WeChat, the popular Chinese messaging app, already uses content matching to identify dissident material. India enacted rules this year that could require pre-screening content critical of government policy. Russia recently fined Google, Facebook and Twitter for not removing pro-democracy protest materials.
We spotted other shortcomings. The content-matching process could have false positives, and malicious users could game the system to subject innocent users to scrutiny.
We were so disturbed that we took a step we hadn’t seen before in computer science literature: We warned against our own system design, urging further research on how to mitigate the serious downsides. We’d planned to discuss paths forward at an academic conference this month.
That dialogue never happened. The week before our presentation, Apple announced it would deploy its nearly identical system on iCloud Photos, which exists on more than 1.5 billion devices. Apple’s motivation, like ours, was to protect children. And its system was technically more efficient and capable than ours. But we were baffled to see that Apple had few answers for the hard questions we’d surfaced.
China is Apple’s second-largest market, with probably hundreds of millions of devices. What stops the Chinese government from demanding Apple scan those devices for pro-democracy materials? Absolutely nothing, except Apple’s solemn promise. This is the same Apple that blocked Chinese citizens from apps that allow access to censored material, that acceded to China’s demand to store user data in state-owned data centers and whose chief executive infamously declared, “We follow the law wherever we do business.”
https://www.washingtonpost.com/opinions/2021/08/19/apple-csam-abuse-encryption-security-privacy-dangerous/?fbclid=IwAR325SFSTo3uilTF5xZaKWbtUUoTnzyC3rA1vsW0_gTcywReDn42keqh86I
同時也有1部Youtube影片,追蹤數超過2萬的網紅賓狗單字Bingo Bilingual,也在其Youtube影片中提到,【時間碼】 00:00:06 歡迎新聽眾 00:00:32 confiscate 沒收 #十億美元被沒收 00:01:12 penalize 懲罰 #美國制裁中國 00:01:54 iconic 知名的;代表性的 #特斯拉股價如火箭 00:02:40 app developer 應用程式開放商 #...
china data security law 在 陳良基的創新筆記 Facebook 的最佳貼文
台灣創新的基礎仍待國會多多支持
由這幾天的趨勢,看起來台灣的疫情在指揮中心拼命防堵之下,只要大家維持社交好習慣的配合,應該有機會控制下來。真的是天佑台灣,在如此險峻條件下,我們守起來了!台灣屢屢展現在一堆人士的唱衰中,堅挺屹立,實在要更有信心面對艱困的未來以及不斷地挑戰。
當然,光是信心並不夠,面對未知的將來,還是要有更多準備才行。我們都習慣講見賢思齊,讓我們來看看科技的強權,美國,最近做了什麼?
上個月初(六月八日),在台灣正為疫情及疫苗之亂所困之際,美國國會通過了非常重要的《美國創新與競爭法案》。這個法案也號稱是拜登政府上任最重要政策之一。當時,因為台灣疫情緊繃,似乎沒有多少人特別關注,頂多是講一下說,美國發現半導體很重要,特別訂定專法及經費要加強推動等等。事實上,這是一個非常關鍵且重要的科學基礎紮根計畫,大體而言,這個法案有數個特點:
ㄧ、將大家熟知的美國國家科學委員會(National Science Foundation)改為國家科學及技術委員會(National Science and Technology Foundation),兩位副主委,一管科學,一管技術。法案中甚至特別強調出,技術副主委的重要職責之一是,Increasing federally-funded research and development to achieve national goals related to economic competitiveness, domestic manufacturing, national security, shared prosperity, energy and the environment, health, education and workforce development, and transportation。這與我離職前向蔡總統建議的,將科技部改制為國家科學與技術委員會,走向完全一致。科技不能只是自己專注研發,必須前接人才教育,後接經濟發展能力,這是科技時代的必要趨勢。
二、未來五年內(2022-2026),選定十項科學與技術項目(如附資料),預定至少投入1100億美元以上,交由新的NSTF用於協助高教及研發機構,針對選定項目做基礎及前瞻研究。展現美國面對未來科技的謹慎和視野,唯有回到基礎的科學根本,才能帶領人類向前跳躍,找到更多創新機會。
三、再度強化STEM教育的重要,未來五年提撥至少五十億美元,用於強化人才培育的STEM教育。STEM教育這幾年在教育界也是很響亮的口號, STEM指的分別是,Science(科學)、Technology(技術)、Engineering(工程)、Mathematics(數學),正是為來人才走近高科技的必備基礎訓練。但在台灣,STEM 不只在國教中被弱化,更在未來高教的選材上被邊緣化,據說,未來甚至於,大學端的理工生醫等重要學科的入學考試中,根本被放生!台灣十年、二十年後,高科技的人才來源岌岌可危!
