What does three insurances and one gold include?

"Three insurances and one gold": an important cornerstone to protect your life.

In today’s society, "three insurances and one gold" is an important topic that the majority of workers pay attention to. So, what exactly does "three insurances and one gold" include? Let’s find out.

First of all, "three insurances" refer to endowment insurance, medical insurance and unemployment insurance.

Endowment insurance is to ensure that workers can have a stable source of income and maintain a basic standard of living after retirement. It is jointly paid by the employer and employees, and the accumulated payment reaches a certain number of years, and the pension can be received monthly after retirement.

Medical insurance is used to reduce the burden of medical expenses for workers when they are sick or injured. This includes outpatient expenses, hospitalization expenses, drug expenses, etc. Through medical insurance, people can avoid poverty caused by illness to some extent.

Unemployment insurance is to provide economic compensation and employment assistance for a certain period of time when workers stop employment because of their own will, so as to help them get through unemployment and find jobs again.

Next, "one gold" refers to the housing provident fund.

Housing accumulation fund is a long-term housing deposit paid by the unit and its employees. It has the following important functions:

1. Purchase: Employees can use housing provident fund loans to purchase houses and enjoy lower loan interest rates.

2. Renting: If the conditions are met, you can withdraw the housing accumulation fund to pay the rent.

3. House decoration: In some areas, housing accumulation fund is allowed to be withdrawn for house decoration.

4. Retirement withdrawal: When employees retire, they can withdraw all the balance in the housing provident fund account at one time.

Below is a table to show the relevant information of "three insurances and one gold" more clearly:

project Payer Main function endowment insurance Employers and employees jointly pay. Guarantee life after retirement. medical insurance Employers and employees jointly pay. Reduce the burden of medical expenses unemployment insurance Employers and employees jointly pay. Provide economic compensation and employment assistance during unemployment. housing accumulation fund Unit and its employees deposit. Used for housing-related expenses such as house purchase, renting and decoration.

It should be noted that the specific policies and payment ratio of "three insurances and one fund" may vary from region to region and from unit to unit. Workers should pay attention to the relevant regulations of their own regions and units to ensure that their legitimate rights and interests are protected.

In a word, "three insurances and one gold" is an important welfare enjoyed by workers at work, which plays a vital role in ensuring personal life, health and housing needs.

(Editor in charge: difference extension)

[Disclaimer] This article only represents the author’s own views and has nothing to do with Hexun. Hexun.com is neutral about the statements and opinions in this article, and does not provide any express or implied guarantee for the accuracy, reliability or completeness of the contents. Readers are requested for reference only, and please take full responsibility. Email: news_center@staff.hexun.com.

[Home in China] Sichuan golden monkey "speaks" to human beings, and they have a long-buried wish in their hearts …

  CCTV News:Today, let’s pay attention to an animal that belongs to the same primate as human beings and has a very beautiful hair — — Sichuan golden monkey. Through a short film, learn about the "most beautiful primate tribe" unique to China.

  My name is Sichuan Golden Monkey, but I was born in Shennongjia, Hubei Province. Now people here are calling us Shennongjia Sichuan Golden Monkey. If you want to ask what this name is going on, it was my grandmother’s grandmother who told my grandmother. This story started a long time ago, thousands of years ago.

  In the middle of China’s map, there are two parallel and horizontal mountains, namely Qinling Mountain, which is called "Chinese Father Mountain", and Daba Mountain, which is like his brothers and sisters. Our ancestors originated in Qinling Mountains and spread all over these two intimate and interlinked mountains. At that time, our ancestors were free to visit relatives and fall in love between the two mountains, and went wherever it was warm, fun and delicious. However, such a good day was destroyed by a huge ancient disaster — — The advent of the ice age broke, and many of our ancestors’ contemporaries never survived that cold and hungry period and disappeared forever. And our ancestors, stubbornly survived. With the coming of the warm period again, our battered family gradually rallied and prospered, and successfully evolved into the most beautiful monkey in Qinba Mountain.

  With the increasing number of you humans, buildings and bridges have been built in many places, making it more and more inconvenient for us to visit. One day, a group of our ancestors’ friends came to Shennongjia, a fun place. They had enough to eat and play, but they could never go out. This group of friends had to re-establish a small golden monkey tribe here and live and reproduce according to our traditional family order. My grandmother’s grandmother told us that we must remember our origins and inherit the system left by our ancestors.

  We have a unique blue face, and a soft and elegant long golden hair. Born in China, we have long been the beauty pageant champions among primates. The Monkey King in The Journey to the West, that is ourselves! However, after informal public opinion evaluation by foreigners, we think that our beauty is seriously underestimated, and we should be the most beautiful monkeys on this earth! Well, thank you, fans and judges. In fact, your affection for us comes more from our friendly and elegant spiritual beauty, doesn’t it?

  Although we are clever and clever, and have a good skill of climbing trees and jumping branches, we never cheat to eat and drink or rob human food. We are gentlemen among monkeys. Look at the gang of robbers in Nanshan … … Anyway, I have to grab a piece of fruit from my brother.

  When I was born, my hair was black and not as good-looking as my parents, but my mother said that when I grew up, I would change into a beautiful golden long hair.

  In our family, my father is the only adult male monkey, and all the adult female monkeys here are my father’s wives. So I have no shortage of aunts, and I am an unreliable aunt. They thought that I was cute and cute when I was born, so they rushed to hug me and dragged me around with several hands, not to mention how uncomfortable it was. My favorite thing was my mother’s warm embrace.

  My father is very cold and dignified. He doesn’t have time to take us to play at ordinary times. He always guards at the top. Once danger comes, he is the first to rush to protect us. My ideal is to be like my father when I grow up, defeat all my opponents, become the monkey king, and then wait for the whole family with my heart.

  Humans are very kind to us, and there are more and more brothers and sisters. There is still a long-buried wish in my heart, that is, I hope that humans can help us build a road, and we can walk over it, return to our most primitive and ancient homeland, and reunite with relatives who have been scattered in Qinling and Daba Mountains for thousands of years.

Then by hardware dream, ByteDance enters the AI ​ ​ headset

Our reporter Li Jing reports from Beijing.

ByteDance officially entered the AI intelligent hardware market by leveraging the big model.

Recently, ByteDance’s Bean Bag released Ola Friend, the first AI intelligent headset. The introduction shows that this headset is connected to the bean bag model and deeply integrated with the bean bag App. After the user puts on the earphone, he can arouse the bean bag to have a conversation through voice without turning on the mobile phone.

Since the official release of ChatGPT on November 30, 2022, the domestic large-scale model market has also been surging in the past two years, and many enterprises have invested in research and development, striving to occupy a place in this emerging market. At present, there are many basic large models and vertical large models in China. In the B-end market, large models are gradually integrated into daily business and workflow, accelerating the empowerment of medical, financial, manufacturing and other industries; In the C-end market, applications such as chat bots, search and content generation are becoming more and more popular.

In fact, in addition to the rapid development of software applications, many enterprises are also exploring the combination of large models and hardware.

Some PC manufacturers have launched AI PC products, mobile phone manufacturers are also developing AI phones, and many companies are exploring the combination of AI and wearable devices. At the end of last year, Meta released Ray-Ban Meta, a smart glasses with built-in Llama model. Companies such as Apple and Midjourney are also exploring the combination of head display and AI. In the domestic market, Iflytek has released several AI headsets.

For Ola Friend, the first AI agent headset released this time, the person in charge of Bean Bag said: "This headset is an exploration and attempt of Bean Bag in the AI ​ ​ scene. I hope Ola Friend can become a friend who can accompany users at any time. The various abilities of bean bags will continue to iterate in the future to help users in various scenes in life. "

How about headphones, AI?

