"Sped up" is an important distinction. While the Trade War, Huawei/TikTok, and the Xinjiang-associated blacklist obviously plays into this, why is it assumed that U.S. access was guaranteed? If China is just an NPC that retaliates against U.S. choices, what is the Great Firewall?
From last December: "Beijing has ordered all government offices and public institutions to remove foreign computer equipment and software within three years" ft.com/content/b55fc6…
Shen Changxiang, father of the domestic Golden Shield Project has warned against U.S. technology for more than a decade. While Cisco built the Great Firewall, American tech dominance in China has been shrinking ever since. nytimes.com/2015/04/20/bus…
"Mr. Shen has been thinking about pushing American tech companies out of China for a while. In 2009, he warned of global communications surveillance by the United States in an essay"
"In a May 2014 interview with state-run media, Mr. Shen said tech products coming from the United States presented 'huge security risks,' and in a July essay he wrote that America’s technological dominance makes it a serious threat to Chinese national security."
Shen last month: "Cyber warfare is now floating on the surface of the water. The US wants to create 'cyberattack as deadly as a nuclear bomb' and attempt to achieve 'cyber nuclear blackmail.'" globaltimes.cn/content/119685…
We may think this momentum is one sided, but both of these superpowers have been radicalized by the power — and threat — of cyber dominance for decades now. The Snowden revelations ensured that the U.S. would never again be the only player in the game. This began long ago.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
The plates for that Citizen 'Private Patrol' do match this vehicle from losangelesprofessionalsecurity.com, which describes itself as a "Subscription Law Enforcement Service." It apparently does everything from Apple Watch fall detection monitoring for the elderly, to alarm response.
After seeing the Instagram for 'LAPS,' which features this kitted out Model Y, I have so many more questions. instagram.com/p/CPBp2YKndZe/
"25 percent of kids 9-17 reported having had a sexually explicit interaction with someone they thought was 18 or older" platformer.news/p/the-child-sa…
"57 percent of youth who identify as LGBTQ+ said they have had potentially harmful experiences online, compared to 46 percent of non-LGBTQ+ youth. They also had online sexual interactions at much higher rates than their peers" @platformer
"The platforms with the highest number of minors reported potential harm were Snapchat (26 percent), Instagram (26 percent), YouTube (19 percent), TikTok (18 percent), and Messenger (18 percent)."
Triller has lost its mind: “Triller will pursue the full $150,000 penalty per person per instance for anyone who doesn't do the right thing and pay before the deadline” reut.rs/3b2bvCy
“Triller filed legal action on April 23 in U.S. District Court of Central California against the owners of the H3Podcast website for piracy of the event, and a dozen other sites that restreamed and profited from as many as hundreds of thousands of users each”
Triller has secured itself as a dead meme of an app. The ‘rebroadcast’ angle is a clear cut example of acceptable fair use. They’re targeting the YouTube couple that literally represents the landmark fair use ruling of Hosseinzadeh v. Klein
I slept through the opench.aix.uy drama, but the synopsis of this — and someone can correct me if I miss anything — is that ai-eks used their Clubhouse user token and had a bot join every room, collect the Agora tokens, and plug them into a browser client.
This technical breakdown shows how Clubhouse works. It's a scrappy startup, & there are 3 legs. Clubhouse has their own API for user management. It relies on Agora for RTC audio streams. And less spoken is that the room interactions flow over PubNub events theori.io/research/korea…
Unless I missed something, Clubhouse conversations weren't being recorded by the opench.aix.uy experiments. But, the metadata was indeed being scraped & relayed over the flask service. That's of course a cause for concern for the intimate, ephemeral network.
iOS release notes are always comforting when you have firsts like this. 3 zero-days actively exploited in the wild. 2 involving WebKit. "Apple said additional details would be available soon" techcrunch.com/2021/01/26/app…
The bricked state I encountered didn't end up having to do with the battery, at least obviously so. After a day of wrestling with DFU mode, it was successfully restored. If it attempted to boot, it would endlessly loop; breaking that cycle was hard.
The morning following the mobile Chrome stuttering, the device was very warm — like you would expect from an iCloud Photos daemon. Springboard worked, albeit dropping frames, but third party apps (I didn't test first party) began failing to boot. Upon shutdown, it was bricked.