telemetry transmission even during idle periods, indicating an always-on monitoring system
  • Regular update checks and configuration pulls from ByteDance servers, allowing for dynamic control
  • Permanent device identification via machineId parameter, which appears to be derived from hardware identifiers, enabling long-term tracking capabilities
  • Local WebSocket channels observed collecting full file content, with portions potentially transmitted to remote servers
  • Complex local microservice architecture with redundant pathways for code data, suggesting a deliberate system design
  • JWT tokens and authentication data observed in multiple communication channels, presenting potential credential exposure concerns
  • Use of binary MessagePack format observed in data transfers, adding complexity to security analysis
  • Extensive behavioral tracking mechanisms capable of building detailed user activity profiles
  • Sophisticated data segregation across multiple endpoints, consistent with enterprise-grade telemetry systems

[...]

 

cross-posted from: https://lemmy.sdf.org/post/31995242

Archived

Unveiling Trae: ByteDance's AI IDE and Its Extensive Data Collection System

Trae - the coding assistant of China's ByteDance - has rapidly emerged as a formidable competitor to established AI coding assistants like Cursor and GitHub Copilot. Its main selling point? It's completely free - offering Claude 3.7 Sonnet and GPT-4o without any subscription fees. Unit 221B's technical analysis, using network traffic interception, binary analysis, and runtime monitoring, has identified a sophisticated telemetry framework that continuously transmits data to multiple ByteDance servers. From a cybersecurity perspective, this represents a complex data collection operation with significant security and privacy implications.

[...]

Key Findings:

  • Persistent connections to minimum 5 unique ByteDance domains, creating multiple data transmission vectors
  • Continuous telemetry transmission even during idle periods, indicating an always-on monitoring system
  • Regular update checks and configuration pulls from ByteDance servers, allowing for dynamic control
  • Permanent device identification via machineId parameter, which appears to be derived from hardware identifiers, enabling long-term tracking capabilities
  • Local WebSocket channels observed collecting full file content, with portions potentially transmitted to remote servers
  • Complex local microservice architecture with redundant pathways for code data, suggesting a deliberate system design
  • JWT tokens and authentication data observed in multiple communication channels, presenting potential credential exposure concerns
  • Use of binary MessagePack format observed in data transfers, adding complexity to security analysis
  • Extensive behavioral tracking mechanisms capable of building detailed user activity profiles
  • Sophisticated data segregation across multiple endpoints, consistent with enterprise-grade telemetry systems

[...]

 

Archived

Unveiling Trae: ByteDance's AI IDE and Its Extensive Data Collection System

Trae - the coding assistant of China's ByteDance - has rapidly emerged as a formidable competitor to established AI coding assistants like Cursor and GitHub Copilot. Its main selling point? It's completely free - offering Claude 3.7 Sonnet and GPT-4o without any subscription fees. Unit 221B's technical analysis, using network traffic interception, binary analysis, and runtime monitoring, has identified a sophisticated telemetry framework that continuously transmits data to multiple ByteDance servers. From a cybersecurity perspective, this represents a complex data collection operation with significant security and privacy implications.

[...]

Key Findings:

  • Persistent connections to minimum 5 unique ByteDance domains, creating multiple data transmission vectors
  • Continuous telemetry transmission even during idle periods, indicating an always-on monitoring system
  • Regular update checks and configuration pulls from ByteDance servers, allowing for dynamic control
  • Permanent device identification via machineId parameter, which appears to be derived from hardware identifiers, enabling long-term tracking capabilities
  • Local WebSocket channels observed collecting full file content, with portions potentially transmitted to remote servers
  • Complex local microservice architecture with redundant pathways for code data, suggesting a deliberate system design
  • JWT tokens and authentication data observed in multiple communication channels, presenting potential credential exposure concerns
  • Use of binary MessagePack format observed in data transfers, adding complexity to security analysis
  • Extensive behavioral tracking mechanisms capable of building detailed user activity profiles
  • Sophisticated data segregation across multiple endpoints, consistent with enterprise-grade telemetry systems

[...]

 

cross-posted from: https://lemmy.sdf.org/post/31994855

Archived

The Xiaomi SU7, which has been lauded for its safety features since its March 2024 market launch, has recorded its first widely reported fatal accident, resulting in the deaths of three female university students.

