{"id":8049,"date":"2024-03-07T00:54:46","date_gmt":"2024-03-07T07:54:46","guid":{"rendered":"https:\/\/weno.duckdns.org\/?p=8049"},"modified":"2024-03-07T00:54:50","modified_gmt":"2024-03-07T07:54:50","slug":"%e4%b8%ad%e5%9b%bdai%e5%88%a9%e7%94%a8%e4%b8%ad%e5%9b%bd%e4%ba%ba%e5%81%b7%e7%9a%84%e4%bc%a0%e7%bb%9f%e6%96%87%e5%8c%96%e5%8f%91%e5%a3%b0-china-ai-making-noise-using-the-chinese-peo","status":"publish","type":"post","link":"https:\/\/weno.duckdns.org\/?p=8049","title":{"rendered":"\u4e2d\u56fdAI\u5229\u7528\u4e2d\u56fd\u4eba\u201c\u5077\u201d\u7684\u4f20\u7edf\u6587\u5316\u53d1\u58f0. China AI making noise using the Chinese people&#8217;s traditional culture of &#8220;stealing&#8221; well..\u8c37\u6b4c\u5458\u5de5\u4e01\u6797\u4f1f\u88ab\u63a7\u7a83\u53d6\u4eba\u5de5\u667a\u80fd\u5546\u4e1a\u673a\u5bc6\uff0c\u79d8\u5bc6\u4e0e\u4e2d\u56fd\u5408\u4f5c"},"content":{"rendered":"\n<p>\u4e2d\u56fd\u6295\u8d44\u5f00\u53d1\u65b0\u6280\u672f\u7684\u51b3\u5b9a\u610f\u5473\u7740\u5b83\u5c06\u5f00\u59cb\u4ece\u5916\u56fd\u7a83\u53d6\u6280\u672f\u3002<br>\u5f53\u4e2d\u56fd\u5ba3\u5e03\u4e00\u9879\u65b0\u6280\u672f\u65f6\uff0c\u5c31\u610f\u5473\u7740\u5b83\u521a\u521a\u5b8c\u6210\u5c06\u7a83\u53d6\u7684\u6280\u672f\u7ffb\u8bd1\u6210\u4e2d\u6587\u3002<br>\u4e2d\u56fd\u5c55\u793a\u65b0\u6280\u672f\u610f\u5473\u7740\u5b83\u7ed3\u675f\u4e86\u7a83\u53d6\u6280\u672f\u7684\u7ffb\u8bd1\uff0c\u7ed3\u675f\u4e86\u5171\u4ea7\u515a\u7684\u5ba1\u67e5\u5236\u5ea6\uff0c\u7ed3\u675f\u4e86\u4e2d\u56fd\u975e\u5e38\u7b80\u5355\u7684\u5305\u88c5\u3002<\/p>\n\n\n\n<p>China&#8217;s decision to invest in developing new technologies means that it will start stealing from foreign countries.<br>When China announces a new technology, it means that it has just finished translating the steal foreign  technology into Chinese.<br>China&#8217;s display of new technology means that it has put an end to the translation of steal foreign technology, an end to Communist censorship, and an end to China&#8217;s very unsophisticated packaging.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-42-56-Chinas-Baidu-unveils-new-Ernie-AI-version-to-rival-GPT-4.png?resize=640%2C427&#038;ssl=1\" alt=\"\" class=\"wp-image-8054\" srcset=\"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-42-56-Chinas-Baidu-unveils-new-Ernie-AI-version-to-rival-GPT-4.png?w=771&amp;ssl=1 771w, https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-42-56-Chinas-Baidu-unveils-new-Ernie-AI-version-to-rival-GPT-4.png?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-42-56-Chinas-Baidu-unveils-new-Ernie-AI-version-to-rival-GPT-4.png?resize=768%2C512&amp;ssl=1 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>Ex-Google Engineer Charged With Stealing A.I. Secrets for Chinese Firm \u524d\u8c37\u6b4c\u5de5\u7a0b\u5e08\u88ab\u63a7\u7a83\u53d6\u4eba\u5de5\u667a\u80fd \u4e2d\u56fd\u4f01\u4e1a\u7684\u79d8\u5bc6. \u8c37\u6b4c\u5458\u5de5\u4e01\u6797\u4f1f\u88ab\u63a7\u7a83\u53d6\u4eba\u5de5\u667a\u80fd\u5546\u4e1a\u673a\u5bc6\uff0c\u79d8\u5bc6\u4e0e\u4e2d\u56fd\u5408\u4f5c<\/p>\n\n\n\n<p><a