USA always said China copy US technologies, isn't this a shameless act. US don't behave your technology are superior, frankly US stills have difficulty in achieving hypersonic technology. China in time to comes,be testing mach 33 hypersonic system,which critics claimed Australia technology. They can claimed anything but just without any success to date.
Maybe not everyone know but nowardays in term of creativity when the U.S create one, China create at minimum 200 times more and with much humbleness that They don't speak out loud
That's an easy one. The answer to the question is: That's because the U$ is insecure and distressed. Not that those are new feelings for it, but right now they're amplified because it's also out of options as it's swimming in a pile of debt and cannot compete anymore.
For many years MANY Western nations have accused China of hacking and stealing information... and the typical response from China and its ChiNAZI's supporters have ALWAYS been the same... PROVE IT! Now the tables have turned... PROVE THE US HACKED CHINA! PROVIT IT CHINAZI!!!
@Dark Cloud UA-cam has cens your reply so it won't be seen by anyone else other than the people who already commented in this thread. We're basically living in 1984 at this point. You can check whether your comments have passed through UA-cam's cens algorithm by opening the video in another browser where you're not logged in. Sometimes you'll have to modify your words in order for the comments to pass the cens algorithm. Hope this helps. Cheers bud!
@Dark Cloud Not at all, it's an automatic process and your last comment has successfully passed their check. Just modify your wording and you'll be able to circumvent the cens algorithm.
@Dark Cloud No, it won't. You can come back later to check. Your last comment has passed too. I mean, all of their platforms are connected, we all know that. And they can be quite petty, so..
Don't expect such reports from western media. Their DNA is - "Reports everything bad about China whether lies or unfounded". That's the propaganda agenda they has established for decades.
Can you prove the US NSA hacked Chinese computers? If not... it must not have happened. That is directly out of China's play blook when it hacks the US. So, prove it ChiNAZI!
Bottomless & whatever it takes low - the mindset of dishonorable hypocrites without any moral compass. Like those bankrupt of intelligence to earn good money legitimately but need to resort to robbing for a living or a drug fix.
Can someone explain how USA places sanctions on countries, for that countries foreign policy don't suit the USA? Example Ethiopia new peace talks, Zimbabwe for 20 plus years, these countries are no where near the USA.
The US processes most of the world's financial transactions as they have to go through NY to get processed by the SWIFT system, which I believe you may have heard before, a relic of the Bretton Wood system back when the dollar was pegged to gold. This allows the US to have the ability to block any country from accessing the payment system, defacto blocking their international trade. Of course, these countries can shift to other financial processing system, but then the US make use of its market power to coerce countries or companies to avoid trading with those countries, like "sanctioning" (banning a certain company or country to trade with the US and allies) those who traded with another sanctioned country. Basically, the US make use of economic coercion when it speaks of "sanctions". Take Zimbabwe as an example. Their economy was predominantly focused on agri-export, pre-sanctions. The UK, with the backing of the US, sanctioned Zimbabwe's agri-exports in an attempt to destroy their economy, meaning they could no longer trade internationally their exports, and to prevent its neighbours from trading with Zimbabwe, their extorted those leaders that if they happened to trade with Zim, they'll also be sanctioned, or their companies who did the trade, or would get a hefty fine, etc...
According to the US, it is not hacking if it's done by them. Sort of like what some blacks say, "it's not racial descrimination if it was done by them".
That's a weird example. If anything white people can't even accept criticism about their racism and had to invent "reverse racism" so that they can flip the narrative on its head and cry victim. It's really like when they try to frame China as enslaving Xinjiang people to picking cotton. Gee, why does that sound familiar? Oh, it's because it's what the US did. And now white America can call it even. They're even trying to call Chinese people as racist against black people. As if there's institutional racism by Chinese people against black people or segregation and apartheid. If America can't play the lesser evil card because of overwhelming evidence and history against them, they call it even, like "all governments do it."
And you can provide some kind of source to back your claim that "According to the US, it is not hacking if it's done by them"? If not, will you admit you're talking out your arse?
