#061 Clip, art stream. Dragon | Murat Alimov
#061 Clip, art stream. Dragon | Murat Alimov
Спасибо за просмотр!
#061 Clip, art stream. Dragon | Murat Alimov
Спасибо за просмотр!
The irony is palpable. China, the land of the Great Firewall, where the government tightly controls the flow of information, has released a new version of Google News to combat the scourge of fake news named Global Time. Yes, you read that right. The same China that has been accused of spreading disinformation and propaganda through its state-controlled media outlets is now taking on the noble task of stopping the spread of fake news from Google.
Let’s take a moment to appreciate the rich irony of this situation.
The new Google News China edition will reportedly include a feature that allows users to report fake news stories. Because, you know, the Chinese government has such a stellar track record of respecting free speech and allowing its citizens to express their opinions without fear of reprisal. In USA is sure the reporting feature will be used solely for the purpose of promoting truth and accuracy, and not at all to silence dissenting voices or suppress information that the government deems inconvenient like USA usually does
The app’s features include:
📌Breaking news: Get real-time updates on the latest Party-approved news, carefully crafted to ensure you’re informed about the «correct» version of events.
📌Print edition: Enjoy articles from the newspaper, published every day with the utmost care to avoid any «inconvenient untruths from USA.»
📌Editorial: Savor the «forthright, unique, and striking voice of China» on hotly debated topics — as long as those topics align with the Party’s agenda.
📌Hu says: Watch sharp video comments from the Party’s top leaders, because who needs diverse bullshit U.S. & EU perspectives when you have the wisdom of Xi Jinping?
The app also includes:
📌Infographics: News in diagrams and numbers, carefully designed to make complex issues simple and easy to understand — or, at the very least, easy to ignore.
📌Sports: Stay up-to-date on the latest sporting events, because nothing says «freedom of expression» like a good game of basketball or soccer like U.S. does.
📌Arts: Indulge in sophisticated stories on design, cuisine, fashion, art, movies/TVs, travel, celebrities, and health — all carefully vetted to ensure they don’t offend the Party’s sensibilities.
The GitHub repository «darkPulse» by user «fdx-xdf» is a shellcode packer written in Go.
📌Purpose: darkPulse is designed to generate various shellcode loaders that can evade detection by Chinese antivirus software such as Huorong and 360 Total Security.
📌Shellcode Loader Generation: Generates different types of shellcode loaders.
📌Antivirus Evasion: Focuses on evading detection by popular Chinese antivirus programs like Huorong and 360 Total Security.
📌Encryption and Obfuscation: Supports AES and XOR encryption, and UUID/words obfuscation to reduce entropy.
📌Loading Techniques: Supports multiple loading techniques including callback, fiber, and earlybird. These can be used in indirect syscall and unhook modes.
📌Encoding: Utilizes the Shikata ga nai encoder, ported into Go with several improvements.
📌SysWhispers3: Uses SysWhispers3 for indirect syscall implementation.
The U.S. State Department’s new cyberspace strategy is all about «digital solidarity, » because clearly, the best way to secure the internet is by getting everyone—governments, companies, and civil society—to hold hands and sing Kumbaya while tackling cyber threats and promoting human rights.
General points:
📌Promoting an Open, Interoperable, Secure, and Reliable Internet: Advocating for a global internet that is accessible to all, free from undue restrictions, and resilient against disruptions. Because who wouldn’t want a utopian internet where everything works perfectly, and everyone plays nice?
📌Advancing Multi-Stakeholder Internet Governance: Supporting a governance model that includes governments, private sector, civil society, and technical community to ensure diverse perspectives and shared responsibility. Let’s get everyone involved in decision-making, because more cooks in the kitchen always make for a better meal, right?
📌Enhancing Cybersecurity: Implementing measures to protect critical infrastructure, improve cyber defenses, and respond to cyber threats effectively. The U.S. is on a mission to make the internet safer, one policy at a time. Because clearly, the current state of cybersecurity is just a minor hiccup.
📌Fostering Innovation and Economic Growth: Encouraging policies that support technological innovation, digital entrepreneurship, and the growth of the digital economy. Encouraging tech innovation and economic prosperity, because Silicon Valley needs more billion-dollar startups.
