top of page

Cerca


The PLA's Robotic Revolution: Humanoids on Tomorrow's Battlefield
Abstract This article explores the People's Liberation Army's (PLA) strategic vision for integrating humanoid robots into future...
Nicola Iuvinale
10 lugTempo di lettura: 14 min


From Laboratories to PLA: The Dangerous Links of Chinese AI and Western Unconsciousness
Western companies, including financial giants such as HSBC and Standard Chartered, industrial players such as Saudi Aramco, and even...

Gabriele Iuvinale
3 lugTempo di lettura: 10 min


Stolen Secrets, Eluded Sanctions: U.S. Accusations of Huawei and Global Risks
Extrema Ratio reviewed the federal prosecution record, revealing the legal vulnerabilities and strategic implications of unprecedented...

Gabriele Iuvinale
2 lugTempo di lettura: 19 min


CHINESE DIGITAL AGGRESSION IS NO LONGER TOLERABLE: HOUKEN ROOTKITS UNVEIL BEIJING'S LIMINAL WARFARE STRATEGY
Key Takeaways Aggressive State-Sponsored Cyber Operations: The Chinese state is actively engaged in a persistent and incremental...

Gabriele Iuvinale
2 lugTempo di lettura: 14 min


Western Technology and Chinese Ambitions: Where is the Boundary? The Oracle-TikTok Alliance Question
The partnership between Oracle and ByteDance , highlighted by the new SemiAnalysis report, drives AI growth but raises serious national...

Gabriele Iuvinale
30 giuTempo di lettura: 14 min


Temu Under Accuse: U.S. and EU Denounce Espionage, Fraud and Forced Labor in the Chinese Empire of Cheap
Extrema Ratio has conducted an in-depth analysis of the documentation revealing the complex legal and geopolitical challenges...

Gabriele Iuvinale
28 giuTempo di lettura: 14 min


The Price of Chinese Wind: European Competitiveness and Strategic Risks in the Rise of Ming Yang
Key Points Aggressive Expansion in Critical Sectors: Chinese wind giant Ming Yang Smart Energy has entered the European market starting...

Gabriele Iuvinale
27 giuTempo di lettura: 18 min


The Chinese PLA's New Playbook. Beyond the Bomb: How Severe Deterrence Aims to Paralyze the Enemy Nation
Abstract This article analyzes the strategic concept of "Severe Deterrence" as a doctrinal innovation designed to overcome the...
Nicola Iuvinale
27 giuTempo di lettura: 7 min


Crypto-Analytical Threat: China's Quantum Advancement and the Challenge for Western Intelligence - Analysis
Key points China's Quantum Rise and Crypto-Analytical Threat: China is making rapid progress in quantum computing, with the potential to...

Gabriele Iuvinale
25 giuTempo di lettura: 12 min


From Canadian networks to Europe: the Chinese cyber threat extends - Analysis
Introduction Rising geopolitical tensions are manifesting themselves in an escalation of activity in the “gray zone” of cyberspace, with...

Gabriele Iuvinale
24 giuTempo di lettura: 21 min


US: DeepSeek under scrutiny for intelligence support and chip acquisition strategies
The technological war between the United States and China has a new chapter, with serious accusations from Washington against DeepSeek ,...

Gabriele Iuvinale
23 giuTempo di lettura: 4 min


China Behind “LapDogs”: How ORB Networks Are Redefining Cyberespionage Against the U.S. and Asia
SecurityScorecard has issued a warning about a sophisticated cyber espionage campaign, dubbed "LapDogs," which utilizes an Operational...

Gabriele Iuvinale
23 giuTempo di lettura: 2 min


Open Software, Closed Strategy: China and the Open Source Paradox
The open-source software ecosystem, built on sharing and collaboration, has long been a cornerstone of the global digital economy. For...

Gabriele Iuvinale
19 giuTempo di lettura: 5 min


China Spies on America, From Health Data to Energy: Florida's Offensive Against Contec Reveals Systemic Risk
Tallahassee, Florida – A wave of concern is sweeping across the United States, fueled by revelations painting an alarming picture of how...

Gabriele Iuvinale
17 giuTempo di lettura: 5 min


The Hidden Vulnerability: Sabotage and Exploitation in the Semiconductor Supply Chain and China's Role
In the digital age, semiconductors are far more than mere electronic components; they are the lifeblood of our modern civilization....

Gabriele Iuvinale
13 giuTempo di lettura: 9 min


Privacy Alarm: Chinese VPN Apps Still Lurking in Apple and Google Stores, User Data at Risk
Despite more than six weeks passing since the Tech Transparency Project (TTP) first sounded the alarm, Apple and Google app stores...

Gabriele Iuvinale
12 giuTempo di lettura: 3 min


Unlocking the quantum secret: Military applications of Chinese QSDC networks and the geopolitical challenge for the United States - ANALYSIS
China's recent breakthroughs in Quantum Secure Direct Communication (QSDC) pose a direct risk to the United States and are a crucial...

Gabriele Iuvinale
2 giuTempo di lettura: 14 min


Smart City and IoT: The “Trojan Horses” in China's liminal war
Smart Cities and the Internet of Things (IoT) offer immense advantages but also represent a "Trojan horse" in liminal warfare , with...

Gabriele Iuvinale
1 giuTempo di lettura: 10 min


Chinese Cyber Power: When Technology Becomes the Key to Global Power
The world is in a technological revolution , where data is the new gold. China is fully leveraging this transformation with its "Liminal...

Gabriele Iuvinale
1 giuTempo di lettura: 8 min


Is the future of biotechnology Chinese? Biological warfare risks and global security - Report
This article analyzes China's unstoppable ascent as a leading power in biotechnology, a sector that, thanks to its deep integration with...

Gabriele Iuvinale
29 magTempo di lettura: 21 min
bottom of page