Breaking‼️
美東時間1月5日傍晚,川普以國家安全為由,用行政命令方式禁止阿里支付寶、微信支付、QQ錢包在內的8款中國應用程式(App)。
行政命令發佈後45天,禁止任何人與實體與這8款中國應用程式(App)進行交易。
按照日程,美國下任政府將在15天後,1月20日上任。
—
美國商務部長在同一時間發聲明表示,已指示商務部按行政命令執行禁令,「支持川普總統保護美國人民隱私與安全,免於受到中國共產黨的威脅。」
—
▫️8款App:
支付寶(Alipay)、掃描全能王(CamScanner)、QQ錢包(QQ Wallet)、茄子快傳(SHAREit)、騰訊QQ(Tencent QQ)、阿里巴巴旗下海外短視頻應用VMate、微信支付(WeChat Pay)和辦公型App WPS Office。
圖三:美國商務部聲明
圖四:美國國安顧問聲明
—
▫️白宮行政命令全文:
The White House
Office of the Press Secretary
FOR IMMEDIATE RELEASE
January 5, 2021
EXECUTIVE ORDER
- - - - - - -
ADDRESSING THE THREAT POSED BY APPLICATIONS AND OTHER SOFTWARE DEVELOPED OR CONTROLLED BY CHINESE COMPANIES
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency with respect to the information and communications technology and services supply chain declared in Executive Order 13873 of May 15, 2019 (Securing the Information and Communications Technology and Services Supply Chain). Specifically, the pace and pervasiveness of the spread in the United States of certain connected mobile and desktop applications and other software developed or controlled by persons in the People's Republic of China, to include Hong Kong and Macau (China), continue to threaten the national security, foreign policy, and economy of the United States. At this time, action must be taken to address the threat posed by these Chinese connected software applications.
By accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information. This data collection threatens to provide the Government of the People's Republic of China (PRC) and the Chinese Communist Party (CCP) with access to Americans' personal and proprietary information -- which would permit China to track the locations of Federal employees and contractors, and build dossiers of personal information.
The continuing activity of the PRC and the CCP to steal or otherwise obtain United States persons' data makes clear that there is an intent to use bulk data collection to advance China's economic and national security agenda. For example, the 2014 cyber intrusions of the Office of Personnel Management of security clearance records of more than 21 million people were orchestrated by Chinese agents. In 2015, a Chinese hacking group breached the United States health insurance company Anthem, affecting more than 78 million Americans. And the Department of Justice indicted members of the Chinese military for the 2017 Equifax cyber intrusion that compromised the personal information of almost half of all Americans.
In light of these risks, many executive departments and agencies (agencies) have prohibited the use of Chinese connected software applications and other dangerous software on Federal Government computers and mobile phones. These prohibitions, however, are not enough given the nature of the threat from Chinese connected software applications. In fact, the Government of India has banned the use of more than 200 Chinese connected software applications throughout the country; in a statement, India's Ministry of Electronics and Information Technology asserted that the applications were "stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India."
The United States has assessed that a number of Chinese connected software applications automatically capture vast swaths of information from millions of users in the United States, including sensitive personally identifiable information and private information, which would allow the PRC and CCP access to Americans' personal and proprietary information.
The United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.
Accordingly, I hereby order:
Section 1. (a) The following actions shall be prohibited beginning 45 days after the date of this order, to the extent permitted under applicable law: any transaction by any person, or with respect to any property, subject to the jurisdiction of the United States, with persons that develop or control the following Chinese connected software applications, or with their subsidiaries, as those transactions and persons are identified by the Secretary of Commerce (Secretary) under subsection (e) of this section: Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office.
(b) The Secretary is directed to continue to evaluate Chinese connected software applications that may pose an unacceptable risk to the national security, foreign policy, or economy of the United States, and to take appropriate action in accordance with Executive Order 13873.
(c) Not later than 45 days after the date of this order, the Secretary, in consultation with the Attorney General and the Director of National Intelligence, shall provide a report to the Assistant to the President for National Security Affairs with recommendations to prevent the sale or transfer of United States user data to, or access of such data by, foreign adversaries, including through the establishment of regulations and policies to identify, control, and license the export of such data.
(d) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted before the date of this order.
(e) Not earlier than 45 days after the date of this order, the Secretary shall identify the transactions and persons that develop or control the Chinese connected software applications subject to subsection (a) of this section.
Sec. 2. (a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate the prohibition set forth in this order is prohibited.
(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.
Sec. 3. For the purposes of this order:
(a) the term "connected software application" means software, a software program, or group of software programs, designed to be used by an end user on an end-point computing device and designed to collect, process, or transmit data via the Internet as an integral part of its functionality.
