laitimes

Control the computer host, implant the website Trojan: smear the "Matrix" that cannot be washed away by the stolen goods

On March 22, 360 Government and Enterprise Security Group released a technical report

A complete disclosure of the NSA

Representative cyber weapons used against targets in China —

Quantum attack platform

Control the computer host, implant the website Trojan: smear the "Matrix" that cannot be washed away by the stolen goods

(Image source: 360 government and enterprise security WeChat public account)

Earlier this month 360 publicly disclosed the NSA

More than a decade of attacks have been waged against the world

China is one of the key targets

China's National Internet Emergency Response Center recently monitored the discovery

Since late February

China's Internet continues to suffer cyberattacks from foreign organizations

It controls computers in China through attacks

This in turn carried out cyber attacks against Russia, Ukraine and Belarus

After analysis, these attack sites are mainly from the United States

A series of data cases illustrate again

America is the real "Matrix"

it is the greatest threat to global cybersecurity

Long

The United States violates international law and basic norms governing international relations

For foreign governments businesses and individuals

Implement large-scale organized, undifferentiated network eavesdropping surveillance and attacks

Its eavesdropping targets include both competitors and allies

From "WikiLeaks" to "Snowden Incident"

From the "Swiss encryption machine incident" to the use of third-country intelligence agencies to steal information on European heads of state

From "Equation Organization" to "Echelon System"

The bad behavior of the US side has repeatedly refreshed the world's understanding of its bottom line

According to WikiLeaks founder Assange

The United States has developed more than 2,000 types of cyber weapons

It is the world's number one cyberweapon power

Control the computer host, implant the website Trojan: smear the "Matrix" that cannot be washed away by the stolen goods

(Image source: People's Vision)

Such a big swindler

In recent years, it has been under the banner of "clean network"

Claims to maintain international cyber security

This fully exposes that the United States is false in maintaining network security

It's true to suppress competitors

Keeping allies safe is false

Maintaining one's own hegemony is true

Double standards and "thieves shout to catch thieves" in the field of cybersecurity

It is a consistent trick of the United States

The image of the victim has been repeatedly misled by the international community

Trying to dominate the international agenda on cybersecurity

Control the computer host, implant the website Trojan: smear the "Matrix" that cannot be washed away by the stolen goods

March 8

A U.S. cybersecurity company released a report claiming

A hacking group backed by the Chinese government

Incursions into the United States over the past 10 months

Computer networks of at least 6 state governments

U.S. Agency for Cybersecurity and Infrastructure Security and the Federal Bureau of Investigation

In a separate report, it said

The scope of these Chinese hacks includes agencies such as health, transportation, and law

however

Two reports on so-called "Chinese support"

There is no evidence at all

It's purely out of nothing, upside down black and white

It is purely politically motivated to smear and spread rumors

One collects nearly 5 billion mobile phone records from around the globe every day

Snooping on former German Chancellor Angela Merkel's phone for more than a decade

It controls more than 3 million computer hosts in China every year

Countries that have implanted Trojan horses into more than 3,600 websites in China

There is still no credibility to speak of

What qualifications and confidence to blame others

The Chinese side is open and frank in safeguarding network security

The Chinese government has always been resolute in safeguarding network security

Resolutely oppose and combat any form of cyberattack

There will be no encouragement or connivance for hacking attacks

This position is consistent and clear

China stands for it

All parties should be based on mutual respect

Strengthen communication

Maintaining network security through dialogue and cooperation

September 2020

China Launches Global Data Security Initiative

Control the computer host, implant the website Trojan: smear the "Matrix" that cannot be washed away by the stolen goods

(Source: Xinhua Net)

The countries of the initiative oppose the use of information technology

Destroy critical infrastructure in other countries or steal important data

Oppose the misuse of information technology to engage in mass surveillance against other countries

Illegal collection of personal information of citizens of other countries, etc

To explore and develop global digital governance rules with countries

China's contribution has been made

Cyberspace is the common home of mankind

Cyberattacks are a common threat facing the world

The U.S. policy is to steal secrets and attacks on China and the world's network

It will only create tension and hostility in global cyberspace

Affect the normal cooperation of countries in this field

No matter how much the United States smears others, it will frame them

Nor can it wash away the fact that it is "The Matrix"

Author: Lan Linzong

Source: Website of the Central Commission for Discipline Inspection and the State Supervision Commission

Read on