NKRISLOT - Rasakan Sensasi Kemenangan Jackpot & Akses Mudah Via Link Login Alternatif!
NKRISLOT ⚡ Situs Slot Kakek Zeus Gacor & Link SLOT777 Paling Gampang Maxwin Hari Ini
NKRISLOT : Daftar Situs Slot777 & Slot Gacor Bet 200 Gampang Maxwin Hari Ini
NKRISLOT : Temukan Keseruan Slot Gacor & Akses Login Link Terpercaya di Sini
NKRISLOT : Link Slot Online Terbaru & Slot Gacor Minimal Bet 200 Termurah Di Indonesia
NKRISLOT | Situs Slot Gacor Terbaru & Link SLOT777 Server Jepang Terpercaya
PAKDE4D : Situs Togel Online Toto Macau Bet 100 Perak Resmi & Terpercaya
PAKDE4D | Link Alternatif Daftar & Login Bandar Togel Online Paling Keren
PAKDE4D 📍 Link Afliliasi Bandar Togel Online Terbesar Di Kawasan Kamboja
PAKDE4D : Situs Resmi Bandar Togel Online Tercepat & Terbesar #1 Se-Asia
pakde4d
pakde4d
pakde4d
January 16, 2026

How to avoid falling into China’s ‘data trap’

How to avoid falling into China’s ‘data trap’

How to avoid falling into China’s ‘data trap’

By Dr. Samantha Hoffman
26 December 2021

EXCERPT

The Chinese party-state apparatus is already using big data collection to support its efforts to shape, manage and control its global operating environment. It understands that data that seems insignificant on their own can carry enormous strategic value when aggregated. Advertisers may use data on public sentiment to sell us things we didn’t know we needed. An adversarial actor, on the other hand, might use this data to inform propaganda efforts that subvert democratic discourse on digital platforms.

The U.S. and other countries have rightly focused on the risk of malicious cyber intrusions — such as the aforementioned OPM, Marriott and United Airlines incidents that have been attributed to China-based actors — but data access needn’t be derived from a malicious intrusion or alteration in the digital supply chain. It simply requires an adversary like the Chinese state to exploit normal and legal business relationships that result in data-sharing downstream. These pathways are already developing, most visibly through mechanisms like the recently enacted Data Security Law and other state security practices in China.

READ FULL ARTICLE

About Author

Tech Crunch

Leave a Reply

Your email address will not be published. Required fields are marked *