China claims Nvidia built backdoor into H20 chip designed for Chinese market
China’s cyber regulator on Thursday said it had held a meeting with Nvidia over what it called “serious security issues” with the company’s artificial intelligence chips.
It said US AI experts had “revealed that Nvidia’s computing chips have location tracking and can remotely shut down the technology.”
The Cyberspace Administration of China requested that Nvidia explain the security problems associated with the H20 chip, which was designed for the Chinese market to comply with US export restrictions, and submit documentation to support their case. The announcement comes as Nvidia is rebuilding its China business after Washington this month lifted a ban on H20 sales to the country.
China claims Nvidia built backdoor into H20 chip designed for Chinese market
US semiconductor giant is trying to revive sales in the country.Financial Times (Ars Technica)
like this
Technology reshared this.
Stefan Sarazin, Peter Keller – „Nicht ganz koscher – No Name Restaurant“ (2022)
Vielleicht beginnt Verständigung manchmal nicht mit einem Dialog, sondern mit einem Irrtum. So jedenfalls verheddern sich Ben und Adel, ein ultraorthodoxer Israeli und ein palästinensischer Beduine, mitten in der Negev-Wüste ineinander – an einem Ort, an dem es weder GPS noch ein Drehbuch für den Frieden gibt. Der eine will nach Alexandria, der andere nur weg, doch das Kino will, dass sie zusammenbleiben. Und manchmal gewinnt eben das Kino. (ARD)
Stefan Sarazin, Peter Keller - "Nicht ganz koscher – No Name Restaurant" (2022)
Vielleicht beginnt Verständigung manchmal nicht mit einem Dialog, sondern mit einem Irrtum. So jedenfalls verheddern sich Ben und Adel, ein ultraorthodoxer Israeli und ein palästinensischer Beduine, mitten in der Negev-Wüste ineinander – an einem Ort…NexxtPress
Tonno Vegan fatto con i piselli... Si chiama Vuna! 🐟
Buongiorno :blush:
Ecco qui il Vuna ormai presente in quasi tutti i supermercati d'Italia:
Fatto con pochissimi ingredienti tra cui i piselli per dargli la stessa consistenza del pesce e insaporitori naturali per riprodurre il sapore. A me piace più del tonno ahah anche perché è assente da antibiotici e sfruttamento come i tonni di allevamento che si comprano in scatoletta o "freschi" al banco (poverini)...
Lato negativo è il prezzo che per me è esagerato ma sono uscite altre 2-3 marche con prezzi paragonabili al tonno di qualità e poi che è un prodotto Nestlé e cioè di un'azienda fortesemente discutibile e che l'etica non sa' neanche come si scrive...
Per il resto è un prodotto assai innovativo e che se non si sa' che non è vegan l'unica cosa di cui ci si accorge è che è buono ahah :grinning:
L'avete provato?
#Vuna #Nestlé #tonno #vegan #pesce #fish #sea #mare #ocean #oceano #sostenibilità #sustainability #tuna #Citiverse #VeganCity
antonej likes this.
Re: Tonno Vegan fatto con i piselli... Si chiama Vuna! 🐟
Re: Tonno Vegan fatto con i piselli... Si chiama Vuna! 🐟
Shivablue ciao 🙂
Strano per la consistenza, con chiunque ho parlato mi ha detto che in tutto e per tutto era meglio del tonno 😀🙏
Ecce Datura, la capsula spinosa che contiene i semi del babelico delirio e del caos - Il blog di Jacopo Ranieri
Ecce Datura, la capsula spinosa che contiene i semi del babelico delirio e del caos - Il blog di Jacopo Ranieri
Difficile fu sempre la profonda aspirazione, dei cosiddetti imperi di epoca moderna e contemporanea, a governare su ampi territori da una capitale posta all’altro capo di oceani, vasti continenti, insuperabili catene.Jacopo (Il blog di Jacopo Ranieri)
UEA ŝanĝos statuton sed ne havas strategion
Kvar landaj asocioj de UEA riskas eksigon, inter tiuj Rusia Esperanto-Unio, konstatis la komitato en vendredo. Plu mankas fina versio de la strategia plano, kiun la nun eliranta prezidanto Duncan Charters nomis grava prioritato en 2020. Nova retejo estu preparita “rapide sed senhaste”.