@@covertpuppytwo3857 Look at what they do and not what they say. My good old CPT, you ever received some of that US budget for anti-China propaganda? Better take care of it, it might go to others. They might not even know you exist, better work harder. I noticed that you are absent in trolling the China videos nowadays. Must be heartbreaking to working so hard for them and yet they don't even pay or at least notice you. Sucks to be you.
@@rap3208 _"Look at what they do and not what they say"_ - So what you're saying is "No"... you're talking out your arse again. How typical of you wu mao ChiNAZI's!
Beijing seeks justice for NSA hacking activity, you dream about it till the next century and be realistic about it. One thing, that can prevent NSA hacking is to develop your own Operating System, application software, and network protocol layer or ISO layers that need customization. Otherwise, intensify your security audit and isolate highly sensitive data from the Internet.
You have missed out one crucial element and that is God. The One True God Who created heaven and earth and everything that is in it already prophesied almost 2000 years ago that He will use China to destroy the Great Harlot ie US!! What He said MUST be accomplished. He is God!!
@@lilyinthevalley8046 In the Book of Revelations, there is a Kingdom of the East that fights in the last battle of Armageddon, trying to prevents Christ's return. They are not a force of good. Some have wondered if it's Russia or China, or something else. Many have said it is China. 666 is the Mark of the Beast, it is also a lucky number in China.
@@onlineempire4204 one was not successful, the other still exists today, purely as a western tool, as can be seen in today's political climate. There is same principle, or so it was envisioned like that, to stop wars, well guess what, UN hasn't managed to stop war IN Syria, or the illegal invasion of Syria or even Iraq or Ukraine, you know why that is? Because USA 🇺🇸 supercedes UN power, so what this represents is one country, dictating to the rest of the world using UN rules, international laws, as a smokescreen to further US geopolitical agenda of circling certain countries the US perceives as its self created enemy. Despite the fact that global south countries around the world, do NOT respect or adhere to unilateral decisions made in Washington, further pressured by international organisations such as UN. No country is above international law, it seems that USA 🇺🇸 seems to think International Law doesn't apply to them, yet expects every other country to follow international law? This is why many countries don't trust the 🇺🇸 government & rubbish media propaganda anymore.
The question is why China did not know until 1000 hacking has been done. what is China going to do to prevent future hacking. Especially on NEW Technology.
i hope china Will start to celebrating because their tech know how has been mature since their nemesis start look for hint and how to carrect thier error.
@Kanaba Nakamura Oh, are you saying that, because I assumed he was Chinese? If so all the Asian's are just better. It really hardly matters what tribe they are apart of, or identify as. lol
Dang, I doubt it was anything but pure lazy. Have only one charge code? It caught their attention. Send a bill for toutition. Thanks for educating NSA.
Seems you need to add security protocols for security penetration, I'd suggest a closed computer system where you have to fetch in fresh science articles from usb memmory, clean/new usb stick every time and then recycle the old ones, bit of a bother ofcourse but seems completely necessary.
I'm sure Chinese computer techs are more than up to the task of shielding such sensitive data. China does NOT have to use the same servers as U$A especially in an enclosed environment of a school. It can have it's own local system. I agree with your tech guest that Chinese have been aware of this activity for a long time. Bringing this subject to light on the world scene is of great importance in the global media "war."
China should sanction both the US organisations and individuals involved, following the US example. And China should publicly announce the names of these organisations and individuals.
NSA has no idea what they are stealing. It is all in Chinese. Thye just save it to their huge disc data system and don't know what to do with them. Hiring Chinese to translate 150 GB of file? Crazy.
Space travel is very unclear exploration is a mystry. The Space program must stay with the State A Ministry of Space of China.. What can be gained from Space Travel?