From the point of view of starting the AI function of headphones, users often need to use mobile phones or computers to input traditional large-scale AI dialogue products. While Ola Friend, the AI agent headset released by ByteDance this time, users can communicate with each other through voice by simply touching the headset or saying the wake-up word "bean bag bean bag" after wearing Ola Friend headset.

According to the person in charge of bean bag, in the headset user test, many users gave feedback. Because Ola Friend is very light and comfortable to wear, it has universal intelligence after accessing bean bag, so it has a good experience in tourism, English learning, chat and other scenes. For example, when visiting museums and art galleries, users can ask them about the origin and background of exhibits and artworks. It can also be extended to topics such as dynasty changes and artists’ ideas, and to some extent, it acts as a tour guide, which is very convenient. In addition, for some "whimsy" chat and emotional expression, such as "I have an important speech, what should I do if I am a little nervous?" "I just ate the eight-treasure rice, as if I had returned to my childhood", and its reply was also very kind.

In addition, Ola Friend has made some optimizations to enable users to communicate with AI just like chatting with friends. In the earphone, the tone of the bean bag can show happiness, surprise and other emotions. Moreover, users can "talk while listening, interrupt at any time" and switch topics at any time.

According to reports, compared with smart speakers and other products, the use environment of headphones is more complicated. In order to do a good job of speech recognition, Ola Friend headphones are connected to the Seed-ASR (Speech Recognition) technology model of the Byte Bean Bag model, which can recognize Chinese and English accents with high precision, and even "intelligently" recognize all kinds of information through context.

Judging from the overall AI function of Ola Friend headphones, it is more inclined to be used in consumers’ personal life scenes. In April this year, Cleer, an intelligent acoustic brand, also released the world’s first open AI headset CleerARC3 sound arc, which is also aimed at consumers’ personal life scenes. The built-in AI motion algorithm in the headset can help users monitor sports physiological data in real time. In the interaction, Mobvoi’s voice control technology is integrated, and the AI voice control is upgraded. You can use shortcut passwords such as "Next" and "Answer the phone" to perform corresponding operations without prompting the voice assistant. In addition, the AI noise reduction effect is achieved.

AI headphones launched by Iflytek in recent two years are mainly aimed at office scenes of individual consumers. In 2023 and 2024, Iflytek successively introduced several AI conference headphones with real-time transcription, multilingual transcription and text processing.

From the price point of view, both Ola Friend headphones from ByteDance, Cleer ARC3, and AI headphones from Iflytek are priced above 1000 yuan, belonging to mid-to high-end products.

Pan Xuefei, research director of IDC China, told reporters: "At present, the combination of AI big model and headphones mainly drives the development of the middle and high-end market of Bluetooth headsets. If we cut into specific scenes effectively, we can find and reach the target users and solve certain pain points."

Why do you enter from headphones?

With the development of AI model and the release of terminal AI chips by AMD, Intel, Qualcomm and MediaTek, the development of AI has turned to hardware+software parallel driver, and many manufacturers have explored the combination of AI and hardware devices.

On the PC side, AI PC of Lenovo, Hewlett-Packard and Dell are being shipped one after another. On the mobile phone side, flagship models such as Samsung Galaxy S24 series and Xiaomi 14 have integrated AI functions, such as instant call translation and AI photo taking. On the wearable hardware side, at the end of last year, Meta released Ray-Ban Meta, a smart glasses with built-in Llama model. Not long ago, Solos, an American smart glasses company, said that it would launch the world’s first smart glasses AirGo Vision with integrated GPT-4o, and companies such as Apple and Midjourney are also exploring the combination of head display and AI. In addition, there are AI headphones mentioned above.

As can be seen from the products, the main force of AI PC and AI mobile phone production is still the traditional PC manufacturers and mobile phone manufacturers, while Internet vendors such as Meta and ByteDance are more concentrated in the field of AI wearable devices.

Why did ByteDance bean bag model choose AI earphone as the entrance?

According to the report of Southwest Securities Research and Development Center, compared with end-side devices such as PC, mobile phone and VR/AR head display, headphones have obvious portability advantages in edge-side AI terminals. At present, headphones are mainly connected through Bluetooth, and they need to be connected to the cloud by mobile phone or PC for interaction. In the future, headphones may develop to Wi-Fi connection, and they will be able to access the edge AI model anytime and anywhere.

From the perspective of incremental market, the incremental market of Bluetooth headset is relatively more than that of PC and mobile phone. Huaxin Securities reported that smartphone shipments decreased by 3.3% year-on-year in 2023. On a quarterly basis, global smartphone shipments narrowed quarter by quarter in the first three quarters of 2023, and turned positive in the fourth quarter of 2023. The reasons behind it come from two aspects. On the one hand, there is a lack of innovation in mobile phone hardware. After the end of the 5G cycle in developed economies and China, the consumer replacement cycle is lengthened; On the other hand, after 2022, consumer demand is weak.

As for wireless headsets, according to customs export data, there has been a recovery trend since 2023. Since February 2023, the monthly growth rate of wireless headsets has continued to be positive, and the year-on-year growth rate has continued to expand since September 2023.

"Because the wireless headset technology is fully mature, there is still room for the popularization of wireless headsets compared with the consumption of mobile phones. With the increase of wireless headset sensors, the product experience will be even better, the superposition value will be smaller than that of mobile phones, and the replacement cycle will be significantly faster than that of mobile phones." Huaxin Securities believes that with the opening up and economic recovery in China, we will continue to be optimistic about the growth of wearable devices such as wireless headsets.

"With the increasing demand of consumers for intelligent services, AI headphones, as an emerging intelligent hardware product, have strong market demand. Domestic large model manufacturers can meet market demand and expand new market space by launching AI headsets. " Wang Peng, an associate researcher at the Beijing Academy of Social Sciences, also pointed out to reporters that compared with other wearable devices or hardware devices, China’s headset technology is mature and the industrial chain is complete. Domestic large model manufacturers have accumulated rich experience in AI technology, and can combine AI technology with earphone hardware to create competitive AI earphone products.

ByteDance’s Hardware Dream

Internet giants have more or less some dreams of making hardware, and ByteDance is no exception. Although ByteDance already has well-known software products such as Today’s Headline, Tik Tok, Feishu, etc., so far there is no hardware product with a relatively high market share.

At the end of 2018, ByteDance acquired the mobile phone business of Hammer Technology and some patent rights for more than 100 million yuan, and established the Xinshi Laboratory, with Wu Dezhou, the former head of mobile phone of Hammer Technology Nut, as the president. After the acquisition, Xinshi Lab released two generations of nut mobile phones, new TNT displays and speakers and other peripheral products.

In 2020, ByteDance established the brand of "Vigorously Educate" and began to lay out table lamp products in educational scenes. In January 2021, Xinshi Lab was merged into the educational hardware team, giving up the mobile phone business and gathering educational hardware. The reasons behind this are, on the one hand, the concentration of the mobile phone market was further improved at that time, and on the other hand, the market scale of educational hardware was expanding due to the epidemic situation and the outbreak of online education. At that time, according to the prediction of Duowhale Capital Education Research Institute, by 2022, the market scale of K12 intelligent education hardware alone may reach 57 billion yuan.

Unfortunately, in August 2022, due to the influence of the national "double reduction" policy and the "three children" policy, vigorously education began to lay off employees, and some people changed jobs or invested in new projects. ByteDance’s educational hardware products have also been shelved.

