Technology

2362 readers
1 users here now

Post articles or questions about technology

founded 2 years ago
MODERATORS
76
 
 

cross-posted from: https://scribe.disroot.org/post/2776105

The European Commission has informed TikTok of its preliminary view that the company does not fulfil the Digital Services Act (DSA)'s obligation to publish an advertisement repository. Such an advertising repository is critical for researchers and civil society to detect scam advertisements, hybrid threat campaigns, as well as coordinated information operations and fake advertisements, including in the context of elections.

The Commission has found that TikTok does not provide the necessary information about the content of the advertisements, the users targeted by the ads, and who paid for the advertisements. Moreover, TikTok's advertisement repository does not allow the public to search comprehensively for advertisements on the basis of this information, thereby limiting the usefulness of the tool.

[...]

TikTok now has the possibility to exercise its rights of defence by examining the documents in the Commission's investigation file and by replying in writing to the Commission's preliminary findings. In parallel, the European Board for Digital Services will be consulted.

If the Commission's preliminary views were to be ultimately confirmed, the Commission may issue a non-compliance decision, which may trigger a fine of up to 6% of the total worldwide annual turnover of the provider as well as an enhanced supervision period to ensure compliance with the measures the provider intends to take to remedy the breach. The Commission can also impose periodic penalty payments to compel a platform to comply.

[...]

[The EU sees the advertisement repository as a vital tool enabling researchers to detect scam ads and coordinated campaigns that aim to disrupt elections such as it happened in Romania that was plunged into political chaos last year when the first round of the presidential election was annulled. Back then, the country’s intelligence services alleged that Russia had mounted an online campaign to promote a far-right and previously widely unknown politician who topped the poll. On Sunday [May 18], Romania will choose between two candidates in the second round of the rescheduled presidential elections.]

77
 
 

cross-posted from: https://scribe.disroot.org/post/2772572

Viginum, the French government body responsible for monitoring foreign digital interference, published a detailed report uncovering a large-scale Russian influence operation that used TikTok to sway Romania’s presidential race in December last year.

The campaign, backed by Russian-linked networks, boosted fringe candidate Calin Georgescu and ultimately led Romanian authorities to annul the vote.

...

Viginum is now calling on France and other EU countries to increase oversight of digital advertising and influencer activity ahead of upcoming elections.

“The absence of transparency about the origin of funding and advertisements allowed the foreign network to move while remaining virtually invisible, directly reaching a gigantic electoral pool,” the report said.

Romania’s elections this month [on May 18] will be followed by votes in Albania and Poland, raising concerns that similar campaigns could target those countries next.

...

[Sergiu Miscoiu of Babes-Bolyai University] said Russian disinformation efforts across Eastern Europe are rarely designed to promote Russia directly. Instead, they aim to erode confidence in democratic institutions.

“They will try just to seed doubts about the European Union, about liberal democracy, to create alternative narratives, and through fake news and disinformation, to weaken the trust in the authorities,” he said.

One recent example is a false campaign claiming that young Europeans would be forcibly sent to fight in Ukraine. The rumour spread widely among Romanian and Bulgarian communities, stoking fear and distrust.

Other operations target everyday frustrations.

“There would be a report on ‘Eastern countries getting the rotten apples, the expired bananas, the second-hand services, and so they remain second-hand Europeans, while all the good products are reserved for the Western Europeans’,” said Miscoiu.

Viginum had already issued warnings last year about Russian attempts to meddle in European elections. Its latest findings suggest that while the Romanian vote was re-run, the tactics used to disrupt it are still in play.

78
 
 

cross-posted from: https://scribe.disroot.org/post/2772422

Google, Microsoft, Amazon, X, and the entire tracking-based advertising industry rely on the “Transparency & Consent Framework” (TCF) to obtain “consent” for data processing. This evening [May 14] the Belgian Court of Appeal ruled that the TCF is illegal. The TCF is live on 80% of the Internet.

The decision arises from enforcement by the Belgian Data Protection Authority, prompted by complainants coordinated by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties. The group of complainants are: Dr Johnny Ryan of Enforce, Katarzyna Szymielewicz of the Panoptykon Foundation, Dr Jef Ausloos, Dr Pierre Dewitte, Stichting Bits of Freedom, and Ligue des Droits Humains.

[...]

79
 
 

U.S. energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure after unexplained communication equipment was found inside some of them, two people familiar with the matter said.

Power inverters, which are predominantly produced in China, are used throughout the world to connect solar panels and wind turbines to electricity grids. They are also found in batteries, heat pumps and electric vehicle chargers.

