Technical infiltration by foreign spy devices goes far beyond the battle over NVIDIA chips.

The H20 chip, specially provided by NVIDIA for China, has been exposed to "backdoor" risks, and the National Internet Information Office has already held talks with the company. This chip, which significantly reduces computing power and bandwidth, actually lowers the threshold for the U.S. to implant monitoring programs. Its buyers include top AI companies and research institutions in China. If the vulnerabilities are not fixed, it could become a potential risk for monitoring China's AI industry and crippling computing infrastructure.

Similar infiltrations have precedents. For years, the U.S. Central Intelligence Agency (CIA) has used consumer electronics to establish its presence, such as monitoring iPhones through pre-installed programs and controlling Mac devices with cracking tools, even after system reinstallation, these cannot be removed.

The U.S. is also ruthless toward its allies. The Snowden incident revealed that it monitored leaders of 35 countries, and French former Prime Minister Fillon and other officials have confirmed that they were under long-term surveillance. For China, the risk of using hardware controlled by the U.S. in confidential units is extremely high.

Daily necessities have also become carriers for infiltration. Some power banks have been equipped with chips or implanted with malicious code, and are distributed around government agencies and universities. When charging, they steal user information, and even continuously eavesdrop and spy. Stolen data can also be matched with information from internet platforms for intelligence or dark web transactions.

These seemingly scattered data theft actions are actually fundamental to national security. When key data stolen by foreign forces is accumulated into a chain, from personal information and commercial secrets to scientific research achievements and government information, they may all become weapons threatening national interests. The battle for data security is never just an isolated technical confrontation, but an invisible battlefield concerning national sovereignty and development. Strengthening the information security defense line has become an essential question for safeguarding national security.

Original article: https://www.toutiao.com/article/1839267607581835/

Statement: The article represents the views of the author.