[...]

Initial reports on Chinese social media claimed the vehicle caught fire after a collision, with allegations that the “doors could not be unlocked, preventing escape.” The incident quickly gained attention as the first publicly reported fatality involving Xiaomi’s flagship electric vehicle.

 

Archived

The Xiaomi SU7, which has been lauded for its safety features since its March 2024 market launch, has recorded its first widely reported fatal accident, resulting in the deaths of three female university students.

[...]

Initial reports on Chinese social media claimed the vehicle caught fire after a collision, with allegations that the “doors could not be unlocked, preventing escape.” The incident quickly gained attention as the first publicly reported fatality involving Xiaomi’s flagship electric vehicle.

[–] [email protected] 1 points 57 minutes ago

I don't understand the downvotes here.

 

cross-posted from: https://lemmy.sdf.org/post/31959167

Russia is to be put on the enhanced tier of the Foreign Influence Registration Scheme (FIRS), meaning anyone working for the Russian state in the UK will need to declare what they are doing or risk jail, the government announced [...]

Introduced under the National Security Act 2023, FIRS is a tool to help protect our democracy, economy and society from covert, deceptive or otherwise harmful activities against UK interests. The enhanced tier has been specifically designed to shed light on activities directed by particular foreign powers which pose a threat to the safety or interests of the UK.

Russia is the second country to be placed on the enhanced tier, following the announcement in March that Iran would be specified. The government will designate all parts of the Russian state – including its president, its parliament, all Russian ministries and their agencies, and the Russian intelligence services.

The specification of the Russian state is in response to the significant and persistent threat Russia poses to the UK and our interests, which has only increased in recent years. Russian hostile acts on UK soil have ranged from the use of a deadly nerve agent in Salisbury, malign cyber incidents - which included targeting UK parliamentarians through spear-phishing campaigns - as well as espionage and arson.

[...]

Meanwhile, Russia continues to wage its unprovoked and illegal war against Ukraine, a war which Russia could end by tomorrow by withdrawing its forces. The UK remains committed to a just and lasting peace in Ukraine and will continue to exert maximum economic pressure to stop Russia from threatening and undermining Ukraine’s sovereignty, territorial integrity and independence, and to help ensure Russia pays for the damage it has caused.

[...]

 

Russia is to be put on the enhanced tier of the Foreign Influence Registration Scheme (FIRS), meaning anyone working for the Russian state in the UK will need to declare what they are doing or risk jail, the government announced [...]

Introduced under the National Security Act 2023, FIRS is a tool to help protect our democracy, economy and society from covert, deceptive or otherwise harmful activities against UK interests. The enhanced tier has been specifically designed to shed light on activities directed by particular foreign powers which pose a threat to the safety or interests of the UK.

Russia is the second country to be placed on the enhanced tier, following the announcement in March that Iran would be specified. The government will designate all parts of the Russian state – including its president, its parliament, all Russian ministries and their agencies, and the Russian intelligence services.

The specification of the Russian state is in response to the significant and persistent threat Russia poses to the UK and our interests, which has only increased in recent years. Russian hostile acts on UK soil have ranged from the use of a deadly nerve agent in Salisbury, malign cyber incidents - which included targeting UK parliamentarians through spear-phishing campaigns - as well as espionage and arson.

[...]

Meanwhile, Russia continues to wage its unprovoked and illegal war against Ukraine, a war which Russia could end by tomorrow by withdrawing its forces. The UK remains committed to a just and lasting peace in Ukraine and will continue to exert maximum economic pressure to stop Russia from threatening and undermining Ukraine’s sovereignty, territorial integrity and independence, and to help ensure Russia pays for the damage it has caused.

[...]

 

cross-posted from: https://lemmy.sdf.org/post/31957116

Millions of Americans have downloaded apps that secretly route their internet traffic through Chinese companies, according to an investigation by the Tech Transparency Project (TTP), including several that were recently owned by a sanctioned firm with links to China’s military.