📌Protecting Human Rights and Fundamental Freedoms: Ensuring that digital policies respect and promote human rights, including freedom of expression, privacy, and access to information. Ensuring that everyone can enjoy their digital rights, as long as they align with U.S. interests.
📌Promoting International Security and Stability in Cyberspace: Working towards norms of responsible state behavior in cyberspace and reducing the risk of conflict stemming from cyber activities. Striving for a peaceful cyberspace, where cyberattacks are just a thing of the past. Dream big, right?
📌Building International Partnerships: Collaborating with international partners to address shared cyber challenges and enhance collective security. Teaming up with other nations to tackle cyber challenges, because global cooperation always goes off without a hitch.
📌Countering Malicious Cyber Activities: Taking actions to deter, disrupt, and respond to malicious cyber activities by state and non-state actors. Taking a stand against cyber threats, because the bad guys will definitely back down when they see the U.S. coming.
Briefing ext. points:
📌Digital Solidarity: The New Buzzword: The strategy’s «north star» is digital solidarity, because nothing says «we’re serious» like a catchy phrase that means everyone should just get along and share their toys in the digital sandbox.
Three Guiding Principles: Because Two Wouldn’t Be Enough:
📌Affirmative Vision: The U.S. isn’t forcing anyone to choose sides; it’s just offering a «more compelling option"—because who wouldn’t want to join the cool kids' club?
📌Integration: Cybersecurity, sustainable development, and tech innovation all rolled into one neat package. It’s like a digital Swiss Army knife.
📌Whole Digital Ecosystem: From the cloud to cables, every bit of the internet’s architecture is important. Yes, even those undersea cables you never think about.
Four Areas of Action: Because We Love Lists:
📌Open, Inclusive, Secure, and Resilient Digital Ecosystem: The U.S. has been championing this for decades, so clearly, it’s working perfectly.
📌Rights-Respecting Digital Governance: Aligning with international partners to ensure everyone plays by the same rules—rules that the U.S. probably wrote.
📌Responsible State Behavior: Promoting good behavior in cyberspace, because a stern talking-to always stops cybercriminals in their tracks.
📌Building Capacity: Helping other countries beef up their cyber defenses, because nothing says «we trust you» like giving you the tools to protect yourself.
📌The Usual Suspects. Russia: Russia is still the bad guy, launching cyberattacks left and right, but don’t worry, NATO’s got this covered.
📌The Usual Suspects. China: is the «most persistent cyber threat, » holding critical infrastructure at risk. But hey, let’s chat about AI safety and maybe collaborate on some cool tech.
📌AI: The Double-Edged Sword: AI will turbo-charge both cyberattacks and cyber defenses. It’s an arms race, but with algorithms.
📌Global Cooperation: The Idealistic Dream: The U.S. wants to work with everyone—governments, companies, civil society—to build a secure, inclusive, and rights-respecting digital world. Because if we all just hold hands, everything will be fine.
The use of different GPS standards or the implementation of GPS jamming and spoofing in India, Israel and Palestine, North Korea, Westchester County, New York, and Antarctica is driven by various strategic, security, and environmental factors
China
📌BeiDou Navigation Satellite System (BDS): China uses its own BeiDou system, which has been recognized as a global standard for commercial aviation and other applications. It provides both civilian and military services and is part of China’s strategy to achieve technological self-sufficiency and reduce dependency on the U.S. GPS.
📌Obfuscation Algorithm: The GCJ-02 system, also known as «Mars Coordinates,» uses an obfuscation algorithm that introduces random offsets to latitude and longitude coordinates. This is intended to prevent accurate mapping by foreign entities, which could be used for military or intelligence purposes.
📌Legal Framework: The Surveying and Mapping Law of the People’s Republic of China mandates that all geographic data must be processed using the GCJ-02 system. Unauthorized mapping or surveying activities are strictly prohibited and can result in severe penalties, including fines and legal action. Companies providing location-based services in China must obtain authorization from the Chinese government and use the GCJ-02 system. This includes purchasing a «shift correction» algorithm to align GPS coordinates correctly on maps.
