English video: If your daughter tells you she is giving up US$1 million+ salary, millions of bonus and stock options and giving up becoming the exclusive club, the 1% elites in America and go back to help her motherland China, will you support her? Some of my Chinese friends and RHS HK classmates said money is everything. Patriotism meant shit to them! Do you agreed? 如果你的女兒告訴你她要放棄100萬美元以上的工資、數百萬獎金和股票期權,放棄成為美國1%的精英,返回幫助中國發展高科技, 你會支持她嗎? 我的一些中國朋友和香港同學說金錢就是一切。 愛國主義對他們來說就是狗屎! 你同意嗎?
Mao Wei is a native of Qidong, Jiangsu, China. She is the most talented woman in the world and the goddess of Chinese chips. She won the World Physics Olympiad at the age of seventeen. She gave up her high salary and abandoned the United States to return to China. After China’s Huawei mobile phone chips were sanctioned by the United States, she broke the technology blockade of American companies and successfully developed Chinese Chips have promoted the development of China’s 5G. China’s 5G has amazed the world and created new glories for Huawei. 毛蔚 中國江蘇啓東人,世界第一才女,中國芯片女神,十七歲獲得世界物理奧賽冠軍,放棄高薪棄美回國,中國華爲手機芯片受到美國製裁後,她打破美國公司技術封鎖,成功研製中國芯,推動了中國5G發展,中國5G驚豔了全世界,爲華爲再創輝煌.
This is the original video from tech teller. You can see comments here.
This article fleshes out more details of her life. What an amazing woman!
Huawei just distributed out $9.65Bn in dividends to its 131K employees, which means that on average folks got $73K. I don’t have the median but many folks who joined close to two decades ago are apparently seeing payouts north of a quarter mil. Pretty good for an embattled co. https://nitter.net/BarrettYouTube/status/1511175253346566146#m
When faced with Natural Disasters governments are usually faced with tough decisions: choosing the lesser of two evils.
In the case of the northeastern China floods, opening the dam was the lesser of those two evils.
It happens all over the world – it is a necessary ACTION, in most cases, to protect the dam as they’re built to withstand only a certain amount of pressure.
Now, that ACTION combined with countless other EMERGENCY RESCUE ACTIONS is what kept the death toll rather low when you consider how many people were in danger.
Western media chose to pick THAT ACTION to report extensively… I wonder why?
What we have seen in Lahaina, Hawaii- – – was exactly the opposite. INACTION from leadership. From Biden staying at the beach and choosing to go to California before visiting Hawaii NEXT MONDAY… to the sirens not working! To the power company keeping cables live during the storm. To the MILITARY not helping. The COAST GUARD not picking up those who jumped in the water. The FIRE DPT not hosing from the waterfront …
You don’t need to be a conspiracy theorist to know something isn’t right with the response to the Maui, Hawaii fires.
Identity of NSA hacker behind cyberattack on China’s leading aviation university identified; to be disclosed in due course: source 對中國領先航空大學進行網絡攻擊的美國國家安全局黑客身份已確定; 將在適當時候披露
During the investigation of the cyberattack against Northwestern Polytechnical University (NPU), a leading Chinese aviation university, China has successfully extracted multiple samples of the spyware named SecondDate, and with the collaborative efforts of partners in various countries, the real identity of the US’ National Security Agency (NSA) personnel responsible for launching the cyberattack on NPU has been successfully identified, Global Times learnt from National Computer Virus Emergency Response Center (CVERC) and Chinese internet security company 360 on Thursday.
In June 2022, NPU issued a public statement stating that it had been subjected to a cyberattack, with a hacker organization from overseas attempting to steal relevant data.
Afterwards, China successfully detected the mastermind behind this cyberattack was the Office of Tailored Access Operations (TAO, Code S32) under the Data Reconnaissance Bureau (Code S3) of the Information Department (Code S) of NSA.
According to internal documents exposed by the group “Shadow Brokers,” SecondDate is a cyber weapon developed by the NSA. It is primarily deployed on target network boundary devices such as gateways, firewalls, and edge routers. It covertly monitors cyber traffic and, as needed, selectively redirects, intercepts, and manipulates specific network sessions.
The latest information shows that the CVERC and the company 360, during the investigation of this cyberattack case, have successfully extracted multiple samples of the spyware and identified the true identity of the NSA personnel behind this cyber “spying” case.
The subsequent technical analysis revealed that the involved spyware is a highly advanced cyber espionage tool. The developers must have a very deep understanding of cyber technology, especially network firewall technology. It is equivalent to installing a set of content filtering firewalls and proxy servers on the target network devices, allowing the attacker to completely take control of the target network devices and the network traffic passing through them. This enables the attacker to carry out long-term theft on other hosts and users in the target network, and serve as a “forward base” for delivering more cyberattack weapon toward target network at any time.
The spyware concerned is usually used in conjunction with various firewall and router vulnerability exploitation tools of TAO. After successful vulnerability exploitation and obtaining the corresponding permissions, it is implanted into the target device. The control of spyware is divided into server-side and control-side. The server-side is deployed on the target network boundary devices such as gateways, firewalls, or edge routers, and it monitors and filters all traffic in real-time through underlying drivers. The control-side triggers the activation mechanism by sending specially crafted packets, and the server-side parses the reconnect IP address from the activation packet and initiates a connection, then choose any target within the network to carry out a man-in-the-middle attack according to actual needs.
The network connection uses the UDP protocol, and the communication is encrypted throughout. The communication port is random. The control-side can remotely configure the working mode of the server-side and the target of hijacking.
According to relevant sources, Chinese side and its industry partners have conducted technical investigations worldwide. Through tracing, they have discovered hidden spyware and its derivative versions in thousands of network devices spread across multiple countries and regions. They have also found jump servers remotely controlled by the NSA in countries and regions including Germany, Japan, South Korea, India, and China’s Taiwan region.
“With the strong collaboration of partners in multiple countries, we have made significant breakthroughs and have successfully identified the true identity of the NSA personnel responsible for launching cyberattacks against NPU.”
The successful extraction and tracing of the spyware sample further demonstrates China’s determination to prevent and defend against US government-backed cyberattacks and safeguard global cyber security. This practice of revealing the details of cyber crimes launched by the US government to the world also proves that China has a “visible” foundation in cyber technology, which can effectively assist our country and other nations in perceiving risks, identifying threats, and resisting attacks, thereby exposing state-sponsored hacker attacks to the public.
Relevant sources have told the Global Times that the real identities of individuals involved in NSA’s cyberattacks will be disclosed through the media in due course. It is believed that this will once again draw global attention to the US government’s indiscriminate cyberattacks on other countries.
Video: How the U.S. is preparing for conflict in Asia: Hynes 海因斯:美國如何為亞洲衝突做準備
The U.S, is building power by creating a dense network of military alliances among Asian countries, says Phill Hynes, a top geopolitical analyst based in Hong Kong. Meanwhile, here’s the answer to the puzzle of why the media tells Australians that an invasion is imminent, but their submarines won’t be ready until the 2040s. 香港頂級地緣政治分析師菲爾·海因斯表示,美國正在通過在亞洲國家之間建立密集的軍事聯盟網絡來增強實力。 與此同時,為什麼媒體告訴澳大利亞人入侵迫在眉睫,但他們的潛艇要到 2040 年代才能準備好,這就是謎題的答案.