While inverters are built to allow remote access for updates and maintenance, the utility companies that use them typically install firewalls to prevent direct communication back to China.

However, rogue communication devices not listed in product documents have been found in some Chinese solar power inverters by U.S experts who strip down equipment hooked up to grids to check for security issues, the two people said.

Over the past nine months, undocumented communication devices, including cellular radios, have also been found in some batteries from multiple Chinese suppliers, one of them said.

[...]

80
 
 

cross-posted from: https://lemmy.sdf.org/post/34459495

The woman who appeared before the Munich Labor Court earlier this year was once considered a star of German scientific research. The researcher, whose name we are shortening to Z., was celebrated, honoured, and in high demand. She revolutionised an entire field; her lectures filled halls, she was showered with praise and prestigious awards. She was among the most frequently cited researchers in Germany and gained international attention as a top talent.

But her employment with the German Aerospace Center (Deutsches Luft- und Raumfahrtzentrum, DLR) quietly came to an end almost unnoticed. No one spoke publicly about the reasons for her dismissal. In 2022, Z. lost her prestigious position there, and took legal action.

[...]

It was a suspicion of espionage that led to the DLR’s break with the brilliant researcher from China. A grave allegation that could destroy her career, should it be substantiated.

[...]

At this stage, it is neither possible to confirm nor deny whether Z. was in fact spying for China at the DLR.

[...]

[As an] investigation reveals, Z. maintains extensive connections to the Chinese defence apparatus. In Munich, she orchestrates a network of doctoral candidates and visiting researchers who previously worked at institutions linked to the military in China.

It cannot be ruled out that intelligence from Munich may have flowed into Chinese military technology. Several of the institutions with which Z. collaborated on research projects are involved in China’s notorious satellite programme. Experts suspect that the programme is intended, among other things, to monitor naval movements in the South China Sea – crucial to the territorial dispute over Taiwan.

[...]

At the TUM she is responsible for publicly funded multi-million-euro projects in the field of remote sensing combined with AI or social media data. She develops highly complex algorithms to extract geoinformation from satellite imagery – enabling, for example, the mapping of cities or the tracking of natural disasters.

[...]

According to the official project description, the research findings [of projects led by Z.] would be “invaluable for many scientific, governmental, and planning tasks.” This project supposedly puts Germany in “pole position” in the race for this technology.

In another publicly funded project, Z. explored the extent to which social media posts can be integrated into Earth observation, and delivered impressive findings. Her algorithms help determine, for instance, whether buildings are residential properties or offices. In her interview with the Helmholtz magazine, she says: “We know, for example, that in a residential building, many tweets are sent in the morning and evening, whereas in an office building, they are mainly sent during the day.”

[...]

For those at the TUM, where she remained a professor, the exact circumstances of her dismissal from the DLR were initially unknown. However, some of the roughly 40 members of staff at her department began to prick up their ears. Rumours started to circulate among employees in the department about supposed irregularities on the servers under Z.’s supervision.

It was the period shortly after Russia’s invasion of Ukraine. Experts assumed that China could attack Taiwan in the near future. In light of global political threats, research collaborations with China were under greater scrutiny than ever before. Since 2022, CORRECTIV has published several investigations revealing how the Chinese state apparatus systematically uses research findings from international collaborations to advance its military technologies. This has been state doctrine in China for years and is referred to as the “military-civil fusion”.

Just over a year ago, a woman from Z.’s immediate professional circle contacted CORRECTIV with an initial tip-off. She wondered whether the research being carried out at the department might be falling into the hands of the Chinese military.

[...]

Z.’s biography is certainly impressive, but her official CV at on the TUM website does not disclose where she got her bachelor’s degree: namely, the National University of Defence Technology (NUDT) in Changsha – China’s most important military institution. It reports directly to the Central Military Commission, the highest military authority in the People’s Republic.

[...]

A “very large volume of data” from the satellite was reportedly transferred to a server under Z.’s supervision. Apparently, there was a “permanent streaming connection” between this server at the TUM and the DLR. While this was, in principle, permitted, the DLR’s counterintelligence team later determined that the server had not been adequately secured. According to their findings, it was not protected by the “TUM’s firewall” and was accessible from anywhere on the internet.

[...]

According to the DLR, a hacker attack on the server occurred in May 2022. The server was allegedly used for so-called Bitcoin mining – where cybercriminals illegally generate cryptocurrency using third-party servers or computers. The DLR concluded that “unauthorised third parties” thereby had access to all data stored on the server – including to the aforementioned sensitive satellite data.

[...]