In September, 2021, ByteDance also acquired Pico, the head display manufacturer, for 9 billion yuan. Although ByteDance has high hopes for Pico and invested a lot of money in it, the market performance of Pico has not reached expectations. In 2023, ByteDance adjusted the organizational structure of Pico, drastically laid off employees, and lowered its sales expectations. Pico continues to introduce new products, such as the PICO 4 Ultra MR mixed reality integrated machine released in 2024. But overall, Pico has been gradually marginalized in ByteDance’s strategy.

Today, ByteDance’s hardware exploration is more focused on the AI field. It is understood that the exploration of ByteDance’s AI hardware direction is divided into two product lines internally: one product line is code-named "D line", with emphasis on wearable devices with AI capabilities; The other product line is "O-line", which focuses on handheld AI hardware devices. Hand-held devices have not yet taken shape.

At present, Ola Friend smart headphones, which are positioned in the mid-to high-end market, have been launched on major e-commerce platforms, and officially shipped from October 17, with a price of 1199 yuan. At present, on the JD.COM platform, Ola Friend’s self-operated flagship store in JD.COM has sold more than 500 headphones; On the Tmall platform, Ola Friend intelligent headphones have sold more than 1,000, and ranked second in the hot-selling list of bone conduction headphones above 300 yuan on the Tmall list. It remains to be seen whether more consumers will like it in the future.

Pan Xuefei pointed out to reporters: "At present, the combination of large models and hardware is still mainly in the form of access. If we want to achieve the end-side, on the one hand, we have higher requirements for chip size and space design in terms of volume and ergonomic design, and on the other hand, we have extremely high requirements for battery size and endurance. At present, these aspects still face great challenges."

(Editor: Zhang Jingchao Review: Li Zhenghao Proofread: Zhai Jun)

Reporting/feedback

The report "Historical Review of Cyber Attacks by American Intelligence Agencies" was released.

  It has been nearly ten years since the "Snowden Incident". With the exposure of the "Prism Gate", national cyber attacks have gradually surfaced. As early as before, there have been many sources of information showing that relevant US institutions use their technology and first-Mover advantage to launch cyber attacks against other countries. In order to systematically present the global cyber attacks carried out by US intelligence agencies, China Cyber Security Industry Alliance (CCIA) has carefully compiled and released "Historical Review of Cyber Attacks by US Intelligence Agencies — — Based on the analysis of information disclosed by the global network security community (hereinafter referred to as the "Report").

  Based on the professional perspective of cyber security, the Report adheres to the principles of science, objectivity and neutrality. Based on nearly 1,000 research documents of dozens of cyber security enterprises, research institutions and experts and scholars around the world, it fully integrates the analysis processes and research results of all parties, and strives to present the cyber attacks of relevant US institutions on other countries through the analysis and demonstration of the industry and academic circles, and reveals the great damage and serious threat posed by cyber hegemony to the global cyberspace order.

  According to time and events, the Report is divided into 13 articles, mainly including US intelligence agencies’ cyber attacks on other countries’ key infrastructure, indiscriminate cyber theft and monitoring, implantation of back door pollution standards and supply chain sources, development and leakage of cyber attack weapons, the commercial attack platforms sold out of control and become hackers’ sharp tools, interfering with and suppressing normal international technical exchanges and cooperation, creating standards and order in line with US interests, hindering the development of global information technology, and creating division and confrontation in cyberspace.

  Each article is summarized as follows:

  The opening of the first cyber war — — Analysis of "Seismic Network" Event

  In 2010, American intelligence agencies used Stuxnet to attack Iran’s nuclear facilities, which opened the Pandora’s Box of cyber warfare. In the history of information technology development, there have been a large number of network viruses and attacks, but the "earthquake net" incident is the first network attack that has been fully proved by technology and caused damage to key industrial infrastructure in the real world equivalent to traditional physical damage. The relay analysis of global network security vendors and experts gave a very full portrait of this attack, and gradually locked the black hand behind the scenes into American intelligence agencies.

  In June, 2010, technicians of VirusBlokAda, a Belarusian network security company, discovered a new worm virus in Iranian client computers, and named it "stuxnet" according to the characteristic word "Stux" appearing in the code.

  In September 2010, Symantec, an American network security vendor, disclosed the basic situation, transmission method, attack target and virus evolution process of "Shenzhen" virus.

  Kaspersky, a Russian network security vendor, has published dozens of reports on the "Shenzhen" virus, making a comprehensive analysis from many aspects, such as functional behavior, attack targets, vulnerability utilization, evasion of confrontation, command and control of servers, etc., especially discussing the LNK vulnerabilities and signed drivers used by the "Shenzhen" virus, and pointing out that such a complex attack can only be carried out with "state support";

  Antian, a network security manufacturer in China, released three reports one after another, analyzing the attack process, propagation mode, attack intention, file derivation, multiple zero-day vulnerabilities, update mode and technical mechanism of USB ferry propagation conditions, summarizing its attack characteristics and the influence process on field equipment of industrial control system, speculating possible attack scenarios, and building an environment to simulate its attack process on industrial control system;

  In November 2013, Ralph Langner, a German IT security expert, published two articles, calling the "Shenzhen" incident "a textbook example of cyber warfare". Based on the follow-up study of the two versions of the "Shenzhen" virus and the attack events, the specific implementation method and operational flow of "cyber warfare produces physical results" were outlined.

  The chain reaction after the second "Shenzhen" — — Follow-up Analysis of "Poisonous Qu", "Flame" and "Gauss"

  Global network security vendors have gradually confirmed that more complex viruses, such as Duqu, Flame and Gauss, are of the same origin as Shenzhen Net, and have started to spread at the same time or even earlier.

  In October 2011, CrySyS, a Hungarian security team, discovered a virus sample very similar to "Shenzhen", which was called Duqu ("Poisonous Qu"). After comparing with "Shenzhen", the researchers determined that they were very similar.

  In October 2011, Symantec released a report, which analyzed the global infection, installation process and loading logic of "Poisonous Qu" virus in detail.

  Since October 2011, Kaspersky has released ten analysis reports on the virus "Poisonous Qu" one after another, believing that "Poisonous Qu" is a multifunctional framework with high customization and universality. In June 2015, Kaspersky captured the attack of "Poisonous Music" virus, and analyzed that the attacker intended to monitor and steal its source code, and only the team supported by the state could do it.

  In May 2012, Antian released a report to analyze the module structure, compiler architecture and key functions of "Poisonous Qu" virus, pointing out that "Poisonous Qu" and "Shenzhen Net" have certain similarities in structure and function, and judging that they have homology according to coding psychology;

  In April 2012, the Iranian Ministry of Oil and the Iranian National Oil Company were attacked by the "Flame" virus. Kaspersky analyzed that "Flame" was one of the computer viruses with the most complicated attack mechanism and the highest threat at that time, and its structural complexity was 20 times that of "Shenzhen" virus, and the behind-the-scenes team was likely to be manipulated by government agencies.

  In May, 2012, Antian released a report, analyzing the running logic, propagation mechanism and main module functions of the "Flame" virus. It is believed that "Flame" is a complex component Trojan with more modules than "Shenzhen", and its vulnerability attack module includes a USB attack module used by the "Shenzhen" virus, which proves the homologous relationship between the two.

  In August 2012, Kaspersky discovered the Gaussian virus, claiming that there was sufficient evidence to show that Gaussian was closely related to the flame and the earthquake net, and was created by organizations related to the earthquake net, the poisonous song and the flame.

  In September, 2019, Antian released the report "Nine-year Reexamination and Thinking of the Stuxnet Incident" after continuous follow-up research, and analyzed the characteristics, causes, mechanism of action, related advanced malicious code engineering framework of each version of Stuxnet, and the correlation between malicious codes used in Stuxnet, Poisonous Music, Flame, Gaussian Equation Organization.