href=\"https:\/\/abc7chicago.com\/google-employee-arrested-artificial-intelligence-linwei-ding-china\/14497765\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/abc7chicago.com\/google-employee-arrested-artificial-intelligence-linwei-ding-china\/14497765\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.nytimes.com\/2024\/03\/06\/us\/politics\/google-engineer-china-ai-theft.html\">https:\/\/www.nytimes.com\/2024\/03\/06\/us\/politics\/google-engineer-china-ai-theft.html<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>\u4e2d\u56fd\u4e60\u8fd1\u5e73\u547c\u5401\u52a0\u5f3a\u56fd\u5bb6\u5bf9\u4eba\u5de5\u667a\u80fd\u7684\u63a7\u5236\u4ee5\u5e94\u5bf9\u201c\u5371\u9669\u98ce\u66b4\u201d China\u2019s Xi Jinping calls for greater state control of AI to counter \u2018dangerous storms\u2019<\/p>\n\n\n\n<p><a href=\"https:\/\/www.theguardian.com\/world\/2023\/jun\/01\/chinas-xi-jinping-calls-for-greater-state-control-of-ai-to-counter-dangerous-storms\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.theguardian.com\/world\/2023\/jun\/01\/chinas-xi-jinping-calls-for-greater-state-control-of-ai-to-counter-dangerous-storms<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"640\" height=\"426\" src=\"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-51-33-Hackers-for-sale-what-weve-learned-from-Chinas-enormous-cyber-leak.png?resize=640%2C426&#038;ssl=1\" alt=\"\" class=\"wp-image-8053\" srcset=\"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-51-33-Hackers-for-sale-what-weve-learned-from-Chinas-enormous-cyber-leak.png?w=676&amp;ssl=1 676w, https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-51-33-Hackers-for-sale-what-weve-learned-from-Chinas-enormous-cyber-leak.png?resize=300%2C200&amp;ssl=1 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>\u51fa\u552e\u9ed1\u5ba2\uff1a\u6211\u4eec\u4ece\u4e2d\u56fd\u5de8\u5927\u7684\u7f51\u7edc\u6cc4\u5bc6\u4e8b\u4ef6\u4e2d\u5b66\u5230\u4e86\u4ec0\u4e48<\/p>\n\n\n\n<p>\u7f51\u7edc\u5b89\u5168\u516c\u53f8 I-Soon \u7684\u6570\u636e\u8ba9\u6211\u4eec\u5f97\u4ee5\u96be\u5f97\u4e00\u7779\u4e2d\u56fd\u9ed1\u5ba2\u8ba1\u5212\u7684\u5185\u90e8\u8fd0\u4f5c\u60c5\u51b5 <\/p>\n\n\n\n<p>what we\u2019ve learned from China\u2019s enormous cyber leak<\/p>\n\n\n\n<p>Data from cyber security firm I-Soon offers a rare glimpse in to the inner workings of China\u2019s hacking program<\/p>\n\n\n\n<p><a href=\"https:\/\/www.theguardian.com\/technology\/2024\/feb\/25\/china-cyber-leak-hacking-program-security\">https:\/\/www.theguardian.com\/technology\/2024\/feb\/25\/china-cyber-leak-hacking-program-security<\/a><\/p>\n\n\n\n<p>Leaked files from Chinese firm show vast international hacking effort \u4e2d\u56fd\u516c\u53f8\u6cc4\u9732\u7684\u6587\u4ef6\u663e\u793a\u56fd\u9645\u9ed1\u5ba2\u6d3b\u52a8\u89c4\u6a21\u5de8\u5927 <\/p>\n\n\n\n<p><a href=\"https:\/\/www.washingtonpost.com\/world\/2024\/02\/21\/china-hacking-leak-documents-isoon\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.washingtonpost.com\/world\/2024\/02\/21\/china-hacking-leak-documents-isoon\/<\/a><\/p>\n\n\n\n<p>Data from cyber security firm I-Soon offers a rare glimpse in to the inner workings of China\u2019s hacking program<br>Who was paying I-Soon?<\/p>\n\n\n\n<p>Judging from the leaks, most of I-Soon\u2019s customers were provincial or local police departments \u2013 as well as province-level state security agencies responsible for protecting the Communist party from perceived threats to its rule. The firm also offered clients help protecting their devices from hacking and securing their communications \u2013 with many of their contracts listed as \u201cnon-secret\u201d.