She [Z.] hired individuals from institutions with military affiliations in China on many occasions, at times bypassing the DLR’s security clearance procedures. According to the DLR’s written statement to the works council, one such case was the original trigger for her dismissal in 2022: Z. is said to have made multiple attempts to continue funding a doctoral student with DLR funds, despite the institution’s rejection of him. Z. responded by saying that “there were never any specific or individual security concerns” about the researcher in questions. This, she argued, amounted to blanket suspicion.

[...]

81
82
83
 
 

cross-posted from: https://scribe.disroot.org/post/2684489

Archived version

Solar panels with suspected links to Chinese slave labour have been installed by dozens of organisations including Manchester City, Cheltenham Racecourse and David Lloyd gyms, The i Paper can reveal.

The scale of Britain’s use of solar panels made by firms alleged to have used components made from the forced labour of minorities in China can be disclosed for the first time.

As well as commercial premises, the locations include schools, hospitals and universities across the country. There is no suggestion that any of the organisations installed solar panels with knowledge of links to Chinese slave labour.

...

[The investigation] has mapped 84 non-residential locations where solar panels have been installed with links to alleged slave labour. The data is based on evidence provided by Sheffield Hallam University’s Helena Kennedy Centre for International Justice, the Inter-Parliamentary Alliance on China (IPAC) and open source analysis.

...

Last week, growing concerns over Britain’s use of Chinese panels with links to Uyghur oppression forced [UK] Energy Secretary Ed Miliband into banning them from being used by the state-funded Great British Energy company unless it can “ensure that slavery and human trafficking is not taking place” in its business or supply chains.

...

IPAC’s senior analyst Chung Ching Kwong believes [the] disclosures are a conservative estimate of the UK’s use of such tainted technology, because of the lack of transparency about the original source of materials used in many panels.

UK consumers are unknowingly complicit in Uyghur forced labour,” said Ms Kwong. “Our work shows how big a mountain the government has to climb to root out slave-made renewables.”

...

Professor Laura Murphy at the Helena Kennedy Centre for International Justice at Sheffield Hallam University has led the way in tracing the original source of polysilicon in these panels. Her latest report in 2023 detailed how a number of Chinese firms had “high” exposure to production in Xinjiang. As well as Jinko, these included: JA Solar, Qcells, Canadian Solar, Trina Solar, and LONGi Solar.

Her report stated: “None of the companies that were engaged in state-sponsored labour transfers in 2021 has announced any changes to its recruitment methods or shown any resistance to participation in the PRC (Peoples Republic of China) Government’s programmes. Indeed, since that time, the PRC Government’s labour transfer programme has only increased in scale and the pressure on companies to absorb the workers the state deemed to be surplus remains high.”

...

The UK formed the Solar Stewardship Initiative (SSI) with trade organisations in a bid to tackle human rights challenges within the global solar supply chain including “rigorously” auditing some Chinese sites. Trini Solar and JA Solar are members. The latter firm was suspended in January after the US banned panels made by one of its subsidiaries but was reinstated after the SSI concluded its supply practices had changed.

SSI’s chief executive Rachel Owens said: “We are acutely aware of the complexities involved in verifying supply chain links that may be several tiers removed from the end-product. That is precisely why the SSI, together with a large range of stakeholders including civil society, human rights experts, international financial institutions and industry, developed the SSI Supply Chain Traceability Standard. It will be implemented in 2025.”

...

Some Chinese firms have criticised Sheffield Hallam’s report, claiming it disregards corporate due diligence policies.

But Prof Murphy who strongly defended her research, warned against companies taking the words of Chinese firms as evidence that supply chains are clean.

She said: “A simple attestation that forced labor has been excluded simply isn’t enough to ensure that modules are in fact free and clear of forced labor.”

Chloe Cranston at Anti-Slavery International, claimed a lack of extensive testing of Chinese manufacturers has made the UK a “dumping ground” for panels linked to slave labour.

She said: “What we were seeing is many of the big solar companies… essentially creating one clean supply chain for the US to meet the requirements there but then they were not having to take those same steps in other markets globally meaning that the UK market was opening itself up as a dumping ground.”

...

84
 
 

cross-posted from: https://lemmy.sdf.org/post/33718690

Archived

[...]

CryptPad has now become the preferred platform for collecting form submissions, at least for one of their recent initiatives.

[...]

As part of the UN Open Source Principles initiative, the UN has invited other organizations to support and officially endorse these principles. To collect responses, they are using CryptPad instead of Google Forms.

This initiative aims to promote the adoption of open source technologies within the UN, while encouraging collaboration, ensuring transparency, and safeguarding user data.

[...]