What I learned is that in IT world evil can rapidly turn into good and good to evil. It would be irresponsible if China has the opportunity to do the same and choose not to, as well as U.S does. I name it prevention. Protocols and rules work just for everyone's stakeholder but at those levels things are critical
Here is what you do my dear chinese compatriots, you have your original data request ( fetching of data modelling programs, studies e,tc ) you download that in a quarantine ( emulated OS ) then you develop a program which can translate the program data where malicious code doesnt translate into the end program ( by having the end user programmed custom tailored to only translate the end user data ( the things that scientist use ) and scramble the backend ( this software you must protect the most from capturing / source code decoding ) then you translate the data in the quarantine and export it to the researchers ) ( even if having damaging code it can not be utilized when translated to your new software suite ( even if it has administrative privlege ) Then you simple need to control the access to this software suits source code by highest military security protocol ( say a 5000 digit key for brute forcing ) and a good overwatch for the code keepers. This is how you secure the networks. Always boot intake in quarantine, observe sensitive networks for injections, keep an active quarantine zone if you are plugging in the quarantine PCs into the ethernet or rather use physical transfer with portable drives. Other possibility is 1 way input way where you backup the system everytime before you plug in a data channel (usb / manual drive )with no access to the internet at all. ( closed circuit traffic is okay ofcourse ) So you can easily refresh the entire data systems if corruption is detected. But i prefer this custom tailored software suite for user comfortability. Also probably militarily secure every research facility and have manual code reviewers for important technology. Best wishes, D.
H * : Better buy Huawei mobile 😂am using it have broken my room wall now its ok as I had got it repaired from Huawei service center for free big job 😉.
China must not make the same mistake of being soft like Russia in Ukraine if it decides to take Taiwan by force. Turn Taiwan into the Mariupol steel factory after Russia was done with it before landing Chinese troops in Taiwan.
@Dark Cloud I got news for you, I'm Native American. I have a Spanish last name because I am also of Spanish heritage. I'm not sure what gringo you are talking about, but I suppose you mean anyone not Chinese. I know I work with some Mexican, I would ask them if I maybe cared.
I know the interviewer thinks she’s speaks english, she doesn’t. some incoherent word salad framed as a question. she starts a question from one angle and by the end it’s completely about something else
@@phyllisthompson4207 thanks, sweeping on phone issue. no they answered something, as guests normally wouldn’t point it out of it’s toward them. you can listen for yourself.
USA always said China copy US technologies, isn't this a shameless act.
US don't behave your technology are superior, frankly US stills have difficulty in achieving hypersonic technology.
China in time to comes,be testing mach 33 hypersonic system,which critics claimed Australia technology.
They can claimed anything but just without any success to date.
Maybe not everyone know but nowardays in term of creativity when the U.S create one, China create at minimum 200 times more and with much humbleness that They don't speak out loud
That's an easy one. The answer to the question is: That's because the U$ is insecure and distressed. Not that those are new feelings for it, but right now they're amplified because it's also out of options as it's swimming in a pile of debt and cannot compete anymore.
For many years MANY Western nations have accused China of hacking and stealing information... and the typical response from China and its ChiNAZI's supporters have ALWAYS been the same... PROVE IT! Now the tables have turned... PROVE THE US HACKED CHINA! PROVIT IT CHINAZI!!!
@Dark Cloud UA-cam has cens your reply so it won't be seen by anyone else other than the people who already commented in this thread. We're basically living in 1984 at this point. You can check whether your comments have passed through UA-cam's cens algorithm by opening the video in another browser where you're not logged in. Sometimes you'll have to modify your words in order for the comments to pass the cens algorithm. Hope this helps. Cheers bud!
@Dark Cloud Not at all, it's an automatic process and your last comment has successfully passed their check. Just modify your wording and you'll be able to circumvent the cens algorithm.
@Dark Cloud No, it won't. You can come back later to check. Your last comment has passed too.
I mean, all of their platforms are connected, we all know that. And they can be quite petty, so..
Not covered on Western media
Don't expect such reports from western media. Their DNA is - "Reports everything bad about China whether lies or unfounded". That's the propaganda agenda they has established for decades.
Why should the West cover Chinese lying propaganda?
UA-cam will deleted after it gets too many views, it's nothing new about UA-cam.
why would western media wants to cover it?
Obviously. No surprise here.
How much lower can the US stoop?
Just wait. Warlords, and every state of the 🇺🇸 being a war torn mini country coming to you soon!.... except its already kind of like that innit?
Can you prove the US NSA hacked Chinese computers? If not... it must not have happened. That is directly out of China's play blook when it hacks the US. So, prove it ChiNAZI!