<\/p>\n\n\n\n<p>There were references to official corruption: in one chat, salesmen discussed selling the company\u2019s products to police \u2013 and planned to give kickbacks to those involved in the sale.<\/p>\n\n\n\n<p>There were also references to a client in Xinjiang, where Beijing is accused of grave human rights abuses. But workers complained about the challenges of doing business in the tense region.<\/p>\n\n\n\n<p>\u201cEveryone thinks of Xinjiang like a nice big cake \u2026 but we have suffered too much there,\u201d one wrote. <\/p>\n\n\n\n<p>\u7f51\u7edc\u5b89\u5168\u516c\u53f8 I-Soon \u7684\u6570\u636e\u8ba9\u6211\u4eec\u5f97\u4ee5\u96be\u5f97\u4e00\u7779\u4e2d\u56fd\u9ed1\u5ba2\u8ba1\u5212\u7684\u5185\u90e8\u8fd0\u4f5c\u60c5\u51b5<br>\u8c01\u4ed8\u94b1\u7ed9I-Soon\uff1f<\/p>\n\n\n\n<p>\u4ece\u6cc4\u9732\u7684\u4fe1\u606f\u6765\u770b\uff0cI-Soon \u7684\u5927\u591a\u6570\u5ba2\u6237\u90fd\u662f\u7701\u7ea7\u6216\u5730\u65b9\u8b66\u5bdf\u90e8\u95e8\uff0c\u4ee5\u53ca\u8d1f\u8d23\u4fdd\u62a4\u5171\u4ea7\u515a\u514d\u53d7\u5176\u7edf\u6cbb\u5a01\u80c1\u7684\u7701\u7ea7\u56fd\u5bb6\u5b89\u5168\u673a\u6784\u3002 \u8be5\u516c\u53f8\u8fd8\u4e3a\u5ba2\u6237\u63d0\u4f9b\u5e2e\u52a9\uff0c\u4fdd\u62a4\u4ed6\u4eec\u7684\u8bbe\u5907\u514d\u906d\u9ed1\u5ba2\u653b\u51fb\u5e76\u4fdd\u62a4\u4ed6\u4eec\u7684\u901a\u4fe1\u5b89\u5168\u2014\u2014\u4ed6\u4eec\u7684\u8bb8\u591a\u5408\u540c\u88ab\u5217\u4e3a\u201c\u975e\u79d8\u5bc6\u201d\u3002<\/p>\n\n\n\n<p>\u5176\u4e2d\u63d0\u5230\u4e86\u5b98\u5458\u8150\u8d25\uff1a\u5728\u4e00\u6b21\u804a\u5929\u4e2d\uff0c\u9500\u552e\u4eba\u5458\u8ba8\u8bba\u4e86\u5411\u8b66\u65b9\u51fa\u552e\u8be5\u516c\u53f8\u4ea7\u54c1\u7684\u95ee\u9898\uff0c\u5e76\u8ba1\u5212\u5411\u53c2\u4e0e\u9500\u552e\u7684\u4eba\u5458\u63d0\u4f9b\u56de\u6263\u3002<\/p>\n\n\n\n<p>\u5176\u4e2d\u8fd8\u63d0\u5230\u4e86\u65b0\u7586\u7684\u4e00\u4f4d\u5ba2\u6237\uff0c\u5317\u4eac\u88ab\u6307\u63a7\u5728\u90a3\u91cc\u4e25\u91cd\u4fb5\u72af\u4eba\u6743\u3002 \u4f46\u5de5\u4eba\u4eec\u62b1\u6028\u5728\u5c40\u52bf\u7d27\u5f20\u7684\u5730\u533a\u5f00\u5c55\u4e1a\u52a1\u9762\u4e34\u7684\u6311\u6218\u3002<\/p>\n\n\n\n<p>\u201c\u6bcf\u4e2a\u4eba\u90fd\u8ba4\u4e3a\u65b0\u7586\u5c31\u50cf\u4e00\u5757\u7f8e\u5473\u7684\u5927\u86cb\u7cd5\u2026\u2026\u4f46\u6211\u4eec\u5728\u90a3\u91cc\u906d\u53d7\u4e86\u592a\u591a\u82e6\u96be\uff0c\u201d\u4e00\u4f4d\u7f51\u53cb\u5199\u9053\u3002<\/p>\n\n\n\n<p>\u4e2d\u56fd\u5411\u5b9e\u529b\u4e0d\u8db3\u7684\u521d\u521b\u4f01\u4e1a\u63d0\u4f9b\u4eba\u5de5\u667a\u80fd\u8ba1\u7b97\u201c\u4f18\u60e0\u5238\u201d<br>\u7531\u4e8e\u7f8e\u56fd\u7684\u9650\u5236\uff0c\u4e2d\u56fd\u79d1\u6280\u5de8\u5934\u6b63\u5728\u5360\u7528\u7a00\u7f3a\u7684\u4e91\u8d44\u6e90\u6765\u5f00\u53d1\u751f\u6210\u4eba\u5de5\u667a\u80fd\u6a21\u578b <\/p>\n\n\n\n<p>China offers AI computing \u2018vouchers\u2019 to its underpowered start-ups<br>Chinese tech giants are hogging scarce cloud resources to develop generative AI models as US restrictions bite <\/p>\n\n\n\n<p><a href=\"https:\/\/www.ft.com\/content\/9d67cda3-b157-47a0-98cb-e8e9842b2c90\">https:\/\/www.ft.com\/content\/9d67cda3-b157-47a0-98cb-e8e9842b2c90<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Baidu