  The third panorama of supercomputers — — Follow-up analysis of Snowden incident

  On June 5th, 2013, The Guardian was the first to report the secret project of NSA code-named PRISM, which was revealed by Snowden, an intelligence officer of the US Central Intelligence Agency (CIA), and exposed nine international internet giants including Microsoft, Yahoo, Google and Apple, and cooperated with the US government to secretly monitor information such as phone records, emails, videos and photos, and even invaded network equipment in many countries including Germany and South Korea. With the gradual disclosure of Snowden’s leaked documents, global cyber security vendors have more documents to analyze about the relevant engineering systems and equipment systems of American intelligence agencies’ cyberspace operations, and the overall picture of American cyberspace supercomputers has gradually emerged.

  In July 2013, Antian published an analysis article, pointing out that the key contents exposed by Snowden incident mainly include: First, the "Prism" project, as an integral part of the NSA network intelligence system, mainly uses the interfaces provided by American Internet companies for data retrieval, query and collection; Second, Google, Microsoft, Apple, Facebook and other large American Internet companies are mostly related to this plan; Third, the Specific Invasion Action Office (TAO) under the NSA has attacked China for 15 years, and related actions have been helped by Cisco;

  In December 2017, Antian released a series of articles to deeply analyze the "Star Wind" plan in Snowden’s leaked documents, pointing out that the United States has carried out a large number of network intelligence eavesdropping projects and plans represented by "Prism", forming a global network intelligence acquisition capability, and on this basis, established an offensive capability support system represented by "TURBULENCE". The complete cyberspace intelligence cycle is realized through the relevant modules such as passive signal intelligence acquisition, active signal intelligence acquisition, task logic control, information diffusion and aggregation, and directional positioning, and then the intelligence-driven cyberspace active defense and offensive actions are further realized by combining the cyberspace attack and defense capability modules such as "TUTELAGE" and "QUANTUM".

  In March, 2022, 360, a network security vendor in China, released a report, revealing the indiscriminate attacks launched by NSA on the world for more than ten years, especially analyzing the "quantum" attack system, the zero-day attack platform of "FOXACID", the "VALIDATOR" and the back door of "UNITEDRAKE". The analysis shows that the number of infected units in the world may reach millions.

  The fourth rumor of the back door — Exposing American Pollution Encrypted Communication Standards

  Through unremitting efforts, the global network security industry and academic circles have confirmed that the United States manipulated international information security standards by implanting back doors. Its practice has shaken the technical trust foundation of the whole Internet and caused extremely bad influence on the ecological environment of global international relations.

  In 2007, Microsoft cryptographer made an analysis from the technical point of view, which showed that the algorithm of deterministic random bit generator (DRBG) with double elliptic curve (Dual EC) recommended by NIST in 2006 was possible to be implanted in the back door.

  Snowden’s leaked documents in 2013 not only confirmed the previous backdoor speculation, but also exposed the NSA’s long-term and systematic manipulation of the password system, and used the loopholes in encryption standards to monitor the world;

  In 2015, Wired magazine in the United States disclosed Logjam;, an encryption vulnerability of NSA to VPN communication attacks;

  In 2020, the media in the United States, Germany and Switzerland jointly disclosed that the CIA had long stolen the encrypted communication content of government and enterprise users in many countries around the world by manipulating Crypto AG, a crypto machine manufacturer.

  The fifth chapter is the demonstration of firmware Trojan horse — — "Equation Organization" officially surfaced.

  Firmware is software written into hardware, which is lower than the operating system and even loaded before the operating system. If the virus is written into the firmware, it will be more hidden and difficult to find. The global network security industry and academic circles have gradually confirmed that the United States uses hard disk firmware to complete the "persistent" attack.

  In January 2014, Darmawan Salihun, a network security expert who specializes in BIOS security, wrote an article to analyze the BIOS backdoors of NSA, such as DEITYBOUNCE and GODSURGE, and called these malware "god mode";

  From February to March, 2015, Kaspersky released a series of reports, exposing the APT organization named Equation Group, saying that it has been active for nearly 20 years, is the behind-the-scenes manipulator of the "Shenzhen" and "Flame" viruses, and has surpassed all cyber attack organizations in history in terms of attack complexity and attack skills.

  In 2016, according to the constant value of RC algorithm, Kaspersky verified that the NSA data leaked by the hacker organization "shadow broker" belonged to "equation organization", pointing out that "equation organization" achieved persistent attack implantation against hard disk firmware in high-value targets;

  In March and April, 2015, Antian released two reports, analyzing the composition structure, correlation, return information, instruction branch, C2 address and plug-in function of the main attack platform of Equation Organization, and analyzing the attack technology principle of the key plug-in "hard disk reprogramming" module, as well as the local configuration of multiple components and the encryption algorithm and key of network communication;

  In February, 2022, Chianxin, a network security vendor in China, released a report saying that the data leaked by the "shadow broker" and Snowden verified that Bvp47 belonged to the top-level back door of the NSA "Equation Organization", and restored the scene that Dewrop S, Suctionchar_Agent sniffer Trojan cooperated with other components such as Bvp47 back door program to carry out joint attacks.

  The sixth network attack covering all platforms — — The exposure of Solaris and Linux samples of Equation Organization

  Network security researchers have found that super attack organizations try to expand their load capacity to all scenarios that can achieve invasion and persistence. In these scenarios, various server operating systems, such as Linux, Solaris, FreeBSD, etc., are highly concerned. Based on this judgment, network security vendors have carried out detailed and in-depth tracking research on the super APT attack organization "Equation Organization".

  In February, 2015, Kaspersky suggested that Equation Organization might have multi-platform attack capability, and there are examples to prove that the malicious software DOUBLEFANTASY of Equation Organization has a Mac OS X version.

  In November 2016, Antian released a report, which analyzed the attack samples of Equation Organization against various architectures and systems. It was the first in the world to expose the organization’s attack capability against Solaris(SPARC architecture) and Linux systems through real samples.

  In January 2017, Antian drew the building block diagram of the "Equation Organization" operation module based on the sample analysis of "Equation Organization" leaked by the "shadow broker", revealing the operation mode of the United States to realize front and back field control and deliver malicious code on demand through refined modules.

  The seventh leaked arms — — The out-of-control management of cyber weapons in the United States has become a tool of cyber crime.

  On May 12th, 2017, WannaCry ransomware made use of the "Eternalblue" vulnerability in NSA cyber weapons to create a huge cyber disaster all over the world. Superpowers develop cyber armaments without restraint, but they do not keep them strictly, which seriously endangers global cyber security.

  Microsoft released the patch of the "Eternal Blue" vulnerability in March 2017, and the cyber weapon used by the "Equation Organization" released by the "Shadow Broker" in April 2017 included the exploitation program of this vulnerability. The hacker used this cyber weapon to carry out this global large-scale attack on all Windows system computers that were not patched in time;

  China National Internet Emergency Center (CNCERT) confirmed that WannaCry ransomware was spread based on port 445 and exploited the SMB service vulnerability (MS17-010). Generally speaking, it can be judged that it was a black product attack threat caused by the disclosure of vulnerability attack tools by "shadow brokers".

  Kaspersky analysis believes that the hacking tool "eternal blue" used in cyber attacks was previously disclosed on the Internet by "shadow brokers" and came from the network arsenal of NSA;

  Antian analyzed the SMB vulnerability MS17-010 exploited by the ransomware, characterized it as "uncontrolled use of arms-level attack equipment", and subsequently issued the "Operation Manual on Systematic Response to NSA Network Arms and Equipment";

  360 quickly issued an alarm after detecting the spread of the ransomware, calling on people to install system patches and security software in time, and launched a series of solutions after obtaining samples.