對國家長程的未來那麼重要的法案,在拜登政府和國會成員上任短短不到一年內完成立法程序!當然,這也可以看成是美國全民的鼎力支持,才能讓法案順利通過。
台灣的國會、台灣的政府,我們的國會、我們的政府當然也應該做得到,也應該看得到。這不是一兩年內會有大變化、或大政績的工作,但是不做,台灣在未來的競爭力將逐年慢慢減弱。但是,無論是政府、國會,他們的力量還是來自全民的支持,唯有台灣能有一股力量支持,督促政府、國會去思考這些長程競爭力的必要工作,政府、國會才能從每天焦頭爛額
的政治爭執中跳脫出來。
美國選定的十大重點項目:
The United States Innovation and Competition Act of 2021 (USICA), formerly known as the Endless Frontier Act, passed into law on 8 June 2021. It authorizes $110 Billion for basic and advanced technology research over a five year period. It includes investment in:
1. Artificial intelligence and machine learning
2. High performance computing, semiconductors, and advanced computer hardware
3. Quantum computing and information systems
4. Robotics, automation, and advanced manufacturing
5. Natural or anthropogenic disaster prevention
6. Advanced communications technology
7. Biotechnology, genomics, and synthetic biology
8. Advanced energy technology
9. Cybersecurity, data storage, and data management technologies
10. Materials science, engineering, and exploration relevant to the other focus areas
https://www.inside.com.tw/article/23806-usa-semiconductor-investment-contend-china
china data security law 在 唐家婕 - Jane Tang Facebook 的精選貼文
Breaking‼️
美東時間1月5日傍晚,川普以國家安全為由,用行政命令方式禁止阿里支付寶、微信支付、QQ錢包在內的8款中國應用程式(App)。
行政命令發佈後45天,禁止任何人與實體與這8款中國應用程式(App)進行交易。
按照日程,美國下任政府將在15天後,1月20日上任。
—
美國商務部長在同一時間發聲明表示,已指示商務部按行政命令執行禁令,「支持川普總統保護美國人民隱私與安全,免於受到中國共產黨的威脅。」
—
▫️8款App:
支付寶(Alipay)、掃描全能王(CamScanner)、QQ錢包(QQ Wallet)、茄子快傳(SHAREit)、騰訊QQ(Tencent QQ)、阿里巴巴旗下海外短視頻應用VMate、微信支付(WeChat Pay)和辦公型App WPS Office。
圖三:美國商務部聲明
圖四:美國國安顧問聲明
—
▫️白宮行政命令全文:
The White House
Office of the Press Secretary
FOR IMMEDIATE RELEASE
January 5, 2021
EXECUTIVE ORDER
- - - - - - -
ADDRESSING THE THREAT POSED BY APPLICATIONS AND OTHER SOFTWARE DEVELOPED OR CONTROLLED BY CHINESE COMPANIES
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency with respect to the information and communications technology and services supply chain declared in Executive Order 13873 of May 15, 2019 (Securing the Information and Communications Technology and Services Supply Chain). Specifically, the pace and pervasiveness of the spread in the United States of certain connected mobile and desktop applications and other software developed or controlled by persons in the People's Republic of China, to include Hong Kong and Macau (China), continue to threaten the national security, foreign policy, and economy of the United States. At this time, action must be taken to address the threat posed by these Chinese connected software applications.
By accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information. This data collection threatens to provide the Government of the People's Republic of China (PRC) and the Chinese Communist Party (CCP) with access to Americans' personal and proprietary information -- which would permit China to track the locations of Federal employees and contractors, and build dossiers of personal information.
The continuing activity of the PRC and the CCP to steal or otherwise obtain United States persons' data makes clear that there is an intent to use bulk data collection to advance China's economic and national security agenda. For example, the 2014 cyber intrusions of the Office of Personnel Management of security clearance records of more than 21 million people were orchestrated by Chinese agents. In 2015, a Chinese hacking group breached the United States health insurance company Anthem, affecting more than 78 million Americans. And the Department of Justice indicted members of the Chinese military for the 2017 Equifax cyber intrusion that compromised the personal information of almost half of all Americans.
In light of these risks, many executive departments and agencies (agencies) have prohibited the use of Chinese connected software applications and other dangerous software on Federal Government computers and mobile phones. These prohibitions, however, are not enough given the nature of the threat from Chinese connected software applications. In fact, the Government of India has banned the use of more than 200 Chinese connected software applications throughout the country; in a statement, India's Ministry of Electronics and Information Technology asserted that the applications were "stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India."