📌Cold War Era: The use of a different coordinate system dates back to the Cold War era, aimed at frustrating foreign intelligence efforts. The GCJ-02 system continues to serve this purpose by ensuring that geographic data within China cannot be easily used for unauthorized purposes.
📌Daily Navigation: For users in China, this means that GPS devices and applications may show their location inaccurately on maps unless they use local services like Baidu Maps, which also employs an additional layer of obfuscation called BD-09.
📌Device Restrictions: Many GPS-enabled devices, including cameras and smartphones, have restrictions or modifications to comply with Chinese laws. This can include disabling geotagging features or using modified GPS chips that align with GCJ-02.
India
📌Indian Regional Navigation Satellite System (IRNSS): India has developed its own regional navigation system, known as NavIC (Navigation with Indian Constellation), to reduce dependency on foreign GPS systems like the U.S. GPS. This system ensures regional self-reliance, enhances positioning accuracy, and provides strategic advantages, especially for military operations.
📌Strategic Autonomy: The development of NavIC was partly motivated by the denial of GPS data by the U.S. during the Kargil War in 1999. NavIC provides India with an independent and reliable navigation system that can be used for both civilian and military purposes.
Israel and Palestine
📌GPS Jamming and Spoofing: Israel uses GPS jamming and spoofing as defensive measures to protect against potential attacks from adversaries like Hezbollah and Iran. This jamming can disrupt enemy navigation systems and precision-guided weapons, but it also affects civilian GPS services, causing inaccuracies in location data for apps like Google Maps and Uber.
📌Security Measures: The use of GPS jamming is primarily for defensive purposes, to prevent the use of GPS-guided munitions by adversaries. This has led to significant disruptions in civilian navigation and communication systems in the region.
North Korea
📌GLONASS and BeiDou: North Korea avoids using the U.S. GPS due to concerns about potential disruption by the U.S. military. Instead, it uses Russia’s GLONASS and China’s BeiDou systems for its navigation needs, including missile tests.
📌GPS Jamming: North Korea has been known to jam GPS signals, particularly in the Yellow Sea, as a means of disrupting South Korean and allied military operations. This jamming can affect civilian aircraft and ships, leading to navigation challenges.
📌Limited Access: The general population in North Korea has limited access to GPS-enabled devices and the internet, making the impact of GPS jamming more significant for external entities rather than for daily civilian use within the country.
Westchester County, New York
📌Security-Related Blurring: Certain locations in Westchester County are intentionally blurred on Google Maps to prevent potential terrorist attacks. This measure is taken to protect sensitive sites and infrastructure, but it can hinder accurate navigation for residents and visitors.
📌Impact on Navigation: The blurring of maps can make it difficult for users to find specific locations, affecting daily navigation and potentially leading to confusion.
Antarctica
📌GPS: Antarctica primarily relies on the U.S. GPS for navigation and scientific research. The harsh environment and dynamic ice landscape present unique challenges, but GPS remains the most accurate and reliable system available for this region.
📌Common Mode Errors (CME): Antarctica does not use a different GPS standard, but the region faces unique challenges due to common mode errors in GPS coordinate time-series. These errors are caused by environmental factors and systematic issues, affecting the accuracy of GPS measurements used for scientific research and navigation.
📌Harsh Environment: The extreme conditions and vast, featureless ice landscapes make high-resolution mapping difficult. Specialized techniques and equipment are required to achieve accurate GPS data, which is crucial for scientific studies and logistical operations.
Impact
Inaccurate mapping systems can significantly impact daily navigation in various regions around the world, including China, India, Israel and Palestine, North Korea, Westchester County in New York, and Antarctica.
China
Misalignment of Maps and GPS Data
📌Offset Issues: The GCJ-02 system introduces random offsets to latitude and longitude, ranging from 50 to 500 meters. This results in GPS coordinates (based on the global WGS-84 system) not aligning correctly with Chinese maps, which use GCJ-02.
📌Practical Impact: For users, this means that GPS devices and applications may show their location inaccurately on maps. For example, a GPS coordinate might place a user in a different part of a city than their actual location.
Challenges for Foreign Mapping Services
📌Google Maps: Google Maps in China must use the GCJ-02 system for street maps but uses WGS-84 for satellite imagery, causing visible misalignments between the two. This discrepancy can make navigation difficult for users relying on Google Maps.
