China Dumps Dud Chips On Russia, Moscow Media Moans

The failure rate of semiconductors shipped from China to Russia has increased by 1,900 percent in recent months, according to Russian national business daily Kommersant. The Register reports: Quoting an anonymous source, Kommersant states that before Russia’s illegal invasion of Ukraine the defect rate in imported silicon was two percent. Since that war commenced, Russian manufacturers have apparently faced 40 percent failure rates. Even a two percent defect rate is sub-optimal, because products made of many components can therefore experience considerable quality problems. Forty percent failure rates mean supplies are perilously close to being unfit for purpose.

According to Kommersant, Russian electronics manufacturers are not enjoying life at all because, on top of high failure rates, gray market gear doesn’t flow with the same speed as legit kit and supply chains are currently very kinked indeed inside Russia. The newspaper lays the blame on economic sanctions that have seen many major businesses quit Russia. Gray market distributors and other opportunistic operators have been left as the only entities willing to deal with Russian businesses. Gray market folks are not renowned for their sterling customer service nor their commitment to quality. They get away with it because buyers of products with — ahem — unconventional origins self-incriminate if they complain to authorities. Perhaps they’re even dumping dud product on Russian buyers, knowing that they can’t easily access alternatives.

Read more of this story at Slashdot.

China May Prove Arm Wrong About RISC-V’s Role In the Datacenter

Arm might not think RISC-V is a threat to its newfound foothold in the datacenter, but growing pressure on Chinese chipmaking could ultimately change that, Forrester Research analyst Glenn O’Donnell tells The Register. From the report: Over the past few years the US has piled on export bans and trade restrictions on Chinese chipmakers in an effort to stall the country’s semiconductor industry. This has included barring companies with ties to the Chinese military from purchasing x86 processors and AI kit from the likes of Intel, AMD, and Nvidia. “Because the US-China trade war restricts x86 sales to China, Chinese infrastructure vendors and cloud providers need to adapt to remain in business,” O’Donnell said. “They initially pivoted to Arm, but trade restrictions exist there too. Chinese players are showing great interest in RISC-V.”

RISC-V provides China with a shortcut around the laborious prospect of developing their own architecture. “Coming up with a whole new architecture is nearly impossible,” O’Donnell said. But “a design based on some architecture is very different from the architecture itself.” So it should come as no surprise that the majority of RISC-V members are based in China, according to a report published last year. And the country’s government-backed Chinese Academy of Sciences is actively developing open source RISC-V performance processors.

Alibaba’s T-Head, which is already deploying Arm server processors and smartNICs, is also exploring RISC-V-based platforms. But for now, they’re largely limited to edge and IoT appliances. However, O’Donnell emphasizes that there is no technical reason that would prevent someone from developing a server-grade RISC-V chip. “Similar to Arm, many people dismiss RISC-V as underpowered for more demanding applications. They are wrong. Both are architectures, not specific designs. As such, one can design a powerful processor based on either architecture,” he said. […] One of the most attractive things about RISC-V over Softbank-owned Arm is the relatively low cost of building chips based on the tech, especially for highly commoditized use cases like embedded processors, O’Donnell explained. While nowhere as glamorous as something like a server CPU, embedded applications are one of RISC-V’s first avenues into the datacenter. […] These embedded applications are where O’Donnell expects RISC-V will see widespread adoption, including in the datacenter. Whether the open source ISA will rise to the level of Arm or x86 is another matter entirely.

Read more of this story at Slashdot.

China Upgrades Great Firewall To Defeat Censor-Beating TLS Tools

Great Firewall Report (GFW), an organization that monitors and reports on China’s censorship efforts, has this week posted a pair of assessments indicating a crackdown on TLS encryption-based tools used to evade the Firewall. The Register reports: The group’s latest post opens with the observation that starting on October 3, “more than 100 users reported that at least one of their TLS-based censorship circumvention servers had been blocked. The TLS-based circumvention protocols that are reportedly blocked include trojan, Xray, V2Ray TLS+Websocket, VLESS, and gRPC.” Trojan is a tool that promises it can leap over the Great Firewall using TLS encryption. Xray, V2ray and VLESS are VPN-like internet tunneling and privacy tools. It’s unclear what the reference to gRPC describes — but it is probably a reference to using the gRPC Remote Procedure Call (RPC) framework to authenticate client connections to VPN servers.

GFW’s analysis of this incident is that “blocking is done by blocking the specific port that the circumvention services listen on. When the user changes the blocked port to a non-blocked port and keep using the circumvention tools, the entire IP addresses may get blocked.” Interestingly, domain names used with these tools are not added to the Great Firewall’s DNS or SNI blacklists, and blocking seems to be automatic and dynamic. “Based on the information collected above, we suspect, without empirical measurement yet, that the blocking is possibly related to the TLS fingerprints of those circumvention tools,” the organization asserts. An alternative circumvention tool, naiveproxy, appears not to be impacted by these changes. “It’s not hard to guess why China might have chosen this moment to upgrade the Great Firewall: the 20th National Congress of the Chinese Communist Party kicks off next week,” notes the Register. “The event is a five-yearly set piece at which Xi Jinping is set to be granted an unprecedented third five-year term as president of China.”

Read more of this story at Slashdot.

Tons of Chinese Rocket Debris Have Crashed into the Indian Ocean

The 25-ton core stage of a Long March 5B rocket “reentered Earth’s atmosphere over the Indian Ocean this afternoon,” reports Space.com, citing an announcement on Twitter from the U.S. Space Command.

