<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: AI & Emerging Tech]]></title><description><![CDATA[This section examines how China is integrating AI and other emerging technologies into its cyber and defense capabilities – from AI-assisted vulnerability discovery and military-industrial applications to quantum computing research and the strategic debates shaping China's innovation path.]]></description><link>https://www.nattothoughts.com/s/ai-and-emerging-tech</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: AI &amp; Emerging Tech</title><link>https://www.nattothoughts.com/s/ai-and-emerging-tech</link></image><generator>Substack</generator><lastBuildDate>Thu, 21 May 2026 02:08:18 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Is This Chinese Company Watching the World to Train its AI?]]></title><description><![CDATA[The story of Meari Technology reveals how insecure-by-design IoT infrastructure, global surveillance exposure, and China&#8217;s tech ecosystem are converging into a new model of AI-enabled data power.]]></description><link>https://www.nattothoughts.com/p/is-this-chinese-company-watching</link><guid isPermaLink="false">https://www.nattothoughts.com/p/is-this-chinese-company-watching</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 20 May 2026 15:03:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!e-5Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On May 11, 2026, The Verge, a US-based technology online media outlet, <a href="https://www.theverge.com/tech/926487/meari-technology-hack-baby-monitor-security-camera">reported</a> that French cybersecurity research <a href="https://www.linkedin.com/in/sammy-azdoufal-2118a625/">Sammy Azdoufal</a> discovered in early March that over one million smart devices in 118 countries &#8211; including baby monitors, security cameras and pet-monitoring cameras, can be remotely accessed. Anyone who knows how can view private images and live streams from these devices.</p><p>The manufacturer of these devices is a Chinese company named <a href="https://www.meari.com/en">Meari Technology</a> (&#35269;&#30591;&#31185;&#25216;) (Meari). Meari is an Original Design Manufacturer (<a href="https://www.seacomp.com/resources/oem-vs-odm-manufacturing">ODM</a>) or white-label manufacturer, meaning the company designs and builds products, which are then sold and rebranded by other companies. In this case, Meari claims that the company&#8217;s products have been distributed to more than 100 countries, with over 35 million users, according to its official <a href="https://www.meari.com/en/aboutUs">website</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e-5Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e-5Q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 424w, https://substackcdn.com/image/fetch/$s_!e-5Q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 848w, https://substackcdn.com/image/fetch/$s_!e-5Q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!e-5Q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e-5Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg" width="1186" height="509" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:509,&quot;width&quot;:1186,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:61940,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nattothoughts.com/i/198499114?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e-5Q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 424w, https://substackcdn.com/image/fetch/$s_!e-5Q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 848w, https://substackcdn.com/image/fetch/$s_!e-5Q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!e-5Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F267f99d2-8d63-475c-b749-3706db4ae9b6_1186x509.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Meari app from Apple Store; source: screenshot by the Natto Team</figcaption></figure></div><p>Sammy Azdoufal has discussed with the Natto Team how he reached out to inform Meari of the vulnerabilities in their products and how he encountered difficulties for over <a href="https://github.com/xn0tsa/nobody-puts-baby-in-a-corner/blob/master/DISCLOSURE_TIMELINE.md">two months</a>, from when he first contacted Meari Technology on March 2 to when the five high-risk Meari vulnerabilities were formally <a href="https://www.runzero.com/advisories/">disclosed</a> on May 11 by <a href="https://www.runzero.com/">RunZero</a>, an official CVE Numbering Authority (CAN) and enterprise exposure management and asset discovery platform. </p><p>The Natto Team felt Sammy&#8217;s deep frustration during this process. Sammy told the Natto Team after he discovered the vulnerabilities at the end of February that he just wanted the company to fix the vulnerabilities as quickly as possible because seeing the faces of strangers&#8217; children floating on the Internet made me &#8220;want to throw up.