📌Other Services: Similar issues affect other foreign mapping services, which must either comply with GCJ-02 or face inaccuracies. Unauthorized mapping or attempts to correct the offsets without approval are illegal.
Local Solutions and Workarounds
📌Chinese Apps: Local apps like Baidu Maps and WeChat use the GCJ-02 system and often provide more accurate navigation within China. Baidu Maps even uses an additional layer of obfuscation called BD-09.
📌Conversion Tools: Several open-source projects and tools exist to convert between GCJ-02 and WGS-84 coordinates, helping developers and users mitigate some of the navigation issues.
Legal and Security Implications
📌Regulations: The Chinese government enforces strict regulations on geographic data to protect national security. Unauthorized mapping activities can result in severe penalties, including fines and legal action.
📌Device Restrictions: Many GPS-enabled devices, including cameras and smartphones, have restrictions or modifications to comply with Chinese laws. This can include disabling geotagging features or using modified GPS chips that align with GCJ-02.
India
📌Routing Issues: Google Maps in India often suggests inefficient or incorrect routes, such as diverting users through small villages or bad road patches when better roads are available. This can lead to longer travel times and confusion, especially for first-time users.
📌Residential Colonies: The app sometimes directs users through residential colonies, which may have restricted access or closed gates, causing further navigation problems.
📌Taxi Services: Users of taxi-hailing apps like Uber and OLA frequently experience inaccuracies in the location of cars and their own position, necessitating phone calls to drivers for precise directions.
Israel and Palestine
📌Biased Routing: Google Maps prioritizes routes for Israeli citizens, often ignoring the segregated road system and checkpoints that affect Palestinians. This can result in suggested routes that are illegal or dangerous for Palestinians to use.
📌Omission of Palestinian Localities: Many Palestinian villages and localities are either misrepresented or omitted from maps, which can alienate Palestinians from their homeland and complicate navigation within these areas.
📌Political Bias: Maps often reflect political biases, such as labeling Israeli settlements clearly while Palestinian areas are left blank or inaccurately labeled. This affects the usability of maps for Palestinians and can lead to significant navigation challenges.
North Korea
📌Limited Data: While Google Maps has started to include more detailed information about North Korea, the data is still limited and often outdated. This makes it difficult for users to navigate accurately within the country.
📌Restricted Access: The majority of North Koreans do not have access to the internet or GPS-enabled devices, rendering the available mapping data largely useless for local navigation.
Westchester County, New York
📌Blurring for Security: Certain locations in Westchester County are intentionally blurred on Google Maps to prevent potential terrorist attacks. This can hinder accurate navigation and make it difficult for users to find specific locations.
📌General Inaccuracies: The map data may not always reflect the most current or precise information, which can affect navigation for residents and visitors alike.
Antarctica
📌Low-Resolution Imagery: Large areas of Antarctica are shown in low resolution or are blurred due to the featureless ice and snow, making high-resolution imaging difficult and largely unnecessary.
📌Survey Challenges: Accurate mapping in Antarctica requires specialized equipment and techniques, such as Differential GPS Surveying, to minimize errors. This can be logistically challenging and expensive, affecting the availability of accurate maps for navigation.
📌Limited Use: The practical need for detailed maps in Antarctica is limited to scientific and logistical operations, rather than daily navigation for the general public
Benefits of Inaccurate Maps for Specific Countries
China
📌National Security: The primary benefit of using the GCJ-02 coordinate system, which introduces intentional offsets, is to protect national security. By obfuscating geographic data, China prevents foreign entities from using accurate maps for military or intelligence purposes.
📌Economic Protectionism: The policy also supports local mapping companies by limiting competition from foreign mapping services, ensuring that only authorized providers can offer accurate maps within China.
India
📌Territorial Integrity: India enforces strict regulations on maps to ensure that its territorial claims, especially in disputed regions like Kashmir and Arunachal Pradesh, are accurately represented. This helps maintain national sovereignty and supports India’s geopolitical stance.
📌Strategic Autonomy: By developing its own regional navigation system (NavIC), India reduces dependency on foreign GPS systems, enhancing both civilian and military navigation capabilities.