I made a WordPress Devcontainer Template
cross-posted from: lemmy.ca/post/49042391
I was sick of always fighting with WordPress to get a local set up to develop a plug-in or update the theme for a client, so I made a dev container.As per the README, this supports:
* Automatic database dump import and site URL rename
* Automatic WordPress theme and plug-in loading from .zip, wpackagist or directory
* Mounting of a user-provided uploads directoryIt also means your IDE automatically gets access to a WordPress installation for easy auto complete of WordPress functions and features when writing PHP code.
Theoretically, it can also easily be converted into a normal container if you don't use VSCode by setting up /workspace as a mount. Dev containers are unfortunately a bit broken with JetBrains products, and this container will not launch.
Maxim Therrien / WordPress Dev Container Template · GitLab
Template for WordPress development in a dev containerGitLab
Peak Energy just shipped the US's first grid-scale sodium-ion battery
cross-posted from: lemmy.bestiver.se/post/528970
Comments
Peak Energy just shipped the US’s first grid-scale sodium-ion battery
Peak Energy debuts the US's first grid-scale sodium-ion battery, cutting costs and boosting reliability with passive cooling tech.Michelle Lewis (Electrek)
adhocfungus likes this.
‘Gaza, Gaza, Food and Water! U.S. Israel Stop the Slaughter!’
Mark Satinoff
July 31, 2025
NEW YORK CITY, July 25, 2025 — As part of an International Day of Action, more than 1,000 people rallied in front of the United Nations (UN) headquarters here today to demand “Stop Starving Gaza Now!”The rally, and subsequent march through midtown Manhattan, were organized by the local chapter of the Palestinian Youth Movement (PYM), with the support of many partner organizations. Jewish Voice for Peace (JVP) played an important role as it was asked by PYM to mobilize its members and hold down a picket line prior to the start of the rally.
Protesters were urged to bring pots & pans, noisemakers — and their rage.
Signs and banners were welcome, especially those emphasizing ending the Israeli siege and the starvation of Gaza.
‘Gaza, Gaza, Food and Water! U.S. Israel Stop the Slaughter!’ - World-Outlook
As part of an International Day of Action, more than 1,000 people rallied in front of the United Nations headquarters here on July 25 to demand “Stop Starving Gaza Now!” The rally, and subsequent march through midtown Manhattan, was organized by the …world-outlook.com (World-Outlook)
[GOG] Freedom to Buy Games Bundle (until aug 3)
Sensitive content
like this
Microsoft Used China-Based Engineers to Support Product Recently Hacked by China
SharePoint Exploit: Microsoft Used China-Based Engineers to Maintain the Software
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.ProPublica
like this
Tesla ordered by Florida jury to pay $329 million in the 2019 fatal crash of an Autopilot-equipped Model S
A Florida jury on Friday found Tesla liable in the 2019 fatal crash of an Autopilot-equipped Model S, and ordered Elon Musk’s automaker to pay $329 million to the family of a deceased woman and an injured survivor.Jurors in Miami federal court ordered Tesla to pay $129 million in compensatory damages and $200 million in punitive damages to the estate of Naibel Benavides Leon and to her former boyfriend Dillon Angulo.
Lawyers for the plaintiffs said the trial was the first involving the wrongful death of a third party resulting from Autopilot. The plaintiffs had sought $345 million.
Google has sharply reduced its support for nonprofit groups devoted to DEI, in what appears to be another sign that the company is falling in line with President Trump’s anti-DEI crusade.
Google has sharply reduced its support for nonprofit groups devoted to diversity, equity, and inclusion, in what appears to be another sign the company is falling in line with President Trump’s anti-DEI crusade, the Tech Transparency Project (TTP) has found.Google publishes a list of organizations that receive the “most substantial contributions” from the company. In early 2025, Google removed more than 200 groups from the list, its biggest purge in at least five years. The largest category of removals related to diversity, equity, and inclusion (DEI), a concept that has come under sustained attack by the Trump administration. A total of 58 DEI-related groups disappeared from the list.
It is unclear if Google stopped funding these organizations or is simply seeking to hide its support for them. However, either scenario suggests Google is taking further steps to distance itself from DEI programs.