may be the world&#8217;s most unloved AI stock \u767e\u5ea6\u53ef\u80fd\u662f\u5168\u7403\u6700\u4e0d\u53d7\u6b22\u8fce\u7684\u4eba\u5de5\u667a\u80fd\u80a1\u7968<\/p>\n\n\n\n<p><a href=\"https:\/\/www.reuters.com\/breakingviews\/baidu-may-be-worlds-most-unloved-ai-stock-2024-02-29\/\">https:\/\/www.reuters.com\/breakingviews\/baidu-may-be-worlds-most-unloved-ai-stock-2024-02-29\/<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"640\" height=\"513\" src=\"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-40-22-Global-AI-Governance-Initiative.png?resize=640%2C513&#038;ssl=1\" alt=\"\" class=\"wp-image-8052\" srcset=\"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-40-22-Global-AI-Governance-Initiative.png?resize=1024%2C821&amp;ssl=1 1024w, https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-40-22-Global-AI-Governance-Initiative.png?resize=300%2C241&amp;ssl=1 300w, https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-40-22-Global-AI-Governance-Initiative.png?resize=768%2C616&amp;ssl=1 768w, https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-07-at-15-40-22-Global-AI-Governance-Initiative.png?w=1102&amp;ssl=1 1102w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>\u4e2d\u56fd\u6295\u8d44\u5f00\u53d1\u65b0\u6280\u672f\u7684\u51b3\u5b9a\u610f\u5473\u7740\u5b83\u5c06\u5f00\u59cb\u4ece\u5916\u56fd\u7a83\u53d6\u6280\u672f\u3002\u5f53\u4e2d\u56fd\u5ba3\u5e03\u4e00\u9879\u65b0\u6280\u672f\u65f6\uff0c\u5c31\u610f\u5473\u7740\u5b83\u521a\u521a\u5b8c\u6210\u5c06\u7a83\u53d6\u7684\u6280\u672f\u7ffb\u8bd1\u6210\u4e2d\u6587\u3002\u4e2d\u56fd\u5c55\u793a\u65b0\u6280\u672f\u610f\u5473\u7740\u5b83\u7ed3\u675f\u4e86\u7a83\u53d6\u6280\u672f\u7684\u7ffb\u8bd1\uff0c\u7ed3\u675f\u4e86\u5171\u4ea7\u515a\u7684\u5ba1\u67e5\u5236\u5ea6\uff0c\u7ed3\u675f\u4e86\u4e2d\u56fd\u975e\u5e38\u7b80\u5355\u7684\u5305\u88c5\u3002 China&#8217;s decision to invest in developing new technologies means that it will start stealing from foreign countries.When China announces a new technology, it means that it has just finished translating the steal foreign technology into Chinese.China&#8217;s display of new technology means that it has put an end to the&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7814,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[101,118,116,119,252,117,109,120,527],"tags":[170,702,699],"class_list":["post-8049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-brainwashing","category-ccp","category-censorship","category-cultural-thieves","category-fake-country","category-ip-steels","category-propaganda","category-surveillance","category--where-the-state-has-taken-everything-out-of-the-individual-is-china","tag-brainwashed_chinese","tag-china-failed-to-make-their-own-with-stealed-technology-","tag-china-is-the-biggest-thief-in-the-world-"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/02\/image_fx_china_jobless_bankrupt_economy_problem2-1.jpg?fit=1080%2C1080&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/posts\/8049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8049"}],"version-history":[{"count":0,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/posts\/8049\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/media\/7814"}],"wp:attachment":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}