(b) the term "entity" means a government or instrumentality of such government, partnership, association, trust, joint venture, corporation, group, subgroup, or other organization, including an international organization;
(c) the term "person" means an individual or entity;
(d) the term "personally identifiable information" (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
(e) the term "United States person" means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec. 4. (a) The Secretary, in consultation with the Secretary of the Treasury and the Attorney General, is hereby authorized to take such actions, including adopting rules and regulations, and to employ all powers granted to me by IEEPA, as may be necessary to implement this order. All agencies shall take all appropriate measures within their authority to implement this order.
(b) The heads of agencies shall provide, in their discretion and to the extent permitted by law, such resources, information, and assistance to the Department of Commerce as required to implement this order, including the assignment of staff to the Department of Commerce to perform the duties described in this order.
Sec. 5. Severability. If any provision of this order, or the application of any provision to any person or circumstance, is held to be invalid, the remainder of this order and the application of its other provisions to any other persons or circumstances shall not be affected thereby.
Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
January 5, 2021.
technology transfer group 在 Drama-addict Facebook 的最佳解答
มันนี่เกมแม่งมาได้ทุกรูปแบบ อันนี้เป็นรูปแบบใหม่เพิ่งเคยเห็น
บอกว่าเป็นเกมจับสัตว์เลี้ยงอะไรของแม่งนี่ล่ะ แล้วจับสัตว์เลี้ยงไปขายกันในเกมเพื่อเก็งกำไร มีการการันตีค่าตอบแทนที่ 40% ล่าสุดปิดแอปปิดเว็บหนีไปละ ยังพอเหลือหลักฐานบางส่วนในเน็ท ตอนนี้เขารวมตัวผู้เสียหายไปแจ้ง DSI กันอยู่ ใครที่เสียหายกับไอ้แอปนี้รีบไปเข้าไลน์กลุ่มเพื่อเตรียมติดต่อตำรวจในขั้นต่อไป
ผู้เสียหายจากเกม Lucky Doca ร้อง ศปอส.ตร.
ทางทีมข่าวรายการสถานีประชาชน ไทยพีบีเอส ได้ประสาน ศูนย์ปราบปรามอาชญากรรมเทคโนโลยีสารสนเทศ สำนักงานตำรวจแห่งชาติ( ศปอส.ตร.) เขตปทุมวัน กทม. (ตึกใหญ่ชั้นล่าง)
เพื่อให้ผู้เสียหายเข้าแจ้งความร้องทุกข์ ในวันศุกร์ที่ 6 พ.ย.2563 เวลา 10.30 น. โดยพร้อมเพรียงกัน พร้อมนำหลักฐานดังนี้
1.ใบแจ้งความตัวจริง +สำเนา
2.สำเนาบัตรประชาชน
3.สำเนาเอกสารการโอนเงิน +มูลค่าความเสียหายที่เกิดขึ้น
4.รายละเอียดการเล่นเกม
5.หลักฐานอื่นๆ (ถ้ามี)
สอบถามข้อมูลได้ที่รายการสถานีประชาชน 02-790-2630-3 จันทร์-ศุกร์ เวลา 9.00-18.00 น. หรือ เข้ากลุ่ม ผู้เสียหายได้โดยการ scan QR CODE นี้ได้เลยค่ะ
The sufferer from the game Lucky Doca cries. The police.
The news team of Thai people's station. PBS has coordinated the Crime Suppression Center, Information Technology, Police Office of National Police (Sapos. The police. ) Pathumwan district, Bangkok. (Big building downstairs)
In order for the sufferer to report the complaint on Friday 6th Feb. Nov. 2563 at 10.30 pm With the following evidence:
1. real statement + copy
2. copy of national ID card
3. Copy of the transfer documents + Value of Damage
4. gaming details
5. other evidence (if applicable)
Inquiries at Public Station 02-790-2630-3 Monday-Friday 9.00-18.00 hrs. Or join the sufferer group by scan QR CODE.Translated
technology transfer group 在 Taipei Ethereum Meetup Facebook 的最讚貼文
📜 [專欄新文章] Pioneer A Financial Life on Ethereum with A Non-custodial Banking Replacement by Mel Gelderman…
✍️ 田少谷 Shao
📥 歡迎投稿: https://medium.com/taipei-ethereum-meetup #徵技術分享文 #使用心得 #教學文 #medium
Pioneer A Financial Life on Ethereum with A Non-custodial Banking Replacement by Mel Gelderman 在以太坊上開拓無需銀行託管的新金融生活
On the first day of 2019 Taipei Crosslink, the CEO of Monolith- Mel Gelderman gave a speech on their Monolith Ethereum Wallet + Tokencard and how people are starting to know and embrace Blockchain technology in our daily life, not for gambling or fraud, but for the real positive changes it can bring to the world!
monolith.xyz
Everything dates back to 2015 when Taipei Ethereum Meetup was merely a small group of people… Mel started off the speech with the memory of him stepping into the Ethereum ecosystem!