Mission managers didn’t screw anything up; this end-of-life scenario is built into the Long March 5B’s design, to the consternation of exploration advocates and much of the broader spaceflight community. This disposal strategy is reckless, critics say, given that the big rocket doesn’t burn up completely upon reentry.

Indeed, 5.5 tons to 9.9 tons (5 to 9 metric tons) of the Long March 5B likely survived all the way to the ground today, experts with The Aerospace Corporation’s Center for Orbital Reentry and Debris Studies have estimated. And it’s possible that falling rocket chunks caused some injuries or infrastructure damage today, given where the Long March 5B reentered. One observer appeared to capture the rocket’s breakup from Kuching, in the Malaysian state of Sarawak, for example, posting video of the dramatic event on Twitter. “The video from Kuching implies it was high in the atmosphere at that time — any debris would land hundreds of km further along track, near Sibu, Bintulu or even Brunei,” astrophysicist and satellite tracker Jonathan McDowell, of the Harvard-Smithsonian Center for Astrophysics, said via Twitter today. It’s “unlikely but not impossible” that one or more chunks hit a population center, he added in another tweet….

“What really should have happened is, there should have been some fuel left on board for this to be a controlled reentry,” Darren McKnight, a senior technical fellow at the California-based tracking company LeoLabs, said Thursday (July 28) during a Long March 5B reentry discussion that The Aerospace Corporation livestreamed on Twitter. “That would be the responsible thing to do….”

This was the third uncontrolled fall for a Long March 5B core stage to date.

NASA Administrator Bill Nelson also released a critical statement today pointing out that China “did not share specific trajectory information as their Long March 5B rocket fell back to Earth.”

All spacefaring nations should follow established best practices, and do their part to share this type of information in advance to allow reliable predictions of potential debris impact risk, especially for heavy-lift vehicles, like the Long March 5B, which carry a significant risk of loss of life and property.

Read more of this story at Slashdot.

Chinese-Made Huawei Equipment Could Disrupt US Nuclear Arsenal Communications, FBI Determines

There’s been “a dramatic escalation of Chinese espionage on US soil over the past decade,” sources in the U.S. counterintelligence community have told CNN this weekend.

But some dramatic new examples have been revealed. For example, in 2017 China’s government offered to build a $100 million pavilion in Washington D.C. with an ornate 70-foot pagoda. U.S. counterintelligence officials realized its location — two miles from the U.S. Capitol — appeared “strategically placed on one of the highest points in Washington DC…a perfect spot for signals intelligence collection.”
Also alarming was that Chinese officials wanted to build the pagoda with materials shipped to the US in diplomatic pouches, which US Customs officials are barred from examining, the sources said. Federal officials quietly killed the project before construction was underway…

Since at least 2017, federal officials have investigated Chinese land purchases near critical infrastructure, shut down a high-profile regional consulate believed by the US government to be a hotbed of Chinese spies and stonewalled what they saw as clear efforts to plant listening devices near sensitive military and government facilities.
Among the most alarming things the FBI uncovered pertains to Chinese-made Huawei equipment atop cell towers near US military bases in the rural Midwest. According to multiple sources familiar with the matter, the FBI determined the equipment was capable of capturing and disrupting highly restricted Defense Department communications, including those used by US Strategic Command, which oversees the country’s nuclear weapons…. It’s unclear if the intelligence community determined whether any data was actually intercepted and sent back to Beijing from these towers. Sources familiar with the issue say that from a technical standpoint, it’s incredibly difficult to prove a given package of data was stolen and sent overseas.

The Chinese government strongly denies any efforts to spy on the US…. But multiple sources familiar with the investigation tell CNN that there’s no question the Huawei equipment has the ability to intercept not only commercial cell traffic but also the highly restricted airwaves used by the military and disrupt critical US Strategic Command communications, giving the Chinese government a potential window into America’s nuclear arsenal…. As Huawei equipment began to proliferate near US military bases, federal investigators started taking notice, sources familiar with the matter told CNN. Of particular concern was that Huawei was routinely selling cheap equipment to rural providers in cases that appeared to be unprofitable for Huawei — but which placed its equipment near military assets.

Read more of this story at Slashdot.

Some Beijing Travelers Asked To Wear COVID Monitoring Bracelets

Some Beijing residents returning from domestic travel were asked by local authorities to wear COVID-19 monitoring bracelets, prompting widespread criticism on Chinese social media by users concerned about excessive government surveillance. Reuters reports: According to posts published on Wednesday evening and Thursday morning on microblogging platform Weibo, some Beijing residents returning to the capital were asked by their neighborhood committees to wear an electronic bracelet throughout the mandatory home quarantine period. Chinese cities require those arriving from parts of China where COVID cases were found to quarantine. Authorities fit doors with movement sensors to monitor their movements but until now have not widely discussed the use of electronic bracelets.

The bracelets monitor users’ temperature and upload the data onto a phone app they had to download, the posts said. “This bracelet can connect to the Internet, it can definitely record my whereabouts, it is basically the same as electronic fetters and handcuffs, I won’t wear this,” Weibo user Dahongmao wrote on Wednesday evening, declining to comment further when contacted by Reuters. This post and others that shared pictures of the bracelets were removed by Thursday afternoon, as well as a related hashtag that had garnered over 30 million views, generating an animated discussion on the platform.

A community worker at Tiantongyuan, Beijing’s northern suburb, confirmed to state-backed news outlet Eastday that the measure was in effect in the neighbourhood, though she called the practice “excessive.” A Weibo post and a video published on the official account of Eastday.com was removed by Thursday afternoon. Weibo user Dahongmao wrote on Thursday afternoon his neighbourhood committee had already collected the bracelets, telling him that “there were too many complaints.”

Read more of this story at Slashdot.