The limbo rock low
@@ronniechew6566 Probably have to dig a big hole to go lower! lol
Bottomless & whatever it takes low - the mindset of dishonorable hypocrites without any moral compass.
Like those bankrupt of intelligence to earn good money legitimately but need to resort to robbing for a living or a drug fix.
Can someone explain how USA places sanctions on countries, for that countries foreign policy don't suit the USA? Example Ethiopia new peace talks, Zimbabwe for 20 plus years, these countries are no where near the USA.
I guess because they can? Since they influence msm and many ngos they believe that they will remain unpunished.
The US processes most of the world's financial transactions as they have to go through NY to get processed by the SWIFT system, which I believe you may have heard before, a relic of the Bretton Wood system back when the dollar was pegged to gold. This allows the US to have the ability to block any country from accessing the payment system, defacto blocking their international trade.
Of course, these countries can shift to other financial processing system, but then the US make use of its market power to coerce countries or companies to avoid trading with those countries, like "sanctioning" (banning a certain company or country to trade with the US and allies) those who traded with another sanctioned country. Basically, the US make use of economic coercion when it speaks of "sanctions".
Take Zimbabwe as an example. Their economy was predominantly focused on agri-export, pre-sanctions. The UK, with the backing of the US, sanctioned Zimbabwe's agri-exports in an attempt to destroy their economy, meaning they could no longer trade internationally their exports, and to prevent its neighbours from trading with Zimbabwe, their extorted those leaders that if they happened to trade with Zim, they'll also be sanctioned, or their companies who did the trade, or would get a hefty fine, etc...
They like to create chaos get people fighting then sell them guns
The reason I think is behind these activities is anxiety over lagging behind in technology development. A good report By Liu Xin.
Lie cheat and steal comes to mind
According to the US, it is not hacking if it's done by them. Sort of like what some blacks say, "it's not racial descrimination if it was done by them".
That's a weird example. If anything white people can't even accept criticism about their racism and had to invent "reverse racism" so that they can flip the narrative on its head and cry victim. It's really like when they try to frame China as enslaving Xinjiang people to picking cotton. Gee, why does that sound familiar? Oh, it's because it's what the US did. And now white America can call it even. They're even trying to call Chinese people as racist against black people. As if there's institutional racism by Chinese people against black people or segregation and apartheid. If America can't play the lesser evil card because of overwhelming evidence and history against them, they call it even, like "all governments do it."
And you can provide some kind of source to back your claim that "According to the US, it is not hacking if it's done by them"? If not, will you admit you're talking out your arse?
@@covertpuppytwo3857 Look at what they do and not what they say.
My good old CPT, you ever received some of that US budget for anti-China propaganda? Better take care of it, it might go to others. They might not even know you exist, better work harder. I noticed that you are absent in trolling the China videos nowadays. Must be heartbreaking to working so hard for them and yet they don't even pay or at least notice you. Sucks to be you.
@@rap3208 _"Look at what they do and not what they say"_ - So what you're saying is "No"... you're talking out your arse again. How typical of you wu mao ChiNAZI's!
They think they are God can abuse their power as and when they like
Beijing seeks justice for NSA hacking activity, you dream about it till the next century and be realistic about it. One thing, that can prevent NSA hacking is to develop your own Operating System, application software, and network protocol layer or ISO layers that need customization. Otherwise, intensify your security audit and isolate highly sensitive data from the Internet.
You have missed out one crucial element and that is God. The One True God Who created heaven and earth and everything that is in it already prophesied almost 2000 years ago that He will use China to destroy the Great Harlot ie US!! What He said MUST be accomplished. He is God!!
@@lilyinthevalley8046 This is certainly one of the dumbest comments I have ever seen on the internet.
@@lilyinthevalley8046 Boy, you read the Bible wrong. Stop reading it upside down.
@@lilyinthevalley8046 In the Book of Revelations, there is a Kingdom of the East that fights in the last battle of Armageddon, trying to prevents Christ's return. They are not a force of good. Some have wondered if it's Russia or China, or something else. Many have said it is China. 666 is the Mark of the Beast, it is also a lucky number in China.
