top of page

Cerca


The Hidden Vulnerability: Sabotage and Exploitation in the Semiconductor Supply Chain and China's Role
In the digital age, semiconductors are far more than mere electronic components; they are the lifeblood of our modern civilization....

Gabriele Iuvinale
1 giorno faTempo di lettura: 9 min
8 visualizzazioni
0 commenti


Privacy Alarm: Chinese VPN Apps Still Lurking in Apple and Google Stores, User Data at Risk
Despite more than six weeks passing since the Tech Transparency Project (TTP) first sounded the alarm, Apple and Google app stores...

Gabriele Iuvinale
2 giorni faTempo di lettura: 3 min
3 visualizzazioni
0 commenti


Unlocking the quantum secret: Military applications of Chinese QSDC networks and the geopolitical challenge for the United States - ANALYSIS
China's recent breakthroughs in Quantum Secure Direct Communication (QSDC) pose a direct risk to the United States and are a crucial...

Gabriele Iuvinale
2 giuTempo di lettura: 14 min
26 visualizzazioni
0 commenti


Smart City and IoT: The “Trojan Horses” in China's liminal war
Smart Cities and the Internet of Things (IoT) offer immense advantages but also represent a "Trojan horse" in liminal warfare , with...

Gabriele Iuvinale
1 giuTempo di lettura: 10 min
17 visualizzazioni
0 commenti


Chinese Cyber Power: When Technology Becomes the Key to Global Power
The world is in a technological revolution , where data is the new gold. China is fully leveraging this transformation with its "Liminal...

Gabriele Iuvinale
1 giuTempo di lettura: 8 min
4 visualizzazioni
0 commenti


Is the future of biotechnology Chinese? Biological warfare risks and global security - Report
This article analyzes China's unstoppable ascent as a leading power in biotechnology, a sector that, thanks to its deep integration with...

Gabriele Iuvinale
29 magTempo di lettura: 21 min
21 visualizzazioni
0 commenti


From Prague to the West: How China’s Cyber Espionage Fuels a Global Threat - Report
Key Points The Growing Threat of Cyber Espionage Cyber espionage is a critical global security challenge, targeting governments,...

Gabriele Iuvinale
28 magTempo di lettura: 8 min
7 visualizzazioni
0 commenti


The AI Revolution: How Xi Jinping Is Changing the Rules of the Game - Report
Key Points Chinese Strategy on AI: China focuses on the practical application of AI to solve concrete problems such as economic growth...

Gabriele Iuvinale
27 magTempo di lettura: 7 min
5 visualizzazioni
0 commenti


The Battle of the Satellite Systems: How BeiDou Is Revolutionizing Global Geopolitics, from Sino-Russian Cooperation to Use in the India-Pakistan War - Report
Introduction This report explores the evolution and strategic importance of global satellite navigation systems, with a special focus on...

Gabriele Iuvinale
26 magTempo di lettura: 19 min
10 visualizzazioni
0 commenti


China’s Quest for Global Dominance in Next-Generation Information Technologies and Electronic Warfare - Analysis
Key points Chinese Technological Leadership : China is a global leader in sectors such as 5G, drones, Internet of Things, mobile...

Gabriele Iuvinale
24 magTempo di lettura: 5 min
14 visualizzazioni
0 commenti


Submarine cables: the Chinese threat and the vulnerability of the European Union
KEY POINTS Submarine fiber optic cables are essential for global connectivity, handling 99% of the world’s digital communications and...

Gabriele Iuvinale
23 magTempo di lettura: 4 min
7 visualizzazioni
0 commenti


Trump and the difficult balance between geoeconomics, national security, and economic freedom. The Nvidia case could be the litmus test
KEY TAKEAWAYS Last month, Jensen Huang, head of Nvidia, sent a clear message to the Trump administration: the company that produces the...

Gabriele Iuvinale
9 magTempo di lettura: 13 min
23 visualizzazioni
0 commenti


National Security, Chinese solar power poses serious risk of cyber-sabotage
The European Solar Manufacturing Council, the association representing the continent's solar power manufacturers, has issued a serious...

Gabriele Iuvinale
5 magTempo di lettura: 7 min
82 visualizzazioni
0 commenti


All U.S. AI data centers “are almost certainly infiltrated by the CCP” - Report
Artificial intelligence (AI) built by private laboratories to store sensitive U.S. national security information is in danger of being...

Gabriele Iuvinale
24 aprTempo di lettura: 5 min
169 visualizzazioni
0 commenti


China revamps university education by incorporating AI
China revealed on Tuesday plans to revamp its undergraduate education by incorporating Artificial Intelligence (AI). The Ministry of...

Gabriele Iuvinale
22 aprTempo di lettura: 1 min
2 visualizzazioni
0 commenti


Combat application of generative artificial intelligence and new trends in the evolution of modern warfare in studies of the Chinese People's Liberation Army
by Nicola and Gabriele Iuvinale Abstract The first part of this research concerns The combat application of generative artificial...
Nicola Iuvinale
10 aprTempo di lettura: 12 min
7 visualizzazioni
0 commenti


End-to-end encryption: obstacle or pillar of national security?
Key takeaways In the face of rising cybercrime, end-to-end encryption has become a point of tension between the protection of secrets,...

Gabriele Iuvinale
8 aprTempo di lettura: 5 min
3 visualizzazioni
0 commenti


Chinese cyber espionage: the invisible war threatening the West
The Chinese government coordinates cyber espionage operations through intelligence agencies and private contractors. Attacks target...

Gabriele Iuvinale
3 aprTempo di lettura: 10 min
30 visualizzazioni
0 commenti


China built hundreds of AI data centers to catch the AI boom. Now many stand unused - MIT
Many of China’s AI datacenters, built out to support the country’s AI boom, stand unused, according to the MIT Technology Review . In...

Gabriele Iuvinale
2 aprTempo di lettura: 2 min
9 visualizzazioni
0 commenti


Quantum communication: the “unbreakable” satellite network from China to South Africa - Analysis
A team of Chinese and South African scientists has made the world's longest quantum satellite link, marking a milestone in secure...

Gabriele Iuvinale
2 aprTempo di lettura: 5 min
1 visualizzazione
0 commenti
bottom of page