  Once leaked, other "arms" in the American network arsenal may be used in a targeted way, and their derived harm may be no less than the "eternal blue". Their existence and leakage are even more worrying.

  Article 8: Proliferation of armaments — — American penetration test platform has become a tool widely used by hackers.

  The United States did not effectively restrict and control the automated attack platform it sold, which led to the pervasive attack test platform Cobalt Strike and other tools commonly used by hackers, which not only buried security risks in the global cyberspace, but also caused unpredictable potential impacts on the security of other countries.

  In May, 2015, Antian discovered that in a quasi-APT attack against a government agency in China, the attacker relied on the Shellcode generated by Cobalt Strike platform and communicated in Beacon mode to realize remote control of the target host. At the 2015 China Internet Security Conference (ISC 2015), Antian systematically combed major commercial cyber weapons such as Regin and Cobalt Strike, and pointed out that the service and research background of Rafael mutch, the founder of Cobalt Strike, in the active and reserve cyber forces of the US military clearly reflected the spillover and destructiveness of the US military network technology and capabilities;

  According to the survey conducted by American security company Proofpoint, the use of Cobalt Strike by threat actors increased by 161% in 2020 compared with the previous year. From 2019 to 2021, 15% of the attacks that abused Cobalt Strike were related to known hacker organizations.

  Sentinelone, an American network security company, shows that the main distribution method of Egregor ransomware is Cobalt Strike;;

  Chianxin monitoring found that the threat organization "Blue Mockingbird" exploited the Telerik UI vulnerability (CVE-2019-18935) to capture the server, and then installed Cobalt Strike beacons and hijacked system resources to mine Monroe coins.

  The exposure of the ninth "arch" plan — — Coping with American Monitoring of Network Security Vendors

  On June 22, 2015, Snowden disclosed the "CamberDADA" implemented by the relevant intelligence agencies in the United States and Britain. The plan mainly uses the traffic acquisition ability of American invading global operators to monitor the communication between Kaspersky and other anti-virus vendors and users in order to obtain new virus samples and other information. The follow-up targets of the plan include 23 global key network security vendors in 16 countries in Europe and Asia, including China network security vendor Antian.

  According to the analysis, the purpose of the "Arch" plan is: firstly, to capture the samples reported by global users to anti-virus vendors; secondly, to provide reusable sample resources for TAO; thirdly, to monitor the processing capacity of anti-virus vendors and whether to release some malicious code samples.

  The American "Interceptor" published an article saying that the "Arch" plan shows that since 2008, NSA has launched systematic espionage activities against the software of Kaspersky and other anti-virus vendors;

  According to the American Wired article, the "Arched" plan depicts a systematic software "reverse engineering" activity, by monitoring network security vendors to find software vulnerabilities, so as to help intelligence agencies bypass these software;

  Forbes published in the United States that the "Arch" plan monitoring list is a "blacklist" of security vendors outside the "Five Eyes Alliance" countries that have the ability to discover and contain their network activities;

  China Xinhua News Agency published an article saying that anti-virus companies that were included in the monitoring scope expressed anxiety about this, and at the same time all said that they had confidence in their security products and found that their products were not weakened;

  Antian issued a statement saying that the leaked documents mainly disclosed the emails reported by users to vendors by relevant intelligence agencies through public network channels, not the attacks on the network systems and products of security vendors themselves. The introduction of this monitoring "target list" will further split the global security industry that has already appeared cracks and suspicions.

  Article 10 Broken Window Effect — — Iterative analysis of data leaked by "shadow broker" and Wikileaks

  The data leaked by "shadow broker" and Wikileaks further revealed the true face of the network arsenals of NSA and CIA in the United States. "Shadow Broker" exposed the NSA’s attack equipment for network security equipment, the list of attacks against global servers, the information of SWIFT invading institutions, the FuzzBunch(FB) vulnerability attack platform and the DanderSpritz(DSZ) remote control platform in batches, and said that these attack equipment was related to "Equation Organization". NSA targets 287 targets in more than 45 countries, including Russia, Japan, Spain, Germany, Italy, etc., lasting for more than ten years. Wikileaks exposed 8,761 secret documents that were alleged to be CIA cyber attacks, including 7,818 web pages and 943 attachments. The leaked files contain the document information of a huge attack equipment library, which covers a wide range of platforms, including not only common operating systems such as Windows, Linux, iOS and Android, but also network node units and intelligent devices such as smart TVs, in-vehicle intelligent systems and routers.

  In addition to being shocked, the academic and industrial circles of global network security began to sort out and analyze the leaked information. According to the materials exposed by "shadow brokers", the three core modules represented by FB, Operation Center(OC) and DSZ in NSA network operation system are sorted out. The "Vault 7" exposed by Wikileaks contains 15 tools (sets) and 5 frameworks for CIA network operations, which have also been comprehensively sorted out.

  From December 2017 to November 2018, Antian released a series of reports on "Analysis of American Cyberspace Attack and Active Defense Capability", which systematically combed the American Cyberspace attack and defense capability from the perspectives of intelligence circulation, offensive capability support, attack equipment and active defense;

  In October 2018, Kaspersky conducted an in-depth analysis of the DarkPulsar backdoor in DSZ. The research results of its persistence and latent ability show that the developers behind it are very professional, aiming at targets with long-term monitoring and control value;

  In December, 2021, Israeli security vendor Checkpoint analyzed the Double Feature component in DSZ and concluded that DSZ (as well as FB and OC) are huge tool sets of "equation organization".

  In March, 2020, 360 disclosed the eleven-year network infiltration attacks by the CIA attack organization (APT-C-39) on China’s aerospace, scientific research institutions, oil industry, large Internet companies and government agencies. In March 2022, 360 released an analysis report on the NSA attack organization APT-C-40, saying that the organization began to attack leading companies in a series of industries in China as early as 2010;

  In March 2022, China National Computer Virus Emergency Response Center (CVERC) officially released an analysis report on NSA’s use of "NOPEN" Trojan. In the attack on China’s Northwestern Polytechnical University exposed in September, 2022, the NSA used as many as 41 kinds of cyber weapons, including NOPEN leaked by the "shadow broker".

  The eleventh article is the first complete traceability — — The complete process of the attack on technical facilities in the Middle East by Formula Organization

  On April 14, 2017, the data related to cyber attacks in the United States exposed by "Shadow Broker" included a folder named SWIFT, which contained an attack against EastNets, the largest SWIFT service provider in the Middle East, from July 2012 to September 2013. The operation successfully stole thousands of employee accounts, host information, login credentials and administrator accounts of EastNets in Belgium, Jordan, Egypt and the United Arab Emirates.

  In June, 2019, Antian conducted a correlation analysis based on the data leaked by the "shadow broker" and the historical capture analysis results, and completely recovered the attack of the "Formula Organization" on EastNets, the largest SWIFT financial service provider in the Middle East, restored the US attack springboard, operation path, equipment application, tactical process, scene environment and operation consequences, summarized the attack equipment information used in this operation in the United States, and pointed out that the United States has the attack capability covering the whole platform and the whole system and a large number of zero-day vulnerability reserves.

  Chapter XII Struggles in International Forums — — Expose American manipulation of cyberspace security.

  The United States uses its right to speak in cyberspace to interfere with and suppress normal international exchanges and obstruct the dissemination and sharing of information, while global network security vendors and academics continue to make efforts in various international conferences and forums to expose American network behaviors, intentions and activities.