85
86
 
 

cross-posted from: https://lemmy.sdf.org/post/33585643

Archived

[...]

Donald Trump’s order, which will come into effect on May 2, which will end the duty-free status of goods from China and Hong Kong under $800 in the United States, could fundamentally shake the American operations of Chinese e-commerce giants. In response to the shrinking market, companies – led by Shein, Temu and AliExpress – are expected to redirect their unsold stocks to Europe. This could have serious consequences for EU trade, industry and the budget.

[...]

According to current EU regulations, imported small packages under the value threshold of 150 euros are duty-free. The French newspaper L’Express estimates that around 12 million such small packages arrive in the EU every day, worth a total of €4.6 billion a year. The fact that around 65% of packages are deliberately undervalued helps to circumvent customs borders. The trend is already visible in France: according to the CEO of La Poste, one in four packages arriving comes from the Shein or Temu platforms.

[...]

In response to the expected import pressure, the European Commission has set up a monitoring task force to monitor early signs of a Chinese parcel tsunami. Olof Gill, the Commission’s customs spokesman, confirmed that if it is proven that the increasing imports are causing industrial damage, they are ready to introduce protective measures – such as safeguard duties or quotas. The French economy ministry is particularly active in calling for a swift response, stressing that Europe should not bear the consequences of US political decisions.

87
 
 

cross-posted from: https://lemmy.sdf.org/post/33548424

Archived

  • The agency said that before DeepSeek’s chatbot was removed from app stores in South Korea, the company was transferring user data to firms in China and the U.S. without consent.
  • The findings were released in relation to an ongoing investigation into DeepSeek, and the company has been sent corrective recommendations.

South Korea’s data protection authority has concluded that Chinese artificial intelligence startup DeepSeek collected personal information from local users and transferred it overseas without their permission.

The authority, the Personal Information Protection Commission [PIPC], released its written findings on Thursday in connection with a privacy and security review of DeepSeek.

It follows DeepSeek’s removal of its chatbot application from South Korean app stores in February at the recommendation of PIPC.

[...]

During DeepSeek’s presence in South Korea, it transferred user data to several firms in China and the U.S. without obtaining the necessary consent from users or disclosing the practice, the PIPC said.

The agency highlighted a particular case in which DeepSeek transferred information from user-written AI prompts, as well as device, network, and app information, to a Chinese cloud service platform named Beijing Volcano Engine Technology Co.

[...]

When the data protection authority announced the removal of DeepSeek from local app stores, it signaled that the app would become available again once the company implemented the necessary updates to comply with local data protection policy.

That investigation followed reports that some South Korean government agencies had banned employees from using DeepSeek on work devices. Other global government departments, including in Taiwan, Australia, and the U.S., have reportedly instituted similar bans.

88
 
 

cross-posted from: https://lemmy.sdf.org/post/33547213

Archived

In an interview with La Tribune Dimanche, Eric Lombard, the French Minister of Economy discussed the rising influx of Chinese low-cost products into France amid Donald Trump’s customs measures. The minister plans to announce new actions within the next ten days.

Is France on the verge of being flooded with Chinese products from Temu and Shein, e-commerce platforms known for their unbeatable prices? This concern looms large in France, especially within the retail sector, following Donald Trump’s announcement of a staggering 145% customs duty on Chinese goods. As a result, China might look towards flooding the European market, particularly France, with these small packages. When asked about this in an interview with La Tribune Dimanche on April 20, Economy Minister Eric Lombard expressed his determination not to stand idly by.

“We must curb this phenomenon,” he firmly stated. For him, the threats posed by these websites are threefold: social, health, and environmental. He elaborated, “These shipments directly compete with our businesses and merchants. Some products do not meet European standards, and the people manufacturing them work under conditions that are not aligned with our values. It’s also an environmental absurdity.”

[...]

The minister also highlighted some staggering statistics: “The volume of goods is enormous: 400 million items were shipped last year. Nearly 800 million are projected this year. […] Just to the European market, that’s 600 jumbo jets taking off each night from China!”

[Edit typo.]

89
 
 

cross-posted from: https://lemmy.sdf.org/post/33521349

Archived

*Key Findings *

  • In March 2025, senior members of the World Uyghur Congress (WUC) living in exile were targeted with a spearphishing campaign aimed at delivering Windows-based malware capable of conducting remote surveillance against its targets.
  • The malware was delivered through a trojanized version of a legitimate open source word processing and spell check tool developed to support the use of the Uyghur language. The tool was originally built by a developer known and trusted by the targeted community.
  • Although the malware itself was not particularly advanced, the delivery of the malware was extremely well customized to reach the target population and technical artifacts show that activity related to this campaign began in at least May of 2024.
  • The ruse employed by the attackers replicates a typical pattern: threat actors likely aligned with the Chinese government have repeatedly instrumentalized software and websites that aim to support marginalized and repressed cultures to digitally target these same communities.
  • This campaign shows the ongoing threats of digital transnational repression facing the Uyghur diaspora. Digital transnational repression arises when governments use digital technologies to surveil, intimidate, and silence exiled and diaspora communities.