TTP’s investigation found that one in five of the top 100 free virtual private networks in the U.S. App Store during 2024 were surreptitiously owned by Chinese companies, which are obliged to hand over their users’ browsing data to the Chinese government under the country’s national security laws. Several of the apps traced back to Qihoo 360, a firm declared by the Defense Department to be a “Chinese Military Company." Qihoo did not respond to questions about its app-related holdings.

[...]

VPNs allow users to mask the IP address that can identify them, and, in theory, keep their internet browsing private. For that reason, they have been used by people around the world to sidestep government censorship or surveillance, or because they believe it will improve their online security. In the U.S., kids often download free VPNs to play games or access social media during school hours.

However, VPNs can themselves pose serious risks because the companies that provide them can read all the internet traffic routed through them. That risk is compounded in the case of Chinese apps, given China’s strict laws that can force companies in that country to secretly share access to their users’ data with the government.

[...]

The VPN apps identified by TTP have been downloaded more than 70 million times from U.S. app stores, according to data from AppMagic, a mobile apps market intelligence firm.

[...]

The findings raise questions about Apple’s carefully cultivated reputation for protecting user privacy. The company has repeatedly sought to fend off antitrust legislation designed to loosen its control of the App Store by arguing such efforts could compromise user privacy and security. But TTP’s investigation suggests that Apple is not taking adequate steps to determine who owns the apps it offers its users and what they do with the data they collect. More than a dozen of the Chinese VPNs were also available in Apple’s App Store in France in late February, showing that the issue extends to other Western markets.

[...]

 

cross-posted from: https://lemmy.sdf.org/post/31957116

Millions of Americans have downloaded apps that secretly route their internet traffic through Chinese companies, according to an investigation by the Tech Transparency Project (TTP), including several that were recently owned by a sanctioned firm with links to China’s military.

TTP’s investigation found that one in five of the top 100 free virtual private networks in the U.S. App Store during 2024 were surreptitiously owned by Chinese companies, which are obliged to hand over their users’ browsing data to the Chinese government under the country’s national security laws. Several of the apps traced back to Qihoo 360, a firm declared by the Defense Department to be a “Chinese Military Company." Qihoo did not respond to questions about its app-related holdings.

[...]

VPNs allow users to mask the IP address that can identify them, and, in theory, keep their internet browsing private. For that reason, they have been used by people around the world to sidestep government censorship or surveillance, or because they believe it will improve their online security. In the U.S., kids often download free VPNs to play games or access social media during school hours.

However, VPNs can themselves pose serious risks because the companies that provide them can read all the internet traffic routed through them. That risk is compounded in the case of Chinese apps, given China’s strict laws that can force companies in that country to secretly share access to their users’ data with the government.

[...]

The VPN apps identified by TTP have been downloaded more than 70 million times from U.S. app stores, according to data from AppMagic, a mobile apps market intelligence firm.

[...]

The findings raise questions about Apple’s carefully cultivated reputation for protecting user privacy. The company has repeatedly sought to fend off antitrust legislation designed to loosen its control of the App Store by arguing such efforts could compromise user privacy and security. But TTP’s investigation suggests that Apple is not taking adequate steps to determine who owns the apps it offers its users and what they do with the data they collect. More than a dozen of the Chinese VPNs were also available in Apple’s App Store in France in late February, showing that the issue extends to other Western markets.

[...]

 

cross-posted from: https://lemmy.sdf.org/post/31957116

Millions of Americans have downloaded apps that secretly route their internet traffic through Chinese companies, according to an investigation by the Tech Transparency Project (TTP), including several that were recently owned by a sanctioned firm with links to China’s military.

TTP’s investigation found that one in five of the top 100 free virtual private networks in the U.S. App Store during 2024 were surreptitiously owned by Chinese companies, which are obliged to hand over their users’ browsing data to the Chinese government under the country’s national security laws. Several of the apps traced back to Qihoo 360, a firm declared by the Defense Department to be a “Chinese Military Company." Qihoo did not respond to questions about its app-related holdings.

[...]

VPNs allow users to mask the IP address that can identify them, and, in theory, keep their internet browsing private. For that reason, they have been used by people around the world to sidestep government censorship or surveillance, or because they believe it will improve their online security. In the U.S., kids often download free VPNs to play games or access social media during school hours.