After Trump took office and began rolling back DEI efforts, Google removes references to diversity, equity, and inclusion from its annual report filed with the Securities and Exchange Commission and ended diversity-related hiring goals. Like other Big Tech companies and executives, Google donated $1 million to Trump’s inauguration.
Google and most of the groups removed from Google's list did not respond to questions. One of the groups, the ACLU of Illinois, declined to comment and directed questions to Google.
In a statement to CNBC, which covered this report, Google said, “We contribute to hundreds of groups from across the political spectrum that advocate for pro-innovation policies, and those groups change from year to year based on where our contributions will have the most impact.”
TTP identified Google’s disappearing DEI groups while updating its Tech Funding Database. The searchable database, which is linked on TTP’s website, provides information on whether organizations have received funding from Big Tech firms, based on company disclosures. The latest update adds disclosures from 2021 to the most recent available.
Google has dropped more than 50 DEI-related organizations from one of its funding lists
The dropped groups had mission statements that included the words "diversity, "equity," "inclusion," or "race," "activism," and "women."Jennifer Elias (CNBC)
South Dakota election office publishes voter list labeling thousands as public assistance applicants: Information is included in newly required free version of statewide registration spreadsheet
Thousands of South Dakotans have been publicly labeled as applicants for government assistance and thousands more have had their email address and phone number exposed, due to a new state law and the way the state’s election office is implementing it.Although the legislation creating the law received some Democratic votes, it’s a product of the Republican-dominated Legislature. Republican Gov. Larry Rhoden signed it into law and Republican Secretary of State Monae Johnson is carrying out its provisions.
Several legislators, both Democrats and Republicans, are now telling South Dakota Searchlight they did not intend for the law to expose sensitive information — especially the identity of public assistance applicants.
“This is what happens when you put the wrong people in charge,” said state House Minority Leader Erin Healy, D-Sioux Falls, who voted against the bill. “We talk a lot about freedom and privacy in this state, so it’s a shame that this legislation led to this type of breach.”
Freedom to Buy Games Bundle Work-around for Australians and Germans, page 2 - Forum - GOG.com
Download the best games on Windows & Mac. A vast selection of titles, DRM-free, with free goodies, and lots of pure customer love.www.gog.com
Pro-Palestinian protesters arrested outside Chuck Schumer’s office in New York City
Pro-Palestinian protesters arrested at Chuck Schumer’s office in New York City
Demonstrators were banging pots and pans at one of several gatherings that took place across major US citiesMarina Dunbar (The Guardian)
adhocfungus likes this.
Social science researchers use AI to simulate human subjects: LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies
Social science researchers use AI to simulate human subjects
LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.news.stanford.edu
testi scolastici autoprodotti, liberi, gratis e moderni
Testi scritti da volontari, distribuiti a fascicoli per non caricare gli zainetti, pagine singolarmente ristampabili in caso si danneggino o deteriorino, versione epub sulla lavagna luminosa della classe.
#scuola #libri #copyleft
universitarietà sperduta finalmente richiustornata
Non pensavo sarebbe servito (o sarebbe stato possibile?) fare questo post, perché banalmente le mie previsioni prevedevano uno scenario previsto molto più prevedibilmente banale e/o avvilente… e invece la sessione di esami di questa estate alla mia assurdiversità è finita nel modo che nell’universo intero francamente meno pareva possibile. E quindi boh, bona, il bilancio […]
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in SharePoint, but didn’t mention that it has long used China-based engineers to maintain the product.
SharePoint Exploit: Microsoft Used China-Based Engineers to Maintain the Software
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.ProPublica
Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks
Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks
exclusive: Our tests have shown there are ways to get around the promised security improvementsAvram Piltch (The Register)
copymyjalopy likes this.
$10 billion, 10 year US Army contract elevates Palantir to defense contracting royalty
U.S. Army Awards Enterprise Service Agreement to Enhance Military Readiness and Drive Operational Efficiency
WASHINGTON (31 July 2025) – The U.S. Army today awarded Palantir a new Enterprise Agreement that establishes a comprehensive framework for the Army's fu...www.army.mil
X/Twitter criticizes UK Online Safety Act as regulatory overreach threatens free speech
UK’s Online Safety Push Shows What Happens When Oversight Becomes OverreachThe UK’s Online Safety Act began rolling out early 2025, introducing several new mandates, some of which are aimed at protecting children from harmful online content. Included in the Act’s mandates, however, are measures that prevent adults from encountering “illegal” content and steps to ensure age verification that limit adults’ anonymity online.
