HOME
*





Shanghai National Police Database
The Shanghai police database leak refers to the unauthorized disclosure of sensitive personal information and police case data from the Shanghai National Police Database, also known as the SHGA Database, in early July 2022. The leaked data, totaling over 23 terabytes, includes details of more than one billion Chinese residents, encompassing names, addresses, birthplaces, resident ID card numbers, phone numbers, photos, mobile phone numbers, and information on criminal cases. The data was made available for sale on the internet by an unidentified hacker, who demanded a price of 10 bitcoins. The origin of the leaked information is believed to be the Shanghai Public Security Bureau, although this has not been officially confirmed. Screenshots shared online revealed a vast amount of intricate police information, such as the time of reporting criminals, the contact numbers of reporting individuals, and the reasons for reporting. Notably, initial analysis indicated that the personal data ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Byte
The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit of memory in many computer architectures. To disambiguate arbitrarily sized bytes from the common 8-bit definition, network protocol documents such as The Internet Protocol () refer to an 8-bit byte as an octet. Those bits in an octet are usually counted with numbering from 0 to 7 or 7 to 0 depending on the bit endianness. The first bit is number 0, making the eighth bit number 7. The size of the byte has historically been hardware-dependent and no definitive standards existed that mandated the size. Sizes from 1 to 48 bits have been used. The six-bit character code was an often-used implementation in early encoding systems, and computers using six-bit and nine-bit bytes were common in the 1960s. These systems often had memory wo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


China
China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and Borders of China, borders fourteen countries by land, the List of countries and territories by land borders, most of any country in the world, tied with Russia. Covering an area of approximately , it is the world's third List of countries and dependencies by area, largest country by total land area. The country consists of 22 provinces of China, provinces, five autonomous regions of China, autonomous regions, four direct-administered municipalities of China, municipalities, and two special administrative regions of China, Special Administrative Regions (Hong Kong and Macau). The national capital is Beijing, and the List of cities in China by population, most populous cit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

2022 In China
Events in the year 2022 in China. Incumbents Paramount leader Head of state Head of government National legislature Political advisory Supervision commission Communist Party secretaries Governors Events January–March * 9 January – Tianjin begins city-wide COVID-19 testing for 14 million people after 20 children and adults tested positive for COVID-19, two of whom were infected with the SARS-CoV-2 Omicron variant. * 4–20 February – 2022 Winter Olympics * 1 March: ** 2022 Shanghai COVID-19 outbreak ** A new online religion management law enforced: People and organization no longer allowed to spread religious ideas in the internet unless they are authorized by the government. The law was passed in December 2021 and went into force on 1 March 2022. ** 90th anniversary of establishment of Manchukuo * 4–13 March – 2022 Winter Paralympics * 21 March – China Eastern Airlines Flight 5735 descended steeply mid–flight and struck the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