However, VPNs can themselves pose serious risks because the companies that provide them can read all the internet traffic routed through them. That risk is compounded in the case of Chinese apps, given China’s strict laws that can force companies in that country to secretly share access to their users’ data with the government.

[...]

The VPN apps identified by TTP have been downloaded more than 70 million times from U.S. app stores, according to data from AppMagic, a mobile apps market intelligence firm.

[...]

The findings raise questions about Apple’s carefully cultivated reputation for protecting user privacy. The company has repeatedly sought to fend off antitrust legislation designed to loosen its control of the App Store by arguing such efforts could compromise user privacy and security. But TTP’s investigation suggests that Apple is not taking adequate steps to determine who owns the apps it offers its users and what they do with the data they collect. More than a dozen of the Chinese VPNs were also available in Apple’s App Store in France in late February, showing that the issue extends to other Western markets.

[...]

 

Millions of Americans have downloaded apps that secretly route their internet traffic through Chinese companies, according to an investigation by the Tech Transparency Project (TTP), including several that were recently owned by a sanctioned firm with links to China’s military.

TTP’s investigation found that one in five of the top 100 free virtual private networks in the U.S. App Store during 2024 were surreptitiously owned by Chinese companies, which are obliged to hand over their users’ browsing data to the Chinese government under the country’s national security laws. Several of the apps traced back to Qihoo 360, a firm declared by the Defense Department to be a “Chinese Military Company." Qihoo did not respond to questions about its app-related holdings.

[...]

VPNs allow users to mask the IP address that can identify them, and, in theory, keep their internet browsing private. For that reason, they have been used by people around the world to sidestep government censorship or surveillance, or because they believe it will improve their online security. In the U.S., kids often download free VPNs to play games or access social media during school hours.

However, VPNs can themselves pose serious risks because the companies that provide them can read all the internet traffic routed through them. That risk is compounded in the case of Chinese apps, given China’s strict laws that can force companies in that country to secretly share access to their users’ data with the government.

[...]

The VPN apps identified by TTP have been downloaded more than 70 million times from U.S. app stores, according to data from AppMagic, a mobile apps market intelligence firm.

[...]

The findings raise questions about Apple’s carefully cultivated reputation for protecting user privacy. The company has repeatedly sought to fend off antitrust legislation designed to loosen its control of the App Store by arguing such efforts could compromise user privacy and security. But TTP’s investigation suggests that Apple is not taking adequate steps to determine who owns the apps it offers its users and what they do with the data they collect. More than a dozen of the Chinese VPNs were also available in Apple’s App Store in France in late February, showing that the issue extends to other Western markets.

[...]

[–] [email protected] 3 points 16 hours ago

The headline should rather be, "Russia forces Finland, other neighbouring countries to withdraw from landmines treaty." It's very sad that they have do that.

[–] [email protected] 22 points 2 days ago

The next propaganda news. The senior politician Michael Kretschmer - 'not wanted' in Ukraine- also questioned Germany's support and didn't want to deliver weapons to Kyiv in 2022 when the war started.

[–] [email protected] 4 points 2 days ago (2 children)

I don't know, maybe. I am just wondering what this "other agenda" actually is. Undermining Ukraine's EU accession? It's independence? I don't know, but it's good that Zelenskyy has rejected the deal.

[–] [email protected] 35 points 2 days ago (5 children)

According to renowned scientists, Ukraine doesn’t actually have minable Rare Earths.

The contentious 28 February Oval Office meeting can’t be understood without a crucial piece of context: there are no deposits of rare-earth ore in Ukraine known to be minable in an economically viable way. And that would be true even if full-scale warfare were not raging in the country’s east, where a great deal of its mineral resources are concentrated.

Ukraine is believed to have four areas with substantial deposits of rare earth ores, according to Erik Jonsson, senior geologist with the Geological Survey of Sweden. “There are four slightly bigger deposits: Yastrubetske, Novopoltavske, Azovske, and Mazurivske. All but one of them seem to be now within or near the zone that the Russians control, as far as I can tell,” says Jonsson. “And when it comes to resources in those deposits, I mean, we have numbers; yes, that’s nice. But we have no real, detailed, outline of how those numbers were arrived at.” The numbers are believed to come from Soviet surveys dating as far back as the 1960s.

