Long time no see everyone. There have been so many major press conferences recently, so we had to release them early for several days in a row... Huawei Mate50 front PK iPhone 14, how will you choose?

Long time no see everyone. There have been too many major press conferences recently, so we had to release them early for several consecutive days...

Huawei Mate50 Front PK iPhone 14, how will you choose?

From the overall product strength, the iPhone 14 series is still slightly better. The processors of several generations of Android, the complete ecosystem, and the heavy-duty satellite communication can all be supported. There is really nothing to be picky about.

From the book, this is true, but some friends left messages in the background saying that if you still buy an iPhone now, aren’t you afraid of being monitored by the United States? I dare not...

At this time, the old fox was stunned. When did such a heavy negative information be exposed?

After a long time, I realized that it was actually reported by CCTV a few days ago that Northwestern Polytechnical University was attacked by the United States NSA network.

At the same time, it also exposed The National Security Agency has long conducted indiscriminate voice monitoring on Chinese mobile phone users, illegally stealing text messages and wirelessly positioning them.

The United States monitors domestic users' mobile phones, so many users will naturally think of iPhones. No wonder they are worried that the new iPhone is unsafe, so what is the truth?

According to CCTV reports, the US National Security Agency (NSA) used 41 types of cyber attack weapons to steal important data from Northwestern Polytechnical University.

and before carrying out related network attack activities, NSA had installed "insider" and obtained network equipment management permissions for many large and well-known Internet companies in the United States.

These devices control a large amount of communication data in China, allowing the United States to continue to invade important information networks in China.

Good guy, many large well-known Internet companies in the United States, right? This is what the truth means!

The Internet companies here are basically all that come to mind, but in terms of which brands are monitored, first of all, Android is excluded. Google has a domestic service of 404, so Android users are safe this time.

As for the Apple phones that everyone is concerned about, the service is enabled in China, but the server is actually in China, because from February 28, 2018, the domestic iCloud server has been transferred to Guizhou on the Cloud.

Everyone knows Guizhou on the cloud. It is a wholly state-owned enterprise, so our country also has a backer, and it is not easy for others to steal data.

mobile phones can be a little bit more fun. There is definitely no leakage at the manufacturer level. The servers are all in China, so the US will definitely not get them.

What CCTV calls indiscriminate monitoring is a national-level attack and can only be intercepted with more advanced technology.

. This attack was jointly investigated and announced by the National Computer Virus Emergency Response Center and 60 company .

is right, it is the 60 installed on many friends' computers. Although there are many complaints, 360 is still very leading in terms of security.

According to 360 CEO Zhou Hongyi 's Weibo, he said that the biggest threat to us by national attacks is that we couldn't see these attacks in the past . A major country has formed the advantage of for us for a long time "one-way transparency" , so Many of our units have been attacked and still don't know.

You must be at the same level as others to have the power to fight back, otherwise, you can only be someone else's toys and let the meat of mermaids.

Now, 360 has broken through the "see" problem of "seeing", and discovered and dealt with the multiple lurking infiltrations of foreign cyber troops.

So, for information leakage at the mobile phone level, we can relax our snacks because the national security level has been upgraded to the level of being able to see and intercept, and indiscriminate monitoring behavior will be curbed.

In Lao Hu's opinion, the security issue worth paying attention to in the future should be considered one.

Early, everyone should still remember the review results of Didi . As the first online ride-hailing platform in China, it will definitely not have a good ending if it does not protect user data and sensitive domestic information.

And the second half of online car-hailing is undoubtedly autonomous driving. Autonomous driving is more intelligent. All data is processed through the network server. Once it is invaded, all data will be exposed. What's more serious is that the control of the car will also be controlled. Deprived of them.

Just like the hacker-in-chief platform in Russia, Yandex Taxi, which happened this week, the malicious hacker booked dozens of taxis in one go on the online car-hailing application Yandex Taxi, which directly led to traffic jams in Moscow.

Although this invasion was resolved within less than an hour, the harm of more autonomous vehicles on the road in the future can be imagined.

Many netizens said that in the future, will these uncontrolled smart cars become the enemy's weapons and attack us in turn?

If it were a movie, there would be many such scenes, but this extreme situation is too difficult to happen in reality. After all, when it comes to bayonets, it doesn’t matter whether the car is car or not.

At this stage, we should pay more attention to the fact that the United States has formed a comprehensive blockade of China, so how should we break through in this situation?

is familiar with the operation on the surface. From the initial trade blockade at the national level, the United States has now transformed into precise point-to-point sanctions.

From Huawei to the recent chip bill, the United States is clearly going to block China's high-end technology development. Have we taken good measures?

Secretly, just like this Northwestern Polytechnical University attack, the United States has been attacking for more than 10 years. Even if it is exposed this time, it will definitely appear as a more secretive and confusing identity next time. We can discover and Intercepted?

might have been an unsolvable problem before, but now, China is no longer the same as before.

secret attacks, 360's entire network digital security brain can see, discover and deal with the latent infiltration of foreign cyber troops. In the future, it can also be provided to ecological manufacturers through platforms and SDKs, so that they can quickly build and enhance their own security analysis capabilities system, thereby combating future attack risks.

As for the open blow, there are more hands. In terms of restricting the most deadly advanced process technology , the United States prohibits the export of advanced 14nm and below advanced process equipment to China.

also restricts the export of chip design EDA software, so that the "ceiling" of domestic chip design will be locked within 3nm.

seems to be a very serious situation, but at present, the domestic 14nm lithography machine has seen hope of breakthrough.

According to Longson chief designer Hu Weiwu , 90% of technology products can be solved using 14nm or 28nm chip solutions.

Even if the power consumption and performance are poor, as long as the domestic substitution can be completed, we will have more time to research and make breakthroughs to solve the "bottleneck" situation.

and the high-end GPU chip that has just been restricted recently. There are also companies like Biren Technology in China to provide alternative products. In fact, domestic independent technology is working harder than we imagined.

Although the domestic technology industry has been suppressed very badly, the crisis is also an opportunity. As long as we can hold on and complete domestic substitution, then our good days are not far away...

Reference materials:

CCTV News: Why is the United States? Gotta target Northwestern Polytechnical University? Details disclosed

Quick Technology: Russian Yandex Taxi App Hacked Dozens of Taxis Make Moscow "blocked and stuck"

Weibo @ Zhou Hongyi

Tiktok @ Sohu Finance

Bi Ren Technology official website

Official website of the People's Republic of China National Internet Information Office

Apple official website

Edit: Pork balls