List Of Data Breaches
This is a list of data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30,000 or more records, although many smaller breaches occur continually. Breaches of large organizations where the number of records is still unknown are also listed. In addition, the various methods used in the breaches are listed, with hacking being the most common. Most reported breaches are in North America, at least in part because of relatively strict disclosure laws in North American countries. It is estimated that the average cost of a data breach will be over $150 million by 2020, with the global annual cost forecast to be $2.1 trillion."Data Breach Industry For ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Health Code
Health Code (Chinese name: 健康码) is a type of application used during COVID-19 in mainland China. It is used as an e-passport that reports if the user has been in an area with current cases of infection. An applicant provides information such as travel history, residence, and medical records. The application will then generate a QR code that identifies the individual's risk level as red, yellow, or green. As of April 2020, over 200 cities and 20 provinces employed health code supported by Alipay. There are a wide range of health codes run by different localities. History On February 7, 2020, the COVID-19 outbreak was reignited when the winter break was over. Zhou Jiangyong, a government officer in Hangzhou, suggested the issuance of a Health Code. On February 9, Shenzhen was the first city to promote Health Code. On February 11, Alibaba cooperated with Hangzhou city government with devising the application. As of February 15, the coverage enlarged to Hangzhou, Ningbo, Wen ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Mass Surveillance In China
Mass surveillance in the People's Republic of China (PRC) is the network of monitoring systems used by the Chinese central government to monitor Chinese citizens. It is primarily conducted through the government, although corporate surveillance in connection with the Chinese government has been reported to occur. China monitors its citizens through internet, camera as well as through other digital technologies. It has become increasingly widespread and grown in sophistication under General Secretary of the Chinese Communist Party (CCP) Xi Jinping's administration. Background Mass surveillance has significantly expanded under the PRC Cybersecurity Law (2016) and with the help of local companies like Tencent, Dahua Technology, Hikvision, SenseTime, ByteDance, Megvii, Huawei and ZTE, among many others. As of 2019, it is estimated that 200 million monitoring CCTV cameras of the "Skynet" system have been put to use in mainland China, four times the number of surveillance cam ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Data Breach
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice ( black hats), organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak". Data breaches may involve financial information such as credit card and debit card details, bank details, personal health infor ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Vinny Troia
Vincenzo Troia is an American ethical hacker and cybersecurity researcher who is known for reporting and identifying the Dark Overlord (hacker group) and hacker PomPompurin, who was involved in the 2021 FBI email hacking. He is also known for discovering the Shanghai police database leak in 2022. Vinny also serves as CEO and principal security researcher at Night Lion Security, a cyber-security firm based in the US and founded a threat intelligence firm named Shadowbyte. In 2018, he found a data leak of nearly 340 million detailed records about individual people available on a publicly accessible server of Exactis. In 2019, he found a data breach in People Data Labs where records of personal data, including email addresses, employers, locations, job titles, names, phone numbers and social media profiles of 1.2 billion people were exposed. In 2020, Troia identified and wrote a report on an entire underground cybercrime economy built on the stealing of reselling of video game ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Xinjiang Internment Camps
The Xinjiang internment camps, officially called vocational education and training centers ( zh, 职业技能教育培训中心, Zhíyè jìnéng jiàoyù péixùn zhōngxīn) by the government of China, are internment camps operated by the government of Xinjiang and the Chinese Communist Party Provincial Standing Committee. Human Rights Watch says that they have been used to indoctrinate Uyghurs and other Muslims since 2017 as part of a " people's war on terror", a policy announced in 2014. The camps have been criticized by the governments of many countries and human rights organizations for alleged human rights abuses, including mistreatment, rape, and torture, with some of them alleging genocide. Some 40 countries around the world have called on China to respect the human rights of the Uyghur community, including countries such as Canada, Germany, Turkey, Honduras and Japan. The governments of more than 35 countries have expressed support for China's government. The ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Xinjiang Police Files
The Xinjiang Police Files are leaked documents from the Xinjiang internment camps, forwarded to anthropologist Adrian Zenz from an anonymous source. On May 24, 2022, an international consortium of 14 media groups published information about the files, which consist of over 10 gigabytes of speeches, images, spreadsheets and protocols dating back to 2018. The Xinjiang Police Files were published at the same time as the UN Human Rights Commissioner Michelle Bachelet started her visit to China on May 23. Her briefing included exploring the situation of the Uyghurs in Xinjiang as part of the visit. Background According to estimates by U.N. and U.S. officials, one million Uyghurs and other Turkic groups were held in Chinese government camps in 2018. The existence of China's "re-education" and an extrajudicial program for mass detention were first detected in satellite photos, and testimonies from Uyghur refugees. The documents of the leak were collected during the mass detention p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Chinese Communist Party
The Chinese Communist Party (CCP), officially the Communist Party of China (CPC), is the founding and sole ruling party of the People's Republic of China (PRC). Under the leadership of Mao Zedong, the CCP emerged victorious in the Chinese Civil War against the Kuomintang, and, in 1949, Mao proclaimed the establishment of the People's Republic of China. Since then, the CCP has governed China with eight smaller parties within its United Front and has sole control over the People's Liberation Army (PLA). Each successive leader of the CCP has added their own theories to the party's constitution, which outlines the ideological beliefs of the party, collectively referred to as socialism with Chinese characteristics. As of 2022, the CCP has more than 96 million members, making it the second largest political party by party membership in the world after India's Bharatiya Janata Party. The Chinese public generally refers to the CCP as simply "the Party". In 1921, Chen Duxiu and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]