  In 2015, Der Spiegel in Germany disclosed the "fourth-party intelligence gathering" method and project of NSA by invading (and using) the third-party network infrastructure to obtain intelligence or carry out cyber attacks. Kaspersky researchers analyzed the concealment and high complexity of this attack at the annual conference of Virus Bulletin in 2017.

  In 2016, Jason Healey, a senior researcher at the School of International and Public Affairs of Columbia University in the United States, wrote an article, deeply analyzing the development process of the Vulnerability Fair Adjudication Procedure (VEP) in the United States from 2008 to 2016, and carefully estimating the number of zero-day loophole arms that the United States may hoard at present (2016);

  Professor Shen Yi from Fudan University, China, made a historical review of American state monitoring behavior at the seminar "The Road to Cyber Threats in the New Era" in 2013;

  At the 2015 "China-China Cyberspace Development and Security Forum", Antian analyzed the characteristics, capabilities and attacks on key basic industrial enterprises in.

  Article 13 Restriction and Suppression — — The United States generalizes the concept of security and sanctions other countries’ network security vendors.

  In recent years, in order to maintain its political hegemony, economic interests and military technology and capability advantages, the United States has generalized the concept of "national security" and sanctioned well-known cyber security enterprises in other countries with technological competitiveness, regardless of undermining international order and market rules, at the expense of harming the interests of global consumers, including the United States. Its main practices include:

  Disable Kaspersky’s software products.On September 13, 2017, the US Department of Homeland Security asked all federal agencies to uninstall Kaspersky software products used within 90 days on the grounds that Kaspersky may threaten the security of the US federal information system;

  Restricting the development of enterprises in China by using entity list.On May 22, 2020, the network security enterprise — — Qihoo 360 was listed in the "Entity List" by the US Department of Commerce;

  Put pressure on other countries’ security companies that expose US cyber attacks.On December 22, 2016, NetScout Company of the United States issued a document saying that Antian, a network security company in China, is the spokesperson of "China’s anti-APT"; On February 17, 2022, the hearing of the US-China Economic and Security Review Commission (USCC) of the US Congress specifically named Antian and Qihoo 360, because they publicly published their analysis of the cyberspace actions of NSA and CIA.

  Rank China Netan Enterprises in another volume and suppress them accordingly.Since 2019, the "Top 500 Cyber Security Companies" list of Cybersecurity Ventures has been replaced by the "Top 150 Cyber Security Companies", all of which are European and American manufacturers. In September, 2020, Cybersecurity Ventures released the list of the most popular and innovative "China Cyber Security Companies" in China, including 20 companies, including Antian, Qihoo 360, Chianxin, Shanshi Net Branch, Anheng, Shenxin, ThreatBook, etc. Based on this list, the USCC hearing experts in 2022 suggested that the US Department of Commerce and the Ministry of Finance put them on the entity list and the sanctions list.

Naying, Faye Wong, raised money for Yushu earthquake relief on the same stage after more than ten years.

        Faye Wong, who performed in Wenchuan 512 earthquake relief and performed on the stage in the Spring Festival Evening, came out of the mountain again and stepped onto the stage again. Although she sang with many singers and stood at the forefront of the team, Faye Wong dressed in gray was still very tall and eye-catching. In addition, Zhang Ziyi, Na Ying, Zhao Benshan, Guo Jingjing, Liu Xiang, Liu Qian, Pu Cunxin, Chen Hao, NI YAN, Chen Daoming, Yu Junjian and Ni Ping also attended the event.

Guarding their homes, they rushed to the front line of fighting floods.

  Party member, a cadre of Baohe District, Hefei, and officers and men of the army braved the rain to reinforce the dam. Photo by Liu Fengyun (People’s Vision)

  In the early morning of July 28th, Zheng Jichun set out with a small boat. His destination is the collection point of living materials in the town. Since 82 affected people in the village came to the resettlement site, as the principal of Gaolin Primary School in Sanbing Town, Chaohu City, Anhui Province, Zheng Jichun, an old party member, volunteered to take charge of everyone’s daily life. "The public sentiment is urgent. I have not been able to fight floods in the front line like other party member, but I hope to do my best to help the affected people eat and drink at the temporary resettlement sites." Zheng Jichun said.

  Since the flood season, there has been continuous heavy rainfall in Hefei, and all the main rivers in Chaohu Lake basin have exceeded the police. At the same time, they are under great pressure from the flood control of the Yangtze River and Chaohu Lake and the urban flood control. In the face of severe flood, Party organizations at all levels in the city and many party member bravely took the lead and rushed to the key positions of flood control, building dams for flood control and flood fighting, guarding their homes and the safety of people’s lives and property.

  Keep safe and branch to the front line.

  21 temporary party branches are on duty 24 hours a day, guarding major rivers, Chaohu dams and key areas.

  The water level in Chaohu Lake has exceeded the once-in-a-century standard for many days.

  There are three rivers entering the lake and 10.8km Chaohu levee outside. Yicheng Street in Baohe District of Hefei City is in the front line of flood control. In order to carry out flood control and emergency rescue work in a timely and effective manner, the Party Working Committee of Yicheng Street set up a temporary party branch immediately after receiving the flood warning, and moved 17 party branches of government agencies, residential villages and urban management to the levee.

  The temporary party branches are in charge of each section, with the branch secretary taking the lead and party member participating in it. The surrounding people saw it and took the initiative to join it. In a short time, more than 300 volunteers gathered, including more than 200 party member.

  "The water level is rising!" When patrolling the embankment, Yang Guoqing observed that the water level in Lirong section of the road around the lake was rising, and the embankment nearly 10 meters long in front was low in terrain, which was in danger of overflowing at any time. As the leader of a flood control emergency group, Yang Guoqing made a decisive decision and quickly organized to reinforce the dam. Shovel silt, tie bags, pass sandbags and build dams. Yang Guoqing and more than 10 party member fought together for nearly 2 hours, raising the dam by 1.2 meters.

  On the flood control dam, besides party member volunteers, there are fishermen "soil experts". Shu Congming, 68, is a native of Chaohu Lake and an old party member. He took the lead in setting up an "old fisherman’s dam guard team". The team members not only patrol the dam during the flood season, but also clean up the weeds and garbage along the lake and river on weekdays. Now, under the leadership of Shu Congming, this "old fisherman’s dam guard team" is divided into two roads, patrolling the embankment once an hour and being on duty 24 hours a day.

  "In front of the flood, a grassroots party organization is a fighting fortress." Ge Rui, secretary of the Baohe District Party Committee of Hefei City, said that building a temporary party organization in the front line of flood control and disaster relief can transform the party’s political advantages, organizational advantages and close ties with the masses into a powerful synergy for flood control and disaster relief. Today, Baohe District has set up 32 flood control emergency duty points and 21 temporary party branches in major rivers and Chaohu dams and key sections, and implemented 24-hour lighting duty.

  Patrol the dam, party member rushed ahead.

  At present, more than 50,000 party member cadres have devoted themselves to flood control and emergency rescue.

  At 6 o’clock in the morning, at first light, Li Yebing got on the electric motorcycle and rushed to the dam. When he reached the Nanfei River, he put on his raincoat, rubber shoes and shovel, and began to patrol the embankment. Party member, a 72-year-old man from Shikou Community, Changlinhe Town, Feidong County, Hefei City, has been involved in flood control since late June. "I am old, but I have much experience! It is glorious that I can still play a little residual heat before the flood. " Li Yebing introduced with a smile that there are eight people involved in his community, each of whom is responsible for inspecting the dam about 1.5 kilometers. "At first, it was a six-hour patrol, and later it became three hours. Now, it is necessary to patrol the embankment every hour."