The United States has assessed that a number of Chinese connected software applications automatically capture vast swaths of information from millions of users in the United States, including sensitive personally identifiable information and private information, which would allow the PRC and CCP access to Americans' personal and proprietary information.
The United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.
Accordingly, I hereby order:
Section 1. (a) The following actions shall be prohibited beginning 45 days after the date of this order, to the extent permitted under applicable law: any transaction by any person, or with respect to any property, subject to the jurisdiction of the United States, with persons that develop or control the following Chinese connected software applications, or with their subsidiaries, as those transactions and persons are identified by the Secretary of Commerce (Secretary) under subsection (e) of this section: Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office.
(b) The Secretary is directed to continue to evaluate Chinese connected software applications that may pose an unacceptable risk to the national security, foreign policy, or economy of the United States, and to take appropriate action in accordance with Executive Order 13873.
(c) Not later than 45 days after the date of this order, the Secretary, in consultation with the Attorney General and the Director of National Intelligence, shall provide a report to the Assistant to the President for National Security Affairs with recommendations to prevent the sale or transfer of United States user data to, or access of such data by, foreign adversaries, including through the establishment of regulations and policies to identify, control, and license the export of such data.
(d) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted before the date of this order.
(e) Not earlier than 45 days after the date of this order, the Secretary shall identify the transactions and persons that develop or control the Chinese connected software applications subject to subsection (a) of this section.
Sec. 2. (a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate the prohibition set forth in this order is prohibited.
(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.
Sec. 3. For the purposes of this order:
(a) the term "connected software application" means software, a software program, or group of software programs, designed to be used by an end user on an end-point computing device and designed to collect, process, or transmit data via the Internet as an integral part of its functionality.
(b) the term "entity" means a government or instrumentality of such government, partnership, association, trust, joint venture, corporation, group, subgroup, or other organization, including an international organization;
(c) the term "person" means an individual or entity;
(d) the term "personally identifiable information" (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
(e) the term "United States person" means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec. 4. (a) The Secretary, in consultation with the Secretary of the Treasury and the Attorney General, is hereby authorized to take such actions, including adopting rules and regulations, and to employ all powers granted to me by IEEPA, as may be necessary to implement this order. All agencies shall take all appropriate measures within their authority to implement this order.
(b) The heads of agencies shall provide, in their discretion and to the extent permitted by law, such resources, information, and assistance to the Department of Commerce as required to implement this order, including the assignment of staff to the Department of Commerce to perform the duties described in this order.
Sec. 5. Severability. If any provision of this order, or the application of any provision to any person or circumstance, is held to be invalid, the remainder of this order and the application of its other provisions to any other persons or circumstances shall not be affected thereby.
Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
January 5, 2021.
china data security law 在 賓狗單字Bingo Bilingual Youtube 的精選貼文
【時間碼】
00:00:06 歡迎新聽眾
00:00:32 confiscate 沒收 #十億美元被沒收
00:01:12 penalize 懲罰 #美國制裁中國
00:01:54 iconic 知名的;代表性的 #特斯拉股價如火箭
00:02:40 app developer 應用程式開放商 #臉書又洩露個資
00:03:47 address 處理;對付 #拖延症怎麼辦
00:05:13 簡單複習
【confiscate 沒收】
Italy confiscates $1B worth of amphetamines.
義大利
10億
ISIS 伊斯蘭國
https://www.foxnews.com/world/italy-1b-pills-isis-syria-amphetamines
【penalize 懲罰】
A sanctions bill has been passed to penalize China.
美國制裁法案
但到底會不會執行,有待觀察
https://www.politico.com/news/2020/07/01/pelosi-hong-kong-security-law-347060
【iconic 知名的;代表性的】
Tesla is now worth more than some iconic American companies.
汽車公司中,市值最高NO.1
Toyota, Disney and Coke
https://edition.cnn.com/2020/07/01/investing/tesla-market-value/index.html
【app developer 應用程式開發商】
Facebook shared user data with app developers it shouldn't have — again.
90 天沒用,臉書不會再給個資,結果還是給
臉書自己發現,自己自首
説已經修正,會繼續調查
https://www.engadget.com/facebook-shared-data-with-developers-90-days-230306894.html
【address 處理;對付】
Address the real reasons you procrastinate and you’re more likely to start achieving your goals.
小確幸逃避
現在有個非常流行的概念
原子習慣,一小步
自己的例子
https://www.bbc.com/worklife/article/20200121-why-procrastination-is-about-managing-emotions-not-time
![post-title](https://i.ytimg.com/vi/BH5JU8qZ9v8/hqdefault.jpg)