[...]

The Uyghur diaspora, alongside Tibetans and, more recently, exiles from Hong Kong, is one of China’s primary targets for transnational repression. In their homeland, the Xinjiang region in northwestern China (which most Uyghurs prefer to call by its historical name East Turkestan), Uyghurs and other Turkic minorities are forced to live under a high-tech police state, built on a sweeping system of mass surveillance, mobility controls, and internment camps, as well as a comprehensive control over their cultural and religious life. Chinese authorities follow individuals even outside China, targeting Uyghurs living in exile or in the diaspora with tactics ranging from physical attacks and extradition requests to digital threats and surveillance. China’s extensive campaign of transnational repression targets Uyghurs both on the basis of their ethnic identity and activities. Diaspora members who engage in human rights advocacy and raise international awareness on China’s suppression of their culture and community draw particular attention from Chinese authorities.

[...]

90
91
 
 

cross-posted from: https://lemmy.sdf.org/post/32848522

Archived

Though less well-known than groups like Volt Typhoon and Salt Typhoon, Brass Typhoon, or APT 41, is an infamous, longtime espionage actor that foreshadowed recent telecom hacks.

As China continues its digital gambit around the world, researchers are warning that hacking activity from long-tracked groups is evolving and blending together. On top of that, attackers are hiding their campaigns more effectively and blurring the lines between cybercriminals and state-backed hacking.

Last year, revelations rocked the United States federal government that the Chinese hacking group known as “Salt Typhoon” had breached at least nine major US telecoms. And the group’s rampage even continued into this year in the US and other countries around the world. Meanwhile, the Beijing-linked hacking group “Volt Typhoon” has continued to lurk in US critical infrastructure and utilities around the world. Meanwhile, the notoriously versatile syndicate known as Brass Typhoon—also called APT 41 or Barium—has been operating in the shadows.

[...]

Brass Typhoon is known for having carried out a notable string of software supply chain attacks in the late 2010s and for brazen attacks on telecoms around the same time in which the group specifically targeted call record data. The gang is also known for its hybrid activity, carrying out hacks that align with Chinese state-sponsored espionage by the Chinese Ministry of State Security, but also moonlighting on seemingly cybercriminal projects, particularly focused on the video game industry and in-game currency scams.

Research indicates that Brass Typhoon has continued to be active in recent months with financial crimes targeting online gambling platforms as well as espionage targeting manufacturing and energy firms. Its sustained activity has run in parallel to Salt and Volt Typhoon’s recent, attention-grabbing campaigns, and analysis increasingly shows that China’s state-backed hacking operations must be viewed comprehensively, not just in terms of individual actors.

[...]

92
 
 

cross-posted from: https://lemmy.sdf.org/post/32836649

Archived

A Chinese state-owned company that was previously sanctioned by the U.S. for facilitating human rights abuses against Uyghurs is now training police officers in Tibet on hacking techniques and digital forensics, according to a watchdog organization.

SDIC Intelligence Xiamen Information Co Ltd, a digital forensics company better known as Meiya Pico, won a contract in mid-2023 to build two labs at the Tibet Police College: one on offensive and defensive cyber techniques and the other on electronic evidence collection and analysis. Details of the approximately $1.32 million contract were analyzed and released on Wednesday by Turquoise Roof, a research network focused on Tibet.

The contracts include “servers for the cyber range, network switches, intrusion simulation software, forensic workstations and] evidence storage systems,” the researchers said.

Founded in 1999 as an independent company, Meiya Pico is now state-owned, and as of 2019 it reportedly had a 45% market share of China’s digital forensics market. Its products have raised controversy globally for their invasiveness, including a spyware app called MFSocket that police have allegedly installed on phones throughout the country during inspections of smartphones.

[...]

According to the company, it has conducted training courses in 30 countries as part of China’s Belt and Road Initiative.

[...]

93
 
 

cross-posted from: https://lemmy.sdf.org/post/32835964

Archived

[...]

In one [Tiktok] video that has nearly 10 million views, a creator claims to be able to sell yoga pants from the same manufacturer that supplies Lululemon for $5-$6, instead of the $100 they sell for in the United States.

“The material and the craftsmanship are basically the same because they come from the same production line,” she says, standing in front of what appears to be a factory.

In another, a man standing on a factory floor claims to have access to manufacturers that produce Louis Vuitton bags, which he says can be sold directly to customers for $50.

But both companies deny their products are finished in China, and experts told The Independent the videos are likely an effort by counterfeit or “dupe” manufacturers to take advantage of the chaos over the tariffs to boost their sales.

“They're trying to conflate the fake manufacturers in China with the real manufacturers,” said Conrad Quilty-Harper, author of Dark Luxury, a newsletter about the luxury goods industry.

“They're very clever with their social media, and they’re very effective at driving demand in the West,” he added.

[...]

Louis Vuitton has said repeatedly that it does not manufacture products in China.

[...]

TikTok users have reported seeing the videos appear in their feeds in recent days as the trade war between the U.S. and China continues to heat up.

[...]

The counterfeit market in China is the largest in the world. U.S. Customs seized counterfeit items worth some $1.8 billion in recommended retail price in 2023.

Quilty-Harper said the counterfeit industry in China has been a concern for Western companies for years. And the enforcement of trademark and intellectual property rights internally has tended to depend on the geopolitical climate.

“In the past, the Chinese authorities have been stricter on it, and sometimes they've been looser on it, and often that's to do with the relationship with the US and previous presidents,” he said.

“This is part of a huge geopolitical battle between America and China over intellectual property. And it's just fascinating to see this sort of propaganda fight happening on these very high-traffic TikTok videos,” he added.

94
 
 

cross-posted from: https://lemmy.sdf.org/post/32830658

[This is an op-ed by Valentin Weber, senior research fellow with the German Council on Foreign Relations. He is the author of the International Forum for Democratic Studies report “Data-Centric Authoritarianism: How China’s Development of Frontier Technologies Could Globalize Repression.” His research covers the intersection of cybersecurity, artificial intelligence, quantum technologies, and technological spheres of influence.]

[...]

While the financial, economic, technological, and national-security implications of DeepSeek’s achievement have been widely covered, there has been little discussion of its significance for authoritarian governance. DeepSeek has massive potential to enhance China’s already pervasive surveillance state, and it will bring the Chinese Communist Party (CCP) closer than ever to its goal of possessing an automated, autonomous, and scientific tool for repressing its people.

[...]

With the world’s largest public AI-surveillance networks — “smart cities” — Chinese police started to amass vast amounts of data. But some Chinese experts lamented that smart cities were not actually that smart: They could track and find pedestrians and vehicles but could not offer concrete guidance to authorities — such as providing police officers with different options for handling specific situations.

[...]

China’s surveillance-industrial complex took a big leap in the mid-2010s. Now, AI-powered surveillance networks could do more than help the CCP to track the whereabouts of citizens (the chess pawns). It could also suggest to the party which moves to make, which figures to use, and what strategies to take.

[...]

Inside China, such a network of large-scale AGI [Artificial General Intelligence] systems could autonomously improve repression in real time, rooting out the possibility of civic action in urban metropolises. Outside the country, if cities such as Kuala Lumpur, Malaysia — where China first exported Alibaba’s City Brain system in 2018 — were either run by a Chinese-developed city brain that had reached AGI or plugged into a Chinese city-brain network, they would quietly lose their governance autonomy to these highly complex systems that were devised to achieve CCP urban-governance goals.

[...]

As China’s surveillance state begins its third evolution, the technology is beginning to shift from merely providing decision-making support to actually acting on the CCP’s behalf.

[...]

The next step in the evolution of China’s surveillance state will be to integrate generative-AI models like DeepSeek into urban surveillance infrastructures. Lenovo, a Hong Kong corporation with headquarters in Beijing, is already rolling out programs that fuse LLMs with public-surveillance systems. In [the Spanish city of] Barcelona, the company is administering its Visual Insights Network for AI (VINA), which allows law enforcement and city-management personnel to search and summarize large amounts of video footage instantaneously.

[...]

The CCP, with its vast access to the data of China-based companies, could use DeepSeek to enforce laws and intimidate adversaries in myriad ways — for example, deploying AI police agents to cancel a Lunar New Year holiday trip planned by someone required by the state to stay within a geofenced area; or telephoning activists after a protest to warn of the consequences of joining future demonstrations. It could also save police officers’ time. Rather than issuing “invitations to tea” (a euphemism for questioning), AI agents could conduct phone interviews and analyze suspects’ voices and emotional cues for signs of repentance. Police operators would, however, still need to confirm any action taken by AI agents.