  It’s still raining, and the water level of Nanfeihe River is rising almost every day. Li Yebing patrolled the embankment and dared not slack off. At noon, I got a box lunch and sat on a pony. While eating, Li Yebing still kept an eye on the water. "Once it is found that the water level exceeds the safety limit or leaks, it must be rushed up at the first time. This is my responsibility as an old party member! Don’t say that I am only 72 years old. Even if I am 82 or 92 years old, I will still stick to the front line of flood control. " Li Yebing said.

  "The flood fighting and emergency rescue is a big test for party member. They move at the command and smell ‘ Flood season ’ Attacking, regardless of gains and losses, fighting selflessly, fully embodies the responsibility and responsibility of Communist party member. " Yao Fei, county magistrate of Feidong County, said.

  It is understood that at present, more than 50,000 party member cadres have been involved in flood control emergency rescue in Hefei, and more than 380 party member commandos, more than 260 party member rescue teams and more than 650 party member volunteer service teams have been established.

  Anti-waterlogging, no dead angle in investigation

  Knocking on the door from door to door, earnestly persuading them to leave, working for dozens of hours, and moving the pump truck to help drain nearly 420,000 cubic meters of water.

  Not long ago, heavy rain poured down in Hefei. "No, there is water at the intersection of North First Ring Road and Feixi Road!" In Hefei Urban and Rural Flood Control Headquarters, he hung up the phone, and Chen Shiyong immediately called up the flood control command and dispatch system to check information, judge water level and dispatch drainage vehicles. Then, he plunged into the rain and started to rush to the scene.

  Chen Shiyong, 45, is the district leader of the Drainage Management Office of Hefei Urban and Rural Construction Bureau. He has been a party member for 25 years. During the flood season, he is responsible for the inspection and maintenance of drainage facilities within his jurisdiction and the emergency response to flood control. The water at the intersection has exceeded the warning water level. The transferred large mobile pump truck is racing against time to pump water and discharge it. Arrange personnel to inspect the wellhead and outlet as quickly as possible.

  The merchants along the street are about to be flooded, and there is no time to think about it. Chen Shiyong knocks on the door from door to door, earnestly persuading him to leave. The water level of Banqiao River was too high, and the water accumulated on the road surface for a long time was caused by backward flow. He took the lead in launching water for investigation and went down to block the drainage outlet. "The drainage facilities in the city are our key focus. Once a fault occurs, it is likely to cause urban waterlogging." Chen Shiyong said, "In the past, we ensured traffic. Now, we have to ensure safety."

  Chen Shiyong led the team members to work continuously for dozens of hours, during which mobile pump trucks were dispatched to help drain more than 30 times, helping to drain nearly 420,000 cubic meters of water. It’s still raining, but the accumulated water has gradually receded.

  In order to prevent urban waterlogging and flood season, Hefei Urban and Rural Flood Control Headquarters strictly implemented the 24-hour duty system and the leadership shift system in flood season. On the one hand, strengthen the inspectors who are on duty under the bridge and at the flood-prone points to ensure that the personnel are on the job and carry out emergency response at the first time; On the other hand, ensure that "the accumulated water is as little as possible and the accumulated water time is as short as possible".

Buddhist murals in ancient cliff caves in the Himalayas

A few days ago, according to the website of National Geographic magazine, the mountain climber Lena Oztuk entered the remote Himalayan cave in the ancient kingdom with an expedition and found a large number of ancient manuscripts.

During this expedition, they found a large number of paintings and manuscripts of Xizang in the 15th century, and the origami in Oztuk’s hand was one of them. These cultural relics can be associated with the source of inspiration of Shangri-La in the real world. In the novel Lost Horizon, which was popular among readers in 1930s, the British writer james hilton described Shangri-La as a fictional paradise.

Until recently, only a handful of people personally explored these mysterious caves dug on the steep cliff surface, because Upper Mustang is a forbidden area in Nepal and has been closed to outsiders for a long time. In 2007, a research team led by Broger coburn, an American researcher and Himalayan expert, and Pete assas, a veteran mountaineer, headed for the cliff where the rocks were peeling off and explored these artificial caves.

In two new documentaries, The Lost Himalayan Cave Temple and The Secret of Shangri-La, premiered by American Public Broadcasting Corporation on November 18th, 2009, the audience can see a series of treasures that they found during this trip and the second expedition in 2008.

The expedition found human remains.

During the exploration of Shangri-La Cave in Upper Mustang, Nepal in August 2008, the expedition team found some human remains. The man in the photo is assas, a mountain climber, who is staring at these bones. In 2007, assas and his colleagues discovered a Buddhist temple in Tibet, which was decorated with exquisite murals. Among them, a group of Buddhist murals consisted of 55 paintings, depicting the life of the Buddha. During the second exploration in 2008, the expedition discovered some human remains dating back to 600 years ago, a large number of precious manuscripts, and some small paintings as decorations.

Buddhist murals found in caves on cliffs

These Buddhist murals in remote Mustang caves were discovered in 2008, and they were carved in the steep cliffs above the Kaligandaki River watershed. Mark Turing of the Digital Himalayan Project of Cambridge University in the United Kingdom said that the Kingdom of Gumustan is called "the end of the world", which is full of vitality, profound cultural heritage and diversified religious beliefs.

A realistic version of Shambhala?

A 13th-14th century painting found on the wall of a cave in the kingdom of Gumustan depicts Mahagara, the patron saint of Buddhists in Xizang, that is, the dark sky. The cultural treasures found in Mustang caves mean that these places are related to the "hidden valley" that is believed to represent Shambhala, a Buddhist spiritual paradise. Many scholars believe that Shambhala has a corresponding place in the real world.

Coburn, head of the expedition, said: "These hidden valleys were born in the era of struggle, when Buddhist practice and leaders were threatened." In the novel of 1933, British writer Hilton introduced the concept of "Shambhala" to describe the lost valley of Shangri-La. Shangri-La is an isolated mountain area and a treasure house of cultural wisdom.

Precious religious materials

For centuries, although the Mustang Cave has not been spared from predators, coburn’s expedition discovered about 30 volumes of religious writing materials and collected some precious manuscripts from them. Coburn said that the cool and dry climate in mountainous areas provided a good environment for the preservation of ancient manuscripts, which included both Buddhist and local contents. This religion is an early indigenous religion in Xizang. Two religious writings show that after Xizang converted to Buddhism, the local people’s belief in this religion lasted for at least one or two centuries. Buddhism was introduced into Xizang in the 8th century.

Found human remains 600 years ago

A member of the expedition holds a human skull found in a remote Mustang cave in Nepal. In 2008, the expedition discovered human remains dating back to 600 years ago. The area where the remains are located may be a tomb, indicating that these caves were once used to bury the dead.

 

Collate the ancient written materials of Xizang.

In 2008, in one of the Mustan caves, Oztuk sorted out and classified a pile of ancient Xizang scripts. These manuscripts contain writings of Buddhism and this religion, which was a native religion in early Xizang. The expedition that discovered these 15th-century manuscripts believed that King Mustang did not choose to burn the books of this religion, but abandoned them in the cave, which was obviously a choice to show respect.

Turing of the Digital Himalayan Project at Cambridge University said that the discovery of these manuscripts may also be related to the tradition of Xizang people deliberately hiding religious works. He said: "These findings are obviously of great significance to the study of Xizang people’s traditions. People have discovered hidden manuscripts, or hidden cultural knowledge. These things may be lost or deliberately hidden. "

Avian influenza epidemic: FDA detected avian influenza virus in milk in food stores.

Original crossbow u replies to global doctors’ organization

Pay attention to the latest research progress of avian influenza epidemic

Recently, a case of human infection caused by avian influenza occurred in Texas, USA, involving a dairy worker. This is the second human case of avian influenza reported in the United States. At present, the patient’s condition is mild and has recovered.

