Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)R
Posts
7
Comments
14
Joined
10 mo. ago

  • As a response to several of the posts in this thread: It is really amazing how many people here on Lemmy are downplaying or even denying China's crimes (even many admins and mods). You can post articles critical of the US, EU, Australian or any other government, but if you post a China-critical text you are whatabouted to death. The tonality of many of these comments alone is very telling.

  • "These biases stem from entrenched gender patterns in the training data as well as from an agreeableness bias induced during the reinforcement learning from human feedback stage."

    No surprise.

  • @[email protected]

    Quick question also to you: Do you fundamentally disagree with what Israel and the US are accused of but fully support China's domestic surveillance, transnational repression, supression of free speech and freedom of the press, bullying of its neighbours, aggression against Taiwan, just because they are perpetrated by “the good guys”?

  • 'China has almost doubled their aggression in cyber’, experts say

    Today, Western governments have been more outspoken in linking China to cyber attacks and sanctioned organizations linked to malicious cyber activity. Despite this growing awareness of the threat posed by China-backed groups, ... people still don’t have a firm grasp on the extent to which China has infiltrated enterprise systems ...

  • This is not about 'bolstering cybersecurity' but rather about attacking other countries. There is nothing even remotely similar to a 'Tianfu Cup' in any other country.

    As I asked already in another thread: Why is it that whenever one posts something critical of China here on Lemmy, there is some commentary arguing that the US is doing the same? I don't understand that.

    That's whataboutery back and forth.

  • Technology @beehaw.org

    China is building a cyber army of hackers, report finds

    www.firstpost.com /tech/china-is-building-a-cyber-army-of-hackers-report-ws-e-13884578.html
  • Technology @beehaw.org

    European Commission Bans All Huawei-Affiliated Lobbying Over Corruption Allegations

    www.flexi-news.com /post/european-commission-bans-all-huawei-affiliated-lobbying-over-corruption-allegations
  • Technology @beehaw.org

    Chinese hackers undertaking global infiltration campaign across 12 countries and 20 industries

    teamt5.org /en/posts/china-nexus-apt-exploits-ivanti-connect-secure-vpn-vulnerability-to-infiltrate-multiple-entities
  • Technology @beehaw.org

    ‘The platform where bot farms are still effective:’ How Russia is leveraging TikTok's algorithm to try to warp public opinion in Ukraine

    meduza.io /en/feature/2025/04/16/the-platform-where-bot-farms-are-still-effective
  • There are also articles about this. Feel free to apply the whataboutery also there. (s/ just to be safe, it would indeed be better to stop whataboutering and stay on topic.)

  • @[email protected]

    @[email protected]

    ... indicating that [China's] BGI units’ “collection and analysis of genetic data poses a significant risk of contributing to monitoring and surveillance by the government of China, which has been utilised in the repression of ethnic minorities in China”. It also claimed “the actions of these entities concerning the collection and analysis of genetic data present a significant risk of diversion to China’s military programs”.

  • Technology @beehaw.org

    Chinese researchers can access medical information from half a million UK GP records through UK Biobank, despite western intelligence agencies’ security fears

    www.theguardian.com /technology/2025/apr/15/revealed-chinese-researchers-access-half-a-million-uk-gp-records
  • One of the more elaborated news on that topic:

    Chinese officials have implicitly acknowledged responsibility for a series of sophisticated cyber intrusions targeting critical U.S. infrastructure.

    During a high-level meeting in Geneva with American officials, representatives from China’s Ministry of Foreign Affairs indirectly linked years of computer network breaches at U.S. ports, water utilities, airports, and other critical targets to increasing U.S. policy support for Taiwan [...]

    Wang Lei, a top cyber official with China’s Ministry of Foreign Affairs, made the comments after U.S. representatives emphasized that China appeared not to understand how dangerous prepositioning in civilian critical infrastructure was, and how such actions could be viewed as an act of war [...]

    The admission is considered extraordinary, as Chinese officials have typically denied involvement in cyber operations, blamed criminal entities, or accused the U.S. of fabricating allegations.

    Dakota Cary, a China expert at cybersecurity firm SentinelOne, noted that such an acknowledgment, even indirectly, likely required instructions from the highest levels of President Xi Jinping’s government.

    Source

    [Edit to insert archived source link.]

  • I don't know where you got this, but do yourself a favor a stay away from whatever it is.

  • Technology @beehaw.org

    Hacking Democracy: Russia’s Digital War on German and European Elections

    vsquare.org /how-russian-disinformation-campaign-influenced-german-elections-afd-cdu-greens-cyberoperations
  • The guys at HF (and many others) appear to have a different understanding of Open Source.

    As the Open Source AI definition says, among others:

    Data Information: Sufficiently detailed information about the data used to train the system so that a skilled person can build a substantially equivalent system. Data Information shall be made available under OSI-approved terms.

    • In particular, this must include: (1) the complete description of all data used for training, including (if used) of unshareable data, disclosing the provenance of the data, its scope and characteristics, how the data was obtained and selected, the labeling procedures, and data processing and filtering methodologies; (2) a listing of all publicly available training data and where to obtain it; and (3) a listing of all training data obtainable from third parties and where to obtain it, including for fee.

    Code: The complete source code used to train and run the system. The Code shall represent the full specification of how the data was processed and filtered, and how the training was done. Code shall be made available under OSI-approved licenses.

    • For example, if used, this must include code used for processing and filtering data, code used for training including arguments and settings used, validation and testing, supporting libraries like tokenizers and hyperparameters search code, inference code, and model architecture.

    Parameters: The model parameters, such as weights or other configuration settings. Parameters shall be made available under OSI-approved terms.

    • The licensing or other terms applied to these elements and to any combination thereof may contain conditions that require any modified version to be released under the same terms as the original.

    These three components -data, code, parameter- shall be released under the same condition.