Hacker Newsnew | past | comments | ask | show | jobs | submit | fintler's commentslogin

BYD uses slave labor.

"In the dormitories of the Jinjiang Group, the company hired by BYD to carry out the work, there were no mattresses on the beds, and the few toilets served hundreds of workers in extremely unhygienic conditions. The workers also had food stored without refrigeration.

The Brazilian Labor Prosecutor's Office (MTP) also accused the companies of withholding the workers' passports and keeping 60% of their wages; the remaining 40% would be paid in Chinese currency."

https://en.wikipedia.org/wiki/BYD_Brazil_working_conditions_...

It's hard for any company to compete with that (I hope they don't).


Tesla's factories have been responsible for deaths, systematic injury issues and wage theft - https://sites.uab.edu/humanrights/2025/03/30/human-rights-co...

Pretending BYD is winning because of Chinese labor practices alone or primarily is denial of their technological and operational prowess.


Don't get me wrong, both are pretty terrible. I'm not going to defend Tesla.

But BYD is on a whole different level with that stuff (e.g. human trafficking, suicides and the factory that collapsed and killed a bunch of people).

There's no way that being able to cut costs to that level doesn't help their bottom line.


Speaking from past experience with the DoE (I'm happy I don't need to deal with security like this anymore), there were constant and randomized checks to make sure fiber cables (they were all fiber to make it harder to tamper with and to avoid accidental RF) were fully visible (e.g. not hidden under a desk or something) and not tampered with. Also, lots of locks and doors, both electrical and mechanical. The guy at the front desk with a big gun probably helped too.


They have multiple networks. One of them is definitely airgapped (red for RD). The medium security one is protected by annoyingly strict network ACLs (yellow for ITAR). Then there's a low security one for stuff like sharepoint (green).

This article is full of nonsense and speculation.


The standard you linked literally talks about: "High Impact BES Cyber Systems with External Routable Connectivity" and "Remote Access Management" for "High Impact BES Cyber Systems". That explicitly indicates non-airgapped critical systems. Furthermore, the proscribed auditing specifically spells out "network diagrams or architecture documents" as good evidence. Obviously, that is a high level document, but I see nothing to indicate robustness against state-level actors which are a expected threat.


They already have CUDA cores in production. This is a lab that's looking for the next big thing.


Probably because they're hosting an exascale-class cluster with a bazillion GH200s. Also, they launched a new "National Security AI Office".


Not to be confused with StarTree Cloud:

https://startree.ai/products/startree-cloud


Looks interesting. Thanks for sharing.


2025/5/5 is the next square root day. The next one won't happen until 2036/6/6.

Also, the year itself is a square (45^2=2025).

If I'm calculating right, the last time this was the case was on 1936/6/6 (44^2=1936).


Classical reversible computing feels like it would be a good way to interface with a quantum computer (since it's also reversible in theory).


Quantum computation came directly out of reversible computing. Look for example at the Fredkin and Toffoli gates.


It's very similiar. The rod logic in diamond age (Eric Drexler was the one who originally came up with it) moves linearly -- not rotationally like this does. It's also reversible.


On several of the slides in this, it compares Northguard with Kafka.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: