Former Chinese gaming company with China govt ties accused of smuggling banned AI GPUs — Nvidia’s biggest Southeast Asia customer exposes the limits of U.S. AI export controls

Tom’s Hardware Premium Roadmaps (Image credit: Future) When U.S. lawmakers tightened export controls on advanced AI processors, their goal was straightforward enough: slow China’s access to cutting-edge compute hardware by restricting direct sales of the most capable GPUs. Three years later, the policy is colliding with the realities of globalized supply chains, reseller-driven distribution models, […]

7 mins read

40 Years Of Copyright Obstruction To Human Rights And Social Justice

from the forever-and-a-day dept One of the little-known but extremely telling episodes in the history of modern copyright, discussed in Walled Culture the book (free digital versions available), concerns the Marrakesh Treaty. A post on the Corporate Europe Observatory (CEO) site from 2017 has a good summary of what the treaty is about, and why it is important: It […]

7 mins read

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials. The extensions are advertised as a “multi-location network speed test plug-in” for developers and foreign trade personnel. Both the browser add-ons are available for download […]

4 mins read

What 4 Years on the Fast Track Taught Me About My Career: From Dropping Out to Leading a Production Application

Four years ago, I was living with my parents, working as an assistant at an optometry office, with zero clue what I was going to do for the rest of my life. This year, I have designed websites for large medical practices serving 40,000+ patients daily, led an architecture transformation that reduced system failures from […]

14 mins read

Strengthening supply chain security: Preparing for the next malware campaign

The open source ecosystem continues to face organized, adaptive supply chain threats that spread through compromised credentials and malicious package lifecycle scripts. The most recent example is the multi-wave Shai-Hulud campaign. While individual incidents differ in their mechanics and speed, the pattern is consistent: Adversaries learn quickly, target maintainer workflows, and exploit trust boundaries in […]

6 mins read