Story-telling time!
A brief description of Monolith
Monolith is a decentralised banking alternative on Ethereum, with its current business area in Europe. There are two main products: Monolith app is a contract wallet to transfer cryptocurrency to fiat money; Tokencard is a the debit Visa card that anyone can use just like a normal Visa card.
The Status Quo
Monolith has been through the FCA Sandbox in UK. However, AML(Anti-Money Laundering) and KYC(Know Your Customer) are policies Monolith has to comply with.
AML and KYC can be achieved by simply looking into the origin of the cryptocurrency or tokens, as everything on Ethereum is there, open and transparent: if an address is known to be of illegal source, banning it solves the problem.
Currently, there are already more than 1000 users using Monolith Wallet and Tokencard to cover daily expenditure!
TKN Token: Be our own bank!
Though the topic of TKN wasn’t brought up in the speech, TKN plays a crucial role in the ambition of Monolith: to return the interest of depositing money from banks to users. For more information: CLICK!.
If you’re interested in such ambition, also check out: Compound!
Demo Time
Mel demonstrated how to use their Monolith Ethereum Wallet. During the demo, there’s an anecdote really amused everyone:
The transaction time on Ethereum is surprisingly not really longer than the time on Visa lol
Apart from the above evidence that blockchain is rising ;) Here are a few notes about Monolith Wallet worth mentioning:
Monolith Wallet is a contract wallet with a recovery mechanism, which solves the problem of usual wallets that there is no way to get back your assets on blockchain once the private key is known to the attacker.
Whitelisted addresses are specific addresses not bounded by daily spend limit, and cannot be modified afterwards. Combining the two, even if an attacker gets to know the private key, the attacker can only transfer up to the daily spend limit, and the owner can transfer the remaining assets to the whitelisted addresses.
Monolith is also working on another recovery mechanism to deal with the situation of losing your phone. Stay tuned!
Monolith Tokencard also has every mechanism one needs for a normal debit card: freezing and unfreezing the card, reporting lost card, etc.
The workflow of using Monolith:
Decide the amount of cryptocurrency for exchange -> Decide the targetted fiat currency -> Wait for transaction confirmations on both Ethereum and Visa -> Success! This is now the debit card with money to spend :)
To wrap up this section, Monolith is the purest DeFi you can imagine! — Mel
Future Goal
Back in the days, it’s impossible to live solely on a Bitcoin wallet, as the exchange between cryptocurrency and real-world currencies was never easy.
However, with Monolith Wallet right now, the blockchain technology is mature enough for people to rely on the blockchain solution for daily payments, rather than trusting in banks to deal with our money.
It’s not hard to imagine that in the future, with the mass adoption of the blockchain technology, we might be able to receive cryptocurrency as salary and pay many things to anyone in every corner of the world with only a single wallet and a few clicks on your phone!
Questions
1. When or if it’s possible for Monolith to be available in Taiwan?
South Korea may be the first place for Monolith in Asia. Taiwan is on the list for sure, and hopefully, Monolith will be available by the next time when Mel visits Taiwan ;)
2. What is Monolith’s opinions on anonymity and privacy?
AML and KYC are the agreement Monolith made with Visa and FCA. However, Monolith is considering issuing a token to compensate users for going through these policies!
Conclusion
Mel’s is definitely one of the most inspiring speeches: Monolith and Tokencard visualize the dream that blockchain technology can really help make our society a more decentralised place and reduce the risk that we have always been staking on the centralised institutions!
In the end, I’d like to quote a line from Mel to summarize the speech and also his enthusiasm towards blockchain and Ethereum:
We are on the cusp of the most exciting moment in Ethereum since its creation!
Special thanks to Mel Gelderman for the friendly and patient feedback on my questions and recommending me COMPOUND!!! also, to Yahsin Huang for reviewing and her helpful advices and as usual to Chih-Cheng Liang for organizing the TEM column:)
Pioneer A Financial Life on Ethereum with A Non-custodial Banking Replacement by Mel Gelderman… was originally published in Taipei Ethereum Meetup on Medium, where people are continuing the conversation by highlighting and responding to this story.
👏 歡迎轉載分享鼓掌