Chinese online retailer JD.com has beaten Amazon to the next stage of the shopping revolution by announcing plans to open hundreds of "unmanned" convenience stores. The shops have already been trialled with JD's 10,000 employees at headquarters in Beijing and use facial and recognition technology to register payment and product identity, meaning that customers do not have to wait in a checkout line.
JD explained that cameras on the ceilings of the stores can recognize customers’ movement and generate heat maps of their activity to monitor customer traffic flow, product selection and customer preferences, which helps store owners to stock efficiently.Read more
It took Chinese authorities just seven minutes to locate and apprehend BBC reporter John Sudworth using its powerful network of CCTV camera and facial recognition technology. This wasn’t a case of a member of the media being forcibly removed from the country.
The chase was a stunt set up to illustrate just how powerful and effective the Chinese government’s surveillance system can be. It’s a stark example of the type of monitoring that China has invested heavily in over recent years with the aim of helping police do their job more efficiently. Such systems are also used in private organizations, for example to monitor workers and processes in factories.Read more
D.J.I., the popular drone maker, stands as a symbol of China’s growing technology prowess. Its propeller-powered machines dominate global markets and buzz regularly over beaches, cityscapes at sunset and increasingly, power plants and government installations.
Now D.J.I. is fighting a claim by one United States government office that its commercial drones and software may be sending sensitive information about American infrastructure back to China, in the latest clash over the power of data in the growing technological rivalry between the two countries.Read more
If you’ve seen the TV series "Person of Interest," then you might recall that during the opening narration from Season One, Harold Finch would say, “You are being watched. The government has a secret system, a machine that spies on you every hour of every day. I know because I built it. I designed the machine to detect acts of terror but it sees everything.”
I was reminded of that when I saw a GIF that appears as if it could be a Chinese version of the show. It is a CCTV clip showing current surveillance in China. Thanks to artificial intelligence, China’s sadly named “Sky Net” system demonstrates just how creepy real-time surveillance can be.Read more
China plans to ban trading of bitcoin and other virtual currencies on domestic exchanges, dealing another blow to the $150 billion cryptocurrency market after the country outlawed initial coin offerings last week.
The ban will only apply to trading of cryptocurrencies on exchanges, according to people familiar with the matter, who asked not to be named because the information is private. Authorities don’t have plans to stop over-the-counter transactions, the people said. China’s central bank said it couldn’t immediately comment. Bitcoin slumped on Friday after Caixin magazine reported China’s plans, capping the virtual currency’s biggest weekly retreat in nearly two months.Read more
China's new cybersecurity law will enable its government to discover potential security vulnerabilities of any company doing business in the country, threat intelligence firm Recorded Future warns.
The law grants the China Information Technology Evaluation Center, an office in the Ministry of State Security, the power to request source code and other intellectual property of tech suppliers operating in the country. Information gleaned might easily be exploited by CNITSEC in furtherance of its intelligence operations. Director of strategic threat development at the firm reckons the measures place companies between a rock and a hard place.Read more
More bad news for folks in China. Chinese internet users will no longer be able to post comments online anonymously as of Oct. 1. The new ruling is the latest in the government's move to tighten control over internet usage in the country.
Sites like social networks and discussion forums will have to verify the real identities of registered users before they can be allowed to post anything on their platforms. Comments on news stories will also have to be reviewed by the website before they can appear online. For example, Zhihu, a Quora-like discussion site, has already started asking users to verify their identities.Read more
China has launched a digital "cyber-court" to help deal with a rise in the number of internet-related claims.
The Hangzhou Internet Court opened on Friday and heard its first case - a copyright infringement dispute between an online writer and a web company. Legal agents in Hangzhou and Beijing accessed the court via their computers and the trial lasted 20 minutes. The court's focus will be civil cases, including online shopping disputes. Judges were sworn in and the first case was presented on a large screen in the courtroom. Defendants and plaintiffs appear before the judge not in person, but via video-chat.Read more
China has demonstrated a world first by sending data over long distances using satellites which is potentially unhackable, laying the basis for next generation encryption based on so-called "quantum cryptography."
Last August, China launched a quantum satellite into space, a move which was called a "notable advance" by the Pentagon. Using this satellite, Chinese researchers at the Quantum Experiments at Space Scale project, were able to transmit secret messages from space to Earth at a further distance than ever before. The technology is called quantum key distribution. Typical encryption relies on traditional mathematics.Read more
We could be just five years away from a space-based quantum communication network. We are dependent on digital tools for almost every aspect of our daily lives, which means we also rely on two fundamental technologies: satellites and encryption.
Satellites are used for everything from GPS to television to processing credit card data, and encryption protocols are integral not only to communicating with these satellites, but also for matters as private as personal medical records, or as mundane as texting your friends. The problem is that the advent of quantum computing threatens to render current methods of encryption obsolete.Read more