@@lilyinthevalley8046 the moment when you declare that you are a brother of jesus
US is desperate now.
They should start to swallow their pride.
Hey guys, can you sort out your audio, it's so quiet, I can barely hear Liu Xin talking.
Agree. CGTN needs to have higher volume throughout.
UA-cam is an American mouthpiece.
What was the difference between United Nations and League of Nations 🏴🇺🇲
@@onlineempire4204 one was not successful, the other still exists today, purely as a western tool, as can be seen in today's political climate. There is same principle, or so it was envisioned like that, to stop wars, well guess what, UN hasn't managed to stop war IN Syria, or the illegal invasion of Syria or even Iraq or Ukraine, you know why that is? Because USA 🇺🇸 supercedes UN power, so what this represents is one country, dictating to the rest of the world using UN rules, international laws, as a smokescreen to further US geopolitical agenda of circling certain countries the US perceives as its self created enemy. Despite the fact that global south countries around the world, do NOT respect or adhere to unilateral decisions made in Washington, further pressured by international organisations such as UN. No country is above international law, it seems that USA 🇺🇸 seems to think International Law doesn't apply to them, yet expects every other country to follow international law? This is why many countries don't trust the 🇺🇸 government & rubbish media propaganda anymore.
The question is why China did not know until 1000 hacking has been done.
what is China going to do to prevent future hacking. Especially on NEW Technology.
These kind of activity often requires a mole on your side
Thank god for the great firewall of china
When we do it, it's call probing...
How d tables hv turned…
The suspicious mind has neither limits or moral.
Why is the sound so low ?
i hope china Will start to celebrating because their tech know how has been mature since their nemesis start look for hint and how to carrect thier error.
USA does all this , is why is USA trying to extradite SNOWDEN ?
누구보다도 미국은 중국을 두려워한다.
They should. You are better than us.
@Kanaba Nakamura Everyone has google translate, but fine lmao
@Kanaba Nakamura Oh, are you saying that, because I assumed he was Chinese? If so all the Asian's are just better. It really hardly matters what tribe they are apart of, or identify as. lol
그들은해야. 당신은 우리보다 낫다.
@Kanaba Nakamura even though i am korean, i would say that america is scared of china
They have been doing all the time. No proper UN laws enforcement
Empire of criminals.
They trying really hard to learn that secret chinese recipe XD
@Dark Cloud 🤣
Ancestral char siu recipe.
NSA will needs Google Translate help in the translation. Lol
Shameful Americana acts👎
Don't keep the volume so low dammit, I can't hear anything
Liu Xin 👏👏👏👍👍👍
Shame on the NSA.
Why? Because Uncle Sam is red-eyed on this university's science and technology achievements and it wants to steal them.
the volume is too low
Why 1000 times?
Dang, I doubt it was anything but pure lazy. Have only one charge code? It caught their attention. Send a bill for toutition. Thanks for educating NSA.
Seems you need to add security protocols for security penetration, I'd suggest a closed computer system where you have to fetch in fresh science articles from usb memmory, clean/new usb stick every time and then recycle the old ones, bit of a bother ofcourse but seems completely necessary.
I'm sure Chinese computer techs are more than up to the task of shielding such sensitive data. China does NOT have to use the same servers as U$A especially in an enclosed environment of a school. It can have it's own local system. I agree with your tech guest that Chinese have been aware of this activity for a long time. Bringing this subject to light on the world scene is of great importance in the global media "war."
Can you trust Google, Microsoft, 4G and chips from the US ?
Beri tikus dgn umpan beracun dapat menjadi terapi.
All the moon footage you hide, all the UFO research you do, is there's. Simply put. Just do us a favor and reveal it before its too late.
Is David Auerbach under drugs?
technology.
Good signs! The Best brains have gone frigid!
China should sanction both the US organisations and individuals involved, following the US example. And China should publicly announce the names of these organisations and individuals.
They probably didn't leave a business card
NSA has no idea what they are stealing. It is all in Chinese. Thye just save it to their huge disc data system and don't know what to do with them. Hiring Chinese to translate 150 GB of file? Crazy.
