• 24 Posts
  • 9 Comments
Joined 3 months ago
cake
Cake day: January 29th, 2025

help-circle
  • Tihis is somehow related regarding ‘sanitising:’

    Uyghur Genocide: Activists slam Disney for filming Mulan in Xinjiang

    Activists and netizens have been outraged after Disney shot several portions of the action movie Mulan in parts of China where it is believed that authorities have placed countless people, mostly Uyghur Muslims, in concentration camps, subjecting them to human rights abuses. Campaign for Uyghurs Executive Director Rushan Abbas in a video message said she was horrified by the choice of Disney to shoot there ignoring the genocide of people by communist China.

    “Triggering more controversies and objections from the netizens, the final credits of the movie thanked a government security agency in Xinjiang province.”

    Social media users noticed that in the credits Disney thanked a number of government entities in Xinjiang, including the public security bureau in the city of Turpan and the “publicity department of CPC Xinjiang Uyghur Autonomy Region Committee”, reports BBC.

    The public security bureau in Turpan is tasked with running China’s “re-education” camps where Uighurs are held in detention.

    Walt Disney Co. Chief Financial Officer Christine McCarthy said the company’s decision to shoot some scenes of ‘Mulan’ in a controversial region of China has ‘generated a lot of issues for us’, reports Bloomberg.

    Campaign for Uyghurs Executive Director Rushan Abbas said the issues raised by Disney’s choice to film in a land stained by China’s genocide has serious implications for the entire global community, and especially for the Muslim ummah worldwide …
























  • One of the more elaborated news on that topic:

    Chinese officials have implicitly acknowledged responsibility for a series of sophisticated cyber intrusions targeting critical U.S. infrastructure.

    During a high-level meeting in Geneva with American officials, representatives from China’s Ministry of Foreign Affairs indirectly linked years of computer network breaches at U.S. ports, water utilities, airports, and other critical targets to increasing U.S. policy support for Taiwan […]

    Wang Lei, a top cyber official with China’s Ministry of Foreign Affairs, made the comments after U.S. representatives emphasized that China appeared not to understand how dangerous prepositioning in civilian critical infrastructure was, and how such actions could be viewed as an act of war […]

    The admission is considered extraordinary, as Chinese officials have typically denied involvement in cyber operations, blamed criminal entities, or accused the U.S. of fabricating allegations.

    Dakota Cary, a China expert at cybersecurity firm SentinelOne, noted that such an acknowledgment, even indirectly, likely required instructions from the highest levels of President Xi Jinping’s government.

    Source

    [Edit to insert archived source link.]










  • The guys at HF (and many others) appear to have a different understanding of Open Source.

    As the Open Source AI definition says, among others:

    Data Information: Sufficiently detailed information about the data used to train the system so that a skilled person can build a substantially equivalent system. Data Information shall be made available under OSI-approved terms.

    • In particular, this must include: (1) the complete description of all data used for training, including (if used) of unshareable data, disclosing the provenance of the data, its scope and characteristics, how the data was obtained and selected, the labeling procedures, and data processing and filtering methodologies; (2) a listing of all publicly available training data and where to obtain it; and (3) a listing of all training data obtainable from third parties and where to obtain it, including for fee.

    Code: The complete source code used to train and run the system. The Code shall represent the full specification of how the data was processed and filtered, and how the training was done. Code shall be made available under OSI-approved licenses.

    • For example, if used, this must include code used for processing and filtering data, code used for training including arguments and settings used, validation and testing, supporting libraries like tokenizers and hyperparameters search code, inference code, and model architecture.

    Parameters: The model parameters, such as weights or other configuration settings. Parameters shall be made available under OSI-approved terms.

    • The licensing or other terms applied to these elements and to any combination thereof may contain conditions that require any modified version to be released under the same terms as the original.

    These three components -data, code, parameter- shall be released under the same condition.