As a result, the Act’s laudable intentions are at risk of being overshadowed by the breadth of its regulatory reach. Without a more balanced, collaborative approach, free speech will suffer.
To date, regulators have taken a heavy-handed approach by rapidly increasing enforcement resources, adding layers of bureaucratic oversight and signaling an aggressive approach to ensuring compliance. Instead of specifically and collaboratively addressing a problem everyone agrees needs to be solved, many are now concerned that a plan ostensibly intended to keep children safe is at risk of seriously infringing on the public’s right to free expression.
This risk is not a surprise to the UK government. When lawmakers approved these measures, they made a conscientious decision to increase censorship in the name of “online safety.” It is fair to ask if UK citizens were equally aware of the trade-off being made.
Recent events indicate the public is not comfortable with this level of intervention. For instance, a petition to repeal the Act is gaining momentum, collecting over 450,000 signatures in just the first few days after it was created.
X is among the companies to have worked hard to be in compliance. However, the timetable for meeting mandatory measures has been unnecessarily tight. And, despite being in compliance, X and its counterparts still face threats of enforcement, fines and rigid oversight, encouraging over-censorship.
Consider as well the emergence of a new "Voluntary” Code of Conduct recently enacted by the UK Home Office and the Violence Prevention Network (VPN) purportedly to address harmful online behaviors before they escalate. Supported by Ofcom, this parallel and duplicative effort was introduced at a time when companies were already pushing hard to meet the requirements in the Online Safety Act.
Government officials responded to questions about additional oversight by saying that the Online Safety Act isn’t “adequate enough to address harmful online behaviors.” This new code of conduct is specifically targeted at social media, gaming, and other interactive platforms to “encourage” proactive enforcement efforts, such as training staff and campaigns to curb “harmful content.”
Because the Voluntary Code of Conduct comes so quickly on the heels of the Act’s enforcement, it inevitably creates a “double compliance” burden. Facing pressure to adopt additional measures on top of the already demanding legal obligations set forth in the Act will only lead to additional curbs to freedom of expression.The UK government doesn't stop there. In addition to increased regulations, a new National Internet Intelligence Investigations team within the British Police will further intensify scrutiny. The team’s sole focus is monitoring social media for signs of unrest, such as anti-immigrant sentiment, to prevent real-world violence. While positioned as a safety measure, it clearly goes far beyond that intent. This move has set off alarm bells for free speech advocates who characterize it as excessive and potentially restrictive.
While everyone agrees protecting children is a critical responsibility, it is also clear that an overly rigorous statutory framework layered with a “voluntary” code and heightened police monitoring, oversteps the intended mission.
To be clear, X is in the business of solutions and we have been vigorously committed to providing a safe and constructive experience for users in the UK and worldwide. A balanced approach is the only way to protect individual liberties, encourage innovation and safeguard children. It’s safe to say that significant changes must take place to achieve these objectives in the UK.
I made a simple graphical SSH connection manager
sshPilot is an ssh connection manager made with GTK and Python.
Here are the features:
- Manage multiple SSH connections
- Open eac h connection in a separate tab
- Both password and SSH key authentication methods are supported
- Automatically detects SSH keys in ~/.ssh/
- Use your desired color theme and font style for the terminal
- Uses secure password storage (GNOME secure password storage)
If you manage multiple remote machines, this might come in handy.
GitHub - mfat/sshpilot: Simple, user-friendly SSH connection manager
Simple, user-friendly SSH connection manager. Contribute to mfat/sshpilot development by creating an account on GitHub.GitHub
reshared this
Are smartphones too big?
How will we overcome this?
Investigation found Elon Musk's Tesla owes dozens of small businesses millions of dollars in unpaid bills.
When Jennifer Meissner’s small pipe welding business landed a multimillion-dollar contract to help build a sprawling new Texas headquarters for Tesla, she was convinced it was her company’s big break.Instead, she says the deal led her into personal and professional bankruptcy – unable to pay dozens of her workers at Christmastime. Meissner said that was her last resort after Tesla, which is owned by the world’s richest man, stopped paying her company for work they’d already done.