At present, there is no evidence that avian influenza virus has spread from person to person, but infection has been found in 32 dairy cows in at least 8 States. Therefore, scientists and food safety experts are worried that the discovery of avian influenza in dairy cows is likely to affect the spread and spread among dairy cows.

Avian influenza virus experts have noticed that compared with birds, the discovery of avian influenza virus in poultry and mammals is a new phenomenon, which means the variability of the virus.

According to the current report, in addition to birds, many mammals, such as minks, skunks and raccoons, have also reported cases of bird flu.

Experts speculate that it may be accidental, that is, mammals may be infected by eating dead birds or touching bird droppings, but the virus does not spread between their groups.

Scientists believe that vaccination is an effective means to prevent and control avian influenza in poultry, but for large mammals such as cows, the vaccine effect is limited.

At present, scientists are speeding up the research on genetically engineered animals that can resist avian influenza virus and developing more effective vaccines to deal with the potential avian influenza virus pandemic.

In a word, through the experience and lessons of COVID-19 epidemic, active prevention is the key to prevent and control this potential global health threat.

According to the official report of CDC, the symptoms of avian influenza virus infection in humans are not specific, ranging from mild eye infection to severe respiratory symptoms, and also include common symptoms such as fever, cough, sore throat and dyspnea. Severe cases may require hospitalization.

In order to accurately diagnose and identify whether the patient is infected with avian influenza virus, it should be suggested to collect samples from the patient’s respiratory tract for laboratory pathogen detection.

According to the latest report of FDA, in a large-scale study, it was found that pasteurized milk contained avian influenza virus particles (the virus itself has been inactivated), but it did not seem to pose a risk to human health.

FDA epidemic monitor said that the pasteurization process has been providing good health and safety guarantee for public health for hundreds of years, and it is believed that the current avian influenza virus will not pose a health risk to consumers.

"Even if viruses are detected in raw milk, pasteurization can usually eliminate pathogens to a level that does not pose a risk to consumers’ health."

FDA officials added that "in addition to evaluating various types of dairy products (whole milk, cream), more tests and analysis are being conducted on milk on the shelves of stores across the United States".

However, avian influenza virus has been detected in raw milk before, and health authorities have been advising people not to eat raw milk.

April 24th: The latest monitoring by the US Department of Agriculture (USDA) shows that there are cases of avian influenza virus infecting cows in nine states:

Related report information:

Original title: Avian Influenza Epidemic: FDA Detects Avian Influenza Virus in Food Store Milk.

Read the original text

After the cancellation of the provincial toll station, the high-speed toll has quietly increased? The official explanation is coming.

1137336_ copy.jpg

  earlier times

  1. The charge is based on "5", "37 is five, and 28 is zero";

  2. The same starting point and ending point, different routes are charged at the lowest cost;

  3. Freight cars are charged by weight

  at present

  1. According to the actual path, ETC can be charged to the nearest minute;

  2. According to the actual (accurate) driving route, segment deduction or charging is performed;

  3. Freight cars are charged by car (axle)

  Since January 1st, after all the provincial toll stations of expressways were cancelled, some car owners in Xi ‘an suddenly found that the charges of the expressway sections they often take have changed, which is a little higher than before. Is it a price increase quietly?

  The owner wondered.

  Toll increased after New Year’s Day?

  Recently, some netizens posted: "In the past, from Gaoxin to Xianyang West, ETC around the city has been charging 9.5 yuan. After the New Year’s Day, the same journey was displayed as 0 at the exit, but the actual deduction for inquiring about ETC was 12.91 yuan, which was 36% higher than the original. A hearing should be held on the issue of fees related to people’s livelihood. How can it just go up?"

  Some netizens said: "On January 2nd, the airport expressway, 5 yuan became 6 yuan. Don’t underestimate it, it rose by 20%.".

  After the withdrawal of the station, not only in Xi ‘an, but also in all parts of China, netizens were surprised by the price increase of expressway sections, thinking that there was a disguised price increase.

  In addition, Mr. Wang, the owner of Xi ‘an, also found that the short-distance high-speed charges seem to have dropped. He told reporters that he started in 5 yuan at a high speed before, but in the past two days, he went up from Yanta Road around the city entrance to Gaoxinkou and paid 3 yuan money.

  ■ Reporter experience

  The toll of many sections has gone up, and it is also surprising that 1 yuan charges.

  On January 6th, the reporter from Huashang Daily took a bus to experience the charges of some high-speed sections. Since the vehicles were not equipped with ETC, they could only take the manual passage.

  Go around the city from Gaoxin to Xianyang West: 14 yuan. Asked whether the price has increased, the toll collector said, "No, the charging method is accurate, which used to be calculated by integers."

  From Xianyang West to Seoul Toll Station: 12 yuan. The toll collector said there were more 2 yuan than before.

  From Seoul Toll Station to Weiyang Toll Station: 1 yuan. According to 5 yuan, which started before, this short distance is cheap.

  From Weiyang Toll Station to Airport Toll Station: 13 yuan, the toll collector said that there was no price increase, and handed the reporter a note on the adjustment of the charging method, indicating that the charging method had changed.

  From the airport toll station to the Seoul toll station: 12 yuan, the toll collector said it was increased by 2 yuan.

  ■ Old driver comments

  Higher prices than lower prices, high-speed office workers spend more money.

  Li Shifu, who has been driving for more than 20 years, commented that the price increase was more than the price decrease. "If the fee is only reduced below 5 yuan, there will not be many beneficiaries, because generally speaking, the short distance of one or two kilometers does not need to be on the high speed."

  Li Shifu believes that most people take the high-speed mileage above 10 yuan, so the toll will increase, especially those who take the high-speed highway to work for a long time, and the transportation fee will obviously rise. Take the airport expressway as an example. In the past, 10 yuan’s money was now 12 yuan, and there were more 4 yuan round trips.

  During the experience, the reporter also noticed that there was no long queue congestion in the above toll stations. Relatively speaking, the ETC lane was very smooth, and there were a little more vehicles in the artificial lane, which required a short queue.

  ■ Relevant policies

  More accurate billing. ETC charges are accurate to the minute.

  At 0: 00 on January 1st, all the 21 provincial toll stations of expressways in Shaanxi Province and seven neighboring provinces were cancelled. When vehicles pass through the inter-provincial expressway, the main line will pass without stopping. At the same time, the expressway toll mode is adjusted, and the ETC vehicle toll amount is calculated to the nearest minute according to the rounding principle, and the manual toll is calculated to the nearest yuan according to the rounding principle. ETC vehicles enjoy a 5% toll concession when passing through the national expressway.

  That is to say, it is precisely because of this change in charging methods that in the reporter’s experience, figures like 1 yuan, 12 yuan, 13 yuan and 14 yuan have appeared, instead of 5 yuan and 10 yuan. After the ETC vehicle toll is calculated by the corresponding discount, there will be a penny. Huashang Daily reporter lin li

Source: Huashang. com-Huashang Daily

one 2

Related hot word search:

An earthquake of magnitude 3.0 occurred in Wenchuan, Sichuan at 8: 56 this morning.

  BEIJING, Chengdu, March 21 (Xinhua) According to the Sichuan Seismological Network, at 8: 56 on the 21st, a magnitude 3.0 earthquake occurred in Wenchuan County, Sichuan (31.2 north latitude, 104.2 east longitude).


  At 5: 22 on the 21st, an earthquake of magnitude 2.2 occurred in Changning, Sichuan (28.7 north latitude and 105.0 east longitude). (End)

Editor: Xu Guimei