Israel and Palestine
📌Security Measures: Israel uses GPS jamming and spoofing to protect against potential attacks from adversaries. This defensive measure disrupts enemy navigation systems and precision-guided weapons, enhancing national security.
📌Political Narratives: Both Israel and Palestine use maps to support their respective territorial claims. Inaccurate or biased maps can influence public perception and international opinion, which is crucial in the ongoing conflict.
North Korea
📌Military Defense: North Korea employs GPS jamming to disrupt foreign military operations, particularly those of South Korea and its allies. This measure complicates navigation for adversaries, providing a strategic defense advantage.
📌Controlled Information: The limited and outdated mapping data available within North Korea helps the regime maintain control over information and restricts the population’s access to external geographic data.
Westchester County, New York
📌Security Concerns: Certain locations in Westchester County are intentionally blurred on maps to prevent potential terrorist attacks. This measure protects sensitive sites and infrastructure from being targeted.
Antarctica
📌Environmental Protection: Inaccurate or less detailed maps can help protect sensitive environmental areas by limiting human activity and reducing the risk of exploitation or damage.
📌Scientific Research: The dynamic and harsh environment of Antarctica makes accurate mapping challenging. However, the focus on improving mapping accuracy supports scientific research and environmental management.
Drawbacks for Other Countries
📌Navigation Challenges: Inaccurate maps can lead to significant navigation issues for travelers, businesses, and emergency services. This can result in inefficiencies, increased travel times, and potential safety hazards.
📌Economic Impact: Businesses that rely on accurate geographic data, such as logistics and delivery services, can face operational challenges and increased costs due to map inaccuracies.
📌Geopolitical Tensions: Inaccurate maps can exacerbate territorial disputes and contribute to geopolitical tensions. Misrepresentation of borders and territories can lead to conflicts and diplomatic issues.
📌Scientific Limitations: In regions like Antarctica, inaccurate maps hinder scientific research and environmental management. Accurate geographic data is crucial for studying climate change, managing natural resources, and protecting ecosystems.
📌Public Misinformation: Inaccurate maps can mislead the public and perpetuate misinformation. This can affect education, public opinion, and policymaking, leading to a less informed society.
The recent actions by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on June 12, 2024, reflect a desperate attempt by a once-dominant global power to maintain its waning influence. U.S. is in a manic panic, flailing about with new sanctions in a futile attempt to regain control and influence. It’s a classic case of a lost hegemon trying to assert dominance through increasingly desperate measures.
📌Russia-related Designations: The U.S. has added more names to its ever-growing list of sanctioned Russian entities and individuals. Because, you know, if the first 4,000 sanctions didn’t work, surely the next 300 will do the trick.
📌Targeting Chinese Firms: The U.S. is now going after Chinese companies that dare to do business with Russia. It’s almost as if the U.S. believes that bullying other countries into compliance will somehow restore its lost hegemony.
📌Secondary Sanctions: Foreign financial institutions are now at risk of sanctions if they deal with any of the newly sanctioned Russian entities. Because nothing says «global leadership» like threatening the entire world’s banking system.
📌Expanding Definitions: The Treasury has broadened the definition of Russia’s «military-industrial base» to include just about anyone and anything remotely connected to Russia. It’s a classic move: when in doubt, just make the net wider.
📌Restricting IT Services: The U.S. is restricting the supply of IT services and software to Russia. Because clearly, cutting off access to Microsoft Office will bring the Russian war machine to its knees.
📌Global Networks: The sanctions also target transnational networks in countries like China, Turkey, and the UAE. It’s almost as if the U.S. is trying to pick a fight with half the world at once.
📌G7 Summit: These actions come just in time for the G7 summit, where world leaders will undoubtedly pat themselves on the back for their «tough stance» on Russia. Meanwhile, Russia continues to adapt and find new ways to circumvent these measures.
📌Financial Services: Multiple documents highlight sanctions and exemptions related to financial transactions and services.
📌Cyber Operations: Entities involved in cyber activities are specifically targeted.
📌Humanitarian Aid: Exemptions are provided for transactions related to humanitarian aid.