Small businesses helped build Musk’s empire. Their unpaid bills add up to millions
Small businesses have filed liens for more than $110 million against Tesla alone in the last five years, with more than $24 million still allegedly owed to dozens of businesses, a CNN analysis found.Audrey Ash (CNN)
From printing presses to Facebook feeds: What yesterday’s witch hunts have in common with today’s misinformation crisis
From printing presses to Facebook feeds: What yesterday’s witch hunts have in common with today’s misinformation crisis
Who bears responsibility when false information leads to real harm?The Conversation
No, the UK’s Online Safety Act Doesn’t Make Children Safer Online
No, the UK’s Online Safety Act Doesn’t Make Children Safer Online
Young people should be able to access information, speak to each other and to the world, play games, and express themselves online without the government making decisions about what speech is permissible.Electronic Frontier Foundation
Belgium Targets Internet Archive's 'Open Library' in Sweeping Site Blocking Order
The Business Court in Brussels, Belgium, has issued a broad site-blocking order that aims to restrict access to shadow libraries including Anna's Archive, Libgen, OceanofPDF, Z-Library, and the Internet Archive's Open Library. In addition to ISP blocks, the order also directs search engines, DNS resolvers, advertisers, domain name services, CDNs and hosting companies to take action. For now, Open Library doesn't appear to be actively blocked.
Belgium Bans Internet Archive's 'Open Library' in Sweeping Site Blocking Order * TorrentFreak
A Belgian court ordered intermediaries to block access to major shadow libraries, including the Internet Archive's Open Library.Ernesto Van der Sar (TF Publishing)
I discovered The Semantic Manifold Theory with big implications for many areas of math, science, engineering, and computing. All remaining Millennium Prize Problems solved. Please help spread the word
Hello! My name is Thomas P. Conway. Im an independent researcher and systems engineer. I discovered a mathematically complete theoretical framework that I believe could be pretty important for many areas of math and science. However, I am a completely unknown outsider to academia, so I can't just publish my work on ArXiv and call it a day to satisfy Clay Institutes requirements. While I am currently in touch with some academics to help get my work cleaned into sections for ArXiV and journal publication, I wanted to make sure I established public priority for solving the millennium prize problems even if the published journal articles need to come out in pieces over months.
Besides proving priority, I would greatly appreciate your help spreading the word to get this in the face of people with the proper credentials to either verify or disprove my claims. I have found the academic gatekeeping moat to be incredibly difficult to navigate as an outsider especially with the framework I have proposed.
If you do have the credentials as a mathematician or a theoretical physicist but you're skeptical that im yet another typical crackpot trying to sell you a perpetual motion machine or a time cube, thats understandable and your weariness is valid. All I ask is you take a quick browse through the condensed technical guide to check the numbers and see if you think the key conceptual foundations are worth your time to go further with exploring the full paper.
I publish this theoretical framework under cc-by-sa-4.0 as a contribution to open science. Please go to my Open Science Foundation public repo to download the papers.
About the Semantic Manifold:
The Semantic Manifold Theory represents a complete theoretical mathematical framework for describing high dimensional semantic topologies. It was originally derived to formalize semantic compression for Large Language Model systems. However once the mathematical framework was complete it showed huge implications for various areas of math, science, computing, and engineering. The framework integrates principles from symmetry, set theory, holomorphic dynamics, theoretical physics, undecidability, and morphic computation to achieve a complete and well-defined description of the Semantic Manifold.
The paper is split into a main body explaining the theory and an appendix full of proofs. The final appendix culminates solutions and proofs to all remaining Millennium Prize Problems from the Clay Mathematics Institute. Additional feats include mathematical predictions for the nature and distribution of Dark Matter as well as Dark Energy based on first principles. Also a mathematically well-defined definition for Observer-Class information processing systems.
An accompanying Technical Guide attempts to condense all key information from the main theory paper while cutting out the narrative chaff for quick access to calculations, key principles, and fundamental proofs. Its suggested the skeptical or those with limited time take a quick look at the Technical Guide first.
