
It very clearly states that there were no exploits; the researchers stumbled across the undeployed C&C suite.

It very clearly states that there were no exploits; the researchers stumbled across the undeployed C&C suite.

Have you looked at the files? They were obviously generated in a Chinese-affiliated development environment, and the interface is designed for Chinese speakers. Which is exactly what they said. They very pointedly DIDN’T say that the malware was written by the Chinese government or one of their affiliates.
It’s also not in the same style as the stuff generated by the various Chinese APT groups, so is likely by some third party with Chinese connections. It’s a very methodical and thorough collection, but it wasn’t discovered via an attack — the researchers stumbled across the test environment. And that’s not something that’s likely to be the case with state actor-related groups.

Considering Dan isn’t a bot and responds to comments in the forum, I suspect you have no clue what you’re talking about.
The sourced research he cites is also not AI generated.

Meanwhile, they just started publicizing their own e2e encrypted chatbot.

I say relentless Jensen Huang is hurting society and has “done a lot of damage.”

How that MIGHT change things?
Just look at every other tech company in the space that’s gone public to see how it WILL change things. It’s not a mystery at this point.
And let’s not forget HEIF and JPEG-2000.