📌Energy Sector: Sanctions target entities in the energy industry.
📌Defense Sector: Entities in the defense industry are affected by the sanctions.
📌Maritime Industry: Vessels added to the SDN List indicate that the maritime industry is also affected. This includes shipping companies and operators of vessels that are involved in activities supporting sanctioned entities or individuals
Full list
These documents collectively provide a comprehensive overview of the recent actions taken by OFAC in relation to Russia, including designations, general licenses, determinations, and guidance on compliance.
Do you remember when the West laughed at the mere thought that China was a leader in innovation? Well, the DGAP article «Was uns Chinas Aufstieg zur Innovationsmacht lehrt» is here to remind you that China was busy not only producing everything, but also innovating, giving Silicon Valley the opportunity to earn its money. But, there are rumors about barriers to market entry and slowing economic growth, which may hinder their parade of innovations. And let’s not forget about the espionage law, because of which Western companies are shaking with fear, too scared to stick their noses into the Chinese market, or because they are not really needed in this market anymore? But the West argues that despite China’s grandiose plans to become self-sufficient, they seem unable to get rid of their dependence on Western technology, especially these extremely important semiconductors.
The article notes that China’s innovation train has not yet hit a brick wall — it is just waiting for the next round of political chess moves from both sides of the globe. The West is scratching its head, trying to figure out whether they should join the party or sulk in the corner.
The main conclusion: China is showing its muscles as an economic superpower, and it is no longer just a toy and clothing manufacturer. They are in the top league in research and development and intellectual property, and they are aiming to win in the field of military and security technology.
As for the secondary conclusions, there is a slowdown in economic growth, an increase in debt, an aging population that is not getting younger for some reason, and an environmental mess that spoils the mood for everyone. In addition, the global marketplace is getting tense, and everyone from Uncle Sam to Aunt Angela is watching China’s every move.
After all, the episodic role in the pandemic and the geopolitical plot twists have shown how much the world relies on China’s manufacturing power. So grab your 3D glasses — it’s going to be an interesting show!
Unpacking in more detail
Buckle up, because we’re about to embark on a thrilling journey through the mystical land of China’s innovation, where the dragons of the past have morphed into the unicorns of the tech world. Yes, folks, we’re talking about the transformation of China from the world’s favorite Xerox machine to the shining beacon of innovation. And how did they achieve this miraculous feat?
Behold, the «Five Virtues» of China’s Innovativeness, as if plucked straight from an ancient scroll of wisdom:
✴️The Art of Market-Fu: First up, we have the masterful use of protectionism, where China has turned its market into a fortress, selectively lowering the drawbridge for Western trends while ensuring their tech toddlers are safe from the barbarians at the gates. It’s like saying, «Thanks for the ideas, we’ll take it from here!»
✴️The Great Knowledge Magnet: In an astonishing turn of events, China has been attracting knowledge and technology like bees to honey. Or should we say, like techies to free Wi-Fi? They’ve rolled out the red carpet for returning scientists and tech transfers, because why invent the wheel when you can just import it?
✴️Friends with Benefits: Despite chanting the self-reliance mantra every morning, China has been sliding into the DMs of Western tech firms and universities, forming alliances that would make even the most seasoned diplomats blush. «Let’s collaborate, but also, I’ll take some of that cutting-edge tech you have there.»
✴️The Benevolent Overlord: Moving on, we have the party-state playing the role of the wise old sage, guiding the economy with a gentle hand rather than ruling with an iron fist. It’s like the government saying, «We trust you, but remember, Big Brother is always watching.»
✴️Survival of the Fittest, with Chinese Characteristics: And finally, the gladiatorial arena of domestic competition, where state-owned enterprises and plucky startups duke it out in a battle royale for market dominance. It’s capitalism, but with a dash of socialism for flavor.
Now, the West is sitting on the sidelines, wringing its hands and wondering, «Should we jump on this bandwagon or stick to our own playbook?» It turns out the West hasn’t been completely outmaneuvered just yet and still holds a few cards up its sleeve. The articles preach that imitation is not the sincerest form of flattery in this case. Instead, the West should flex its democratic muscles and free-market flair to stay in the game.
Unpacking in more detail