[...]

DeepSeek and similar generative-AI tools make surveillance technology smarter and cheaper. This will likely allow the CCP to stay in power longer, and propel the export of Chinese AI surveillance systems across the world — to the detriment of global freedom.

[Edit typo.]

95
 
 

cross-posted from: https://lemmy.sdf.org/post/32709886

Big Tech have mastered the art of delay and deflection. Under the GDPR’s ‘one-stop-shop’ mechanism, cases are often handled by regulators in the country where a company is based, rather than where harm occurs. This means that when someone in France, Poland, or Spain suffers from unlawful data misuse by a company based in Ireland or Luxembourg, their complaint can get stuck in an enforcement black hole.

[...]

Right now, EU policymakers have a chance to fix this. The GDPR Procedural Regulation—currently in negotiations—could finally close these enforcement loopholes. It could ensure faster, more efficient investigations, remove barriers to redress, and empower DPAs to take meaningful action. The regulation is not just about bureaucratic processes; it is about making GDPR enforcement a reality, ensuring that cross-border cases are handled fairly and efficiently, rather than getting lost in the complexity of the one-stop-shop mechanism.

Yet, despite its significance, this file has not received the attention it deserves. Too often, procedural law is dismissed as ‘boring’ or ‘too technical’—just another set of legal rules that seem far removed from everyday life. But this perception is dangerously misguided. In reality, this regulation underpins the very foundation of human rights online. It determines whether people [...] can seek justice when their data is misused, whether harmful algorithmic profiling can be stopped, and whether the EU’s much-celebrated digital rights framework has real teeth. Many of the harms EU institutions claim to be concerned about – from misinformation to AI-driven discrimination – are exacerbated by the enforcement failures this regulation seeks to address.

Data protection is not just about privacy—it’s about power, and about many other fundamental rights. If we allow enforcement failures to persist, we allow gigantic corporations and other bad actors to control, distort, and weaponise our identities and deepen vulnerabilities. The EU must act now to ensure that GDPR enforcement becomes a reality, not just a promise.

[...]

96
 
 

cross-posted from: https://lemmy.sdf.org/post/32431077

Two spyware variants are targeting Uyghur, Taiwanese and Tibetan groups and individuals, the U.K.’s National Cyber Security Centre warned in a joint alert (opens pdf) Wednesday with Western allies.

[...]

Cybersecurity researchers have previously linked the BADBAZAAR and MOONSHINE spyware to the Chinese government. The variants mentioned in Wednesday’s alert trojanize apps that are of interest to the target communities, such as a Uyghur language Quran app, and have appeared in official app stores.

“BADBAZAAR and MOONSHINE collect data which would almost certainly be of value to the Chinese state,” the alert reads. Agencies in Australia, Canada, Germany, New Zealand and the United States, namely the FBI and National Security Agency, collaborated on it.

Groups most at risk include those focused on Taiwanese independence, Tibetan rights, Uyghur Muslims, democracy advocacy and Falun Gong, according to the alert. The espionage tools can access and download information like location data or messages and photos, and can access microphones and cameras on a phone.

BADBAZAAR is mobile malware with both iOS and Android variants, while MOONSHINE is Android-only. MOONSHINE has been shared through Telegram channels and links sent via WhatsApp.

[...]

Beyond official app stores, BADBAZAAR also spreads through social media platforms. It’s been drawing its own attention from cybersecurity researchers since at least 2022 when Lookout identified it.

97
 
 

cross-posted from: https://lemmy.sdf.org/post/32330527

At a time when reducing imports and building national capacity is become ever more important, Ukraine has achieved what seemed impossible: producing drones using entirely locally made components. This gives them an unrivalled ability to develop and mass produce drones to their exact requirements. More surprising is the cost. Rather than adding a premium, by building locally the Ukrainians are actually undercutting Chinese makers.

[...]

98
 
 

Three young children huddle in front of a camera, cross-legged and cupping their hands. “Please support me. We are very poor,” says a boy, staring down the lens.

They appear to be in a mud-brick hut in Afghanistan, living in extreme poverty. But their live stream is reaching viewers in the UK and worldwide – via TikTok Live.

For hours, they beg for virtual “gifts” that can later be exchanged for money. When they get one, they clap politely. On another live stream, a girl jumps up and shouts: “Thank you, we love you!” after receiving a digital rose from a woman in the US, who bought it from TikTok for about 1p. By the time it’s cashed out it could be worth less than a third of a penny.

TikTok says it bans child begging and other forms of begging it considers exploitative, and says it has strict policies on users who go live.