“The rare-earth deposits don’t look that relevant,” Jonsson concludes. “I mean, I wouldn’t go for them.” Two of the deposits are dominated by a mineral called britholite, he notes, which is not desirable because it has not been processed for rare earths, which means that almost nothing exists in the way of process chemistry and equipment.

“If you want critical minerals, Ukraine ain’t the place to look for them,” declares Jack Lifton, executive chairman of the Critical Minerals Institute. “It’s a fantasy. There’s no point to any of this. There’s some other agenda going on here. I can’t believe that anybody in Washington actually believes that it makes sense to get rare earths in Ukraine.”

[Emphasis mine.]

[–] [email protected] 1 points 3 days ago (1 children)

You are explicitly accepting here the worst of disinformation (in violation of the comm's rule, btw). And you have been offending people, just read your comments back then.

[–] [email protected] 1 points 3 days ago (3 children)

The argument was more nuanced.

'More nuanced'? You even got offensive as practically all others in this thread back then had a different opinion. People switch to pure propaganda bubbles anyway, whether or not you are explicitly fine with Chinese and Russian propaganda. There's is no excuse for that.

[–] [email protected] 0 points 3 days ago* (last edited 3 days ago) (5 children)

@[email protected]

First, not all here are supposedly aware that this media outlet is propaganda, but even if so, there is no need for this garbage imo. And, second, the same user cited Alexandr Dugin, one of Putin's most derailed propaganda figures (who supports Russia's invasion because, according to Dugin, all Ukrainians are 'nazis' - Dugin is one of the Russian figures from whom this and other repugnant slurs come from, used by Russia to justify the war).

That aside, you and me (together wirh a couple of others if I remember that right) had a discussion in another thread some time ago. Back then you, poVoq, argued to explicitly allow propaganda, so I am -unfortunately- not surprised here.

[–] [email protected] 27 points 3 days ago (4 children)

Friendly relations are always good, but China is the same hostile country as before. Nothing has changed. As Mr. Carney says, "We obviously do have a large amount of trade with them[China], but we have to be very careful, very deliberate, and they need to meet Canadian standards.” The same is true for European standards.

China is an active threat to Europe as, for example, it supports Russia in its war against Ukraine, it conducts sabotage and subversion, thus tries to aggressively undermine stability, and attempts to gain influence by controlling global global supply chains and information through technology in order to spread their totalitarian system across the globe.

“There are partners in Asia with whom we can build deeper ties. But the partners in Asia that share our values don’t include China.”

[–] [email protected] 6 points 3 days ago

Hybrid Warfare – the coordinated efforts of Russia and China against the West -- (January 2025)

Russia and China are conducting hybrid warfare campaigns against Western nations, leveraging a blend of conventional military assets and non-military tactics, including cyberattacks, disinformation, economic pressure, and exploitation of political and legal systems. These efforts aim to destabilise and weaken adversaries from within.

Russia has been intensifying its sabotage campaigns across the EU, reflecting a significant escalation in hybrid hostilities [...]

China, while maintaining a more covert stance, has recently begun to employ economic coercion, bribery and corruption, along with significant lending and advancements in technology and logistics to influence political parties, subtly but effectively. By integrating itself within essential global supply chains and controlling information through technology, China exerts a soft but potent form of political influence, aimed at swaying the economic and political decisions of target countries [...]

[–] [email protected] -1 points 3 days ago* (last edited 3 days ago) (1 children)

@[email protected]

As an addition to what I have already written in this thread (and having read your other comments here), the question is rather what your motive is in publishing this Chinese and Russian authoritarian propaganda like SCMP and Dugin.

[–] [email protected] 2 points 3 days ago* (last edited 3 days ago) (1 children)

@[email protected]

What are you doing here?

Alexandr Dugin is a strong supporter of Vladimir Putin who is often referred to as "Putin's brain". Putin's politics and his propganda content echoes Dugin's "philosophy" to a large part. Dugin vocally supported the Russian annexation of Crimea in 2014, and since 2022 has supported its full invasion of Ukraine as representing a battle against "absolute Evil, embodied in Western civilisation, its liberal-totalitarian hegemony and in Ukrainian Nazism".

What this man is saying is the worst of extremist and derailed propganda.

view more: next ›