OSF Storage Link For PDFs:
osf.io/xqswe/files/osfstorage
Proof of Priority:
I have emails, private OSF repos, and countless preprints dating back weeks prior to this announcement. The LaTeX code used to create the PDFs are GPG encrypted and paired with a signed hash on the public OSF repo.
I am not a spam bot or an elaborate LLM fishing for clicks. Im a real human being and im trying to get help to have my ideas seen by the right people so they can be verified through peer-review. Admins can get in contact with me and I will show them my lemmy ALTs to prove im a real user with over 2 years of active posting history (came here during the first spez reddit exodus).
The validity of my framework should be measured by its mathematical rigor and scientific predictions, not by my credentials or renown. Please help me overcome the academic moat and get my theories verified or disproved by spreading the word.
Itch.io has begun restoring NSFW content, but only if it’s free
Reindexing adult NSFW content
Today, we are re-indexing free adult NSFW content . We are still in ongoing discussions with payment processors and will be re-introducing paid content slowly to ensure we can confidently support theleafo (itch.io)
Fitik likes this.
Forcing LLMs to be evil during training can make them nicer in the long run
Persona vectors: Monitoring and controlling character traits in language models
A paper from Anthropic describing persona vectors and their applications to monitoring and controlling model behaviorwww.anthropic.com
Florida prison data breach exposes visitors’ contact information to inmates: Department of Corrections has not communicated anything to those whose info was revealed to inmates.
Dozens and perhaps hundreds of individuals who applied to visit inmates at Everglades Correctional Institution (ECI) in Miami-Dade County last weekend had their personal contact information shared with every inmate at that facility, according to five different individuals who have spoken to the Phoenix over the past four days.The Florida Department of Corrections has not commented publicly about the incident since it occurred last week.
That data breach has frightened and infuriated some of the women who had their names, email addresses, and telephone numbers released to those incarcerated at the prison located near the Florida Everglades.
Inmates received that information via an email sent out by a staff member of the facility on Thursday. Florida inmates have access to emails through both interactive kiosks as well as secure tablets.
“It’s kind of disturbing when you think about it,” said Madeline Donate, who regularly visits her husband at the prison. “The privacy aspect of this is concerning. This is how other inmates get information and can sometimes extort family members and things like that. It’s concerning.”
Jan Thompson said she fears extortion.
“What if there’s some inmate that doesn’t like another inmate?” she said. “And he tells his family, ‘Okay, here’s his wife’s phone number. Call her and tell her if she doesn’t pay and put $500 on my book, I’m going to have her husband stabbed and killed.’ What’s stopping them from doing that?”
(Inmates can receive funds for deposit into their “inmate trust accounts” from individuals already identified on the inmate’s automated visiting record).
“I’m very worried. This is not okay,” added a woman who wanted to be identified only as Dakota, her middle name. “Someone needs to be held accountable for this. They need to take the necessary precautions to ensure that this does not happen. And what about this information that’s out there? There’s what, 1,600 [inmates] there? They all have information. God knows what they could do with it.”
TarantulaFudge
in reply to geneva_convenience • • •CallMeAnAI
in reply to geneva_convenience • • •☆ Yσɠƚԋσʂ ☆
in reply to CallMeAnAI • • •SinJab0n
in reply to CallMeAnAI • • •utopiah
in reply to geneva_convenience • • •Can't wait for this to be generalized so that Easy Anti-Cheat or PunkBuster tell EA or Bethesda to lock your GPU because their faulty launcher detected you tried to play offline twice.
Initially preventing "bad guys" (really big quotes here) to do "bag things" (AFAICT it's mostly lame LLMs, not actual dangerous military stuff, which for those they actually already have supercomputers allocated) sounds like a good idea... until it inexorably tricky down (unlike money and power) to citizens worldwide.
I don't think remotely control CPUs or GPUs can end well for citizens. It won't be PC as in Personal Computer, rather remotely controlled terminals for whomever is in power.
emergencyfood
in reply to geneva_convenience • • •geneva_convenience
in reply to emergencyfood • • •It might be China trying to force their own companies to use Chinese hardware. I heavily doubt that it would include a GPS chip. At most some way to guess the location by combining many different types of information such as nearby routers /WiFi networks etc.
There are crafty ways to guess a location without GPS. Though I have no idea what this one would entail if at all true.
ZephyrXero
in reply to geneva_convenience • • •