But an Observer investigation has found the practice widespread. Begging live streams are actively promoted by the algorithm and TikTok profits from the content, taking fees and commission of up to 70%.

Olivier de Schutter, the UN special rapporteur on extreme poverty and human rights, called the trend a “shocking development” and accused TikTok and middlemen of “profiting from people’s misery”. “Taking a cut of people’s suffering is nothing short of digital predation. I urge TikTok to take immediate action and enforce its own policies on exploitative begging and seriously question the ‘commission’ it is taking from the world’s most vulnerable people,” he said.

Jeffrey DeMarco, digital harm expert at Save the Children, said: “The documented practices represent significant abuses and immediate action must be taken to ensure platforms no longer allow, or benefit directly or indirectly, from content such as this.”

[...]

99
 
 

cross-posted from: https://lemmy.sdf.org/post/32113472

Archived

As a 7.7 magnitude earthquake struck Myanmar and Thailand last Friday, the temblor rattled buildings across the sprawling Thai capital of Bangkok, home to an incredible 142 skyscrapers. When the shaking ceased all were standing strong — with one very notable exception. The State Audit Office (SAO) building in Chatuchak district, a 30-story skyscraper still under construction by a subsidiary of a Chinese state-owned enterprise, collapsed into a heap of rubble, trapping nearly 100 people inside.

As of this week, 15 have been confirmed dead in the collapse, and a further 72 remain missing. Thailand announced over the weekend that it was launching an investigation to determine the cause of the collapse, and the prime minister said the tragedy had seriously damaged the country’s image.

As emergency teams sifted through the wreckage in the immediate aftermath, the building’s primary contractor, China Railway No. 10 Engineering Group, came under intense public anger and scrutiny. Anger was further fueled by clear efforts by the company, and by Chinese authorities, to sweep the project and the tragedy under the rug.

Shortly after the collapse, the China Railway No. 10 Engineering Group removed a post from its WeChat account that had celebrated the recent capping of the building, praising the project as the company’s first “super high-rise building overseas,” and “a calling card for CR No. 10’s development in Thailand.” Archived versions of this and other posts were shared by Thais on social media, including one academic who re-posted a deleted promo video to his Facebook account — noting with bitter irony that it boasted of the building’s tensile strength and earthquake resistance.

Trying to access news of the building collapse inside China [...] queries on domestic search engines returned only deleted articles from Shanghai-based outlets such as The Paper (澎湃新闻) and Guancha (观察网). In a post to Weibo, former Global Times editor Hu Xijin (胡锡进) confessed that the building “probably had quality issues.” Even this post was rapidly deleted, making clear that the authorities were coming down hard on the story.

Meanwhile, the machinery of propaganda continued to turn out feel-good news on China’s response to the quake. The Global Times reported that emergency assistance for Myanmar embodied Xi Jinping’s foreign policy vision of a “community of shared future for mankind.” In Hong Kong, the Ta Kung Pao (大公報) newspaper, run by the Liaison Office of China’s central government, twisted the knife into the United States as it reported on the earthquake response, noting the absence of USAID, recently dismantled by the Trump administration. Behind the news, the paper declared, “China’s selfless response demonstrates the responsibility of a great power.”

100
 
 

cross-posted from: https://lemmy.sdf.org/post/32102322

Archived

TikTok owner ByteDance is set to be hit by a privacy fine of more than €500 million for illegally shipping European users’ data to China, adding to the growing global backlash over the video-sharing app.

Ireland’s data protection commission, the company’s main regulator in Europe, will issue the penalty against TikTok before the end of the month, according to people familiar with the matter.

The move comes after a lengthy investigation found the Chinese business fell foul of the European Union’s General Data Protection Regulation in sending the information to China to be accessed by engineers, added the people, who spoke under condition of anonymity.

[...]

As part of the decision from Ireland’s data protection commission, the regulator will order TikTok to suspend the unlawful data processing in China within a set time frame. China has long provoked the ire of privacy activists, who claim that the nation’s mass surveillance regime violates fundamental rights.

TikTok has been in the crosshairs of the Irish data protection commission before. In September 2023, it was fined €345 million for alleged lapses in the way it cares for children’s personal data. The watchdog has also sounded the alarm over Big Tech firms shipping the personal data of European citizens outside of the 27-member bloc, slapping a record €1.2 billion fine against Facebook owner Meta Platforms Inc. for failing to protect personal information from the American security services.

The Irish probe into TikTok started in 2021, when the regulator’s then head Helen Dixon claimed that EU user data could be accessed by “maintenance and AI engineers in China.”

[...]

view more: ‹ prev next ›