Hacked 1000 times explain how you allowed that to happen UNNOTICED otherwise they would not have been able to steal so much.
Space travel is very unclear exploration is a mystry. The Space program must stay with the State A Ministry of Space of China.. What can be gained from Space Travel?
What I learned is that in IT world evil can rapidly turn into good and good to evil. It would be irresponsible if China has the opportunity to do the same and choose not to, as well as U.S does. I name it prevention. Protocols and rules work just for everyone's stakeholder but at those levels things are critical
Here is what you do my dear chinese compatriots, you have your original data request ( fetching of data modelling programs, studies e,tc )
you download that in a quarantine ( emulated OS ) then you develop a program which can translate the program data where malicious code doesnt translate into the end program ( by having the end user programmed custom tailored to only translate the end user data ( the things that scientist use ) and scramble the backend ( this software you must protect the most from capturing / source code decoding ) then you translate the data in the quarantine and export it to the researchers ) ( even if having damaging code it can not be utilized when translated to your new software suite ( even if it has administrative privlege )
Then you simple need to control the access to this software suits source code by highest military security protocol ( say a 5000 digit key for brute forcing ) and a good overwatch for the code keepers.
This is how you secure the networks.
Always boot intake in quarantine, observe sensitive networks for injections, keep an active quarantine zone if you are plugging in the quarantine PCs into the ethernet or rather use physical transfer with portable drives.
Other possibility is 1 way input way where you backup the system everytime before you plug in a data channel (usb / manual drive )with no access to the internet at all. ( closed circuit traffic is okay ofcourse )
So you can easily refresh the entire data systems if corruption is detected.
But i prefer this custom tailored software suite for user comfortability.
Also probably militarily secure every research facility and have manual code reviewers for important technology.
Best wishes, D.
I’d take it as a compliment for the Chinese side to be honest.
❤❤❤❤❤
Long love Russia and China as napoleon said China guite hope they don’t waken up Russia defeated him and Hitler
From military mission their is a alien on Earth in Africa... This Alien has been seen by others yet not confined. This Alien resembles preditor"
Your voice is too quiet.
H * : Better buy Huawei mobile 😂am using it have broken my room wall now its ok as I had got it repaired from Huawei service center for free big job 😉.
VIVA CHINA
The guest is half a sleep.
China must not make the same mistake of being soft like Russia in Ukraine if it decides to take Taiwan by force.
Turn Taiwan into the Mariupol steel factory after Russia was done with it before landing Chinese troops in Taiwan.
Chinese should never humiliate ourself by killing our own. However no mercy shall be spared for the traitors!
Even I question why China is bringing up the NSA.
17
🇺🇸..🤕 dolar paper toilet
Cuz pay back is a bicth😆
Just payback for Chinese hacking
make videos about the chinese cyber attack on the US and other parts of the world.
If you have that kind of information please do share.,
@@phyllisthompson4207 its in many news channel
@@dom_toredo Do you really believe "news channel". Best put them in the propaganda multiplier box.
Oh, no! Xinnie doesn't like it when other people hack into universities. Quick, give him some hunny to soothe his wounded ego.
These 五毛党 channels and the people that make comments are hilarious. Not much intelligence, but very predictable.
@Dark Cloud I got news for you, I'm Native American. I have a Spanish last name because I am also of Spanish heritage. I'm not sure what gringo you are talking about, but I suppose you mean anyone not Chinese. I know I work with some Mexican, I would ask them if I maybe cared.
I know the interviewer thinks she’s speaks english, she doesn’t. some incoherent word salad framed as a question. she starts a question from one angle and by the end it’s completely about something else
Well, English might not be her first language. So what?
Obviously they got it, because they respond appropriately. While you are at it, It would be “ interviewer” not the interview “
I think it’s your hearing! She is very concise, and has been asking direct questions from start to finish.
@@phyllisthompson4207 thanks, sweeping on phone issue. no they answered something, as guests normally wouldn’t point it out of it’s toward them. you can listen for yourself.
How racist can you be? I bet her English is much better than yours. I don’t see or hear any problems with her English. Go take a hike.
Propaganda of ccp .