The Emerging Battlefield in the U.S.-China Conflict: The Race for Chips

NASA has selected RISC-V technology to help it land future spacecraft on unmapped planets. Meta Artificial Intelligence uses the technology, and Chinese engineers encrypt data using it. However, RISC-V could become the next front in the semiconductor trade war between the United States and China. The technology provides a common language for designing processors found in various devices. It has ignited a new debate in Washington about how far the US should go in expanding restrictions on exporting technology to China. This debate is complicated because RISC-V is based on open-source software and is not actual code. Many companies and institutions distribute these basic computing instructions for free. Despite concerns, some argue that RISC-V has more security as its inner details can be studied openly. Lastly, RISC-V is widely distributed, making it difficult to restrict.

News

Moms Managing Girl Influencers: A Marketplace Stalked by Men

Elissa began receiving threatening messages early last year from a person calling themselves “Instamodelfan” targeting her daughter’s Instagram account. Despite having over 100,000 followers, the account has been under scrutiny for potentially exploiting children in exchange for money. However, the issue runs deeper than that. Research from The New York Times found that the platform […]

Read More
News

Insights from The Times’s Investigation of Child Influencers

Instagram maintains the 13-year-old minimum age for accounts, but parents can take control, largely for their daughters’ ambitions to become influencers. Parents initiate their child’s modeling career or gain favor from clothing brands, but a dark subculture emerges, controlled by men attracted to minors, as per The New York Times. The emergence of mom-run profiles […]

Read More
News

Rising Threat: China’s Growing Cyber Espionage and the New Vulnerability

Beijing’s Networks Expanding Hacking Efforts China has spread its hacking reach with new tools that exploit computer vulnerabilities and a network of contracted vendors. The large scale of China’s hacking operations poses a significant threat, with the FBI reporting China’s hacking program to be larger than all major nations combined. The U.S. has tracked consistent […]

Read More