&#8221; However, after he emailed Meari on March 2 about his vulnerability discovery, he received no response for nine days, despite Sammy&#8217;s effort to contact the company through all possible channels. When Meari&#8217;s security team finally did start communicating with Sammy on March 11, Meari initially responded with what Sammy characterized as &#8220;<a href="http://theverge.com/tech/926487/meari-technology-hack-baby-monitor-security-camera">veiled threats</a>.&#8221; Eventually the company did address the primary flaw and issue a bug bounty award for his help, but this took six weeks of frustration, which Sammy has documented on his <a href="https://github.com/xn0tsa/nobody-puts-baby-in-a-corner/blob/master/DISCLOSURE_TIMELINE.md">Github page</a>.</p><p>This reminded us of the Natto Team&#8217;s previous <a href="https://www.nattothoughts.com/p/what-a-narrative-control-failure">report</a> that detailed the story of Australian security researcher <a href="https://sick.codes/">Sick Codes</a> and his <a href="https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/">discovery</a> in 2020 of vulnerabilities in Android TVs made by TCL, a Chinese multinational electronics company and the world&#8217;s second-largest TV manufacturer. The Natto Team&#8217;s previous research suggested that The TCL case in 2020 had taught the Chinese government and companies a lesson in how to respond to vulnerability reports by independent foreign researchers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> However, six years later, Meari appears not to have learned the lesson that TCL did in 2020.</p><p>Indeed, the Meari case exposes a deeper problem. Meari&#8217;s <a href="https://themeridiem.com/security/2026/5/11/iot-security-crosses-from-isolated-flaws-to-fleet-wide-collapse">Infrastructure-level vulnerabilities</a>, not device-level flaws, enabled the exposure of over a million IoT (Internet of Things) devices. The case suggested that Meari fails to embrace the secure-by-design approach, in which security is proactively embedded into a system from the ground up. In fact, according to Sammy&#8217;s security audit <a href="https://github.com/xn0tsa/meari-cloudedge-security-audit/blob/master/README.md">analysis</a>, which he shared with the Natto Team, Meari Technology: &#8220;possesses by-design, architectural access to every camera deployed worldwide. This is not a single misconfiguration or an isolated bug. The platform&#8217;s core architecture -- from MQTT [Message Queuing Telemetry Transport] broker topology to credential provisioning, from alert image storage to peer to peer (P2P) relay infrastructure -- is built such that the vendor (Meari) and anyone who compromises the vendor can monitor, control, and extract footage from any customer&#8217;s camera at any time, without the customer&#8217;s knowledge or consent.&#8221; Sammy documented 12 independent pieces of evidence in his security audit and discovered &#8220;each individually proves some degree of vendor-side access. Taken together, Meari establishes that no meaningful security boundary exists between Meari&#8217;s backend infrastructure and the end-user&#8217;s camera feed.&#8221;</p><p>It appears that Meari&#8217;s by-design, architectural access to every camera deployed worldwide may have its own reasons. The Natto Team noticed that the same week in March 2026, when Sammy was anxiously waiting for a response from Meari, the company went <a href="https://www.zhonglun.com/news/trade/55759.html">public</a> on March 9. Chinese market commentators praised Meari&#8217;s successful IPO as a market recognition of Meari as a smart IoT firm &#8220;with core technologies and global market capabilities.&#8221; Meari&#8217;s share price doubled in the second trading day, reflecting investor enthusiasm for the company&#8217;s future growth. The contrast between a company with unsecure products distributed globally and a company celebrating its success domestically makes us wonder who Meari Technology really is.</p><p>In this piece, the Natto Team takes a deep dive into Meari Technology to understand how a domestically acclaimed tech company maneuvers the global market, how Meari&#8217;s response to vulnerability reporting reflects the ecosystem of vulnerability management in China, and how companies like Meari compete to develop artificial intelligence (AI) technologies.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Natto Thoughts is a reader-supported publication. To receive new posts and support the Natto Team&#8217;s work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.nattothoughts.com/p/is-this-chinese-company-watching">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Chasing Palantir: Inside China’s Obsession and the Rise of Its Next-Generation AI-enabled Defense Firms ]]></title><description><![CDATA[Chinese companies face institutional barriers as they strive to emulate Palantir&#8217;s provision of AI-enabled military-industrial applications to governments]]></description><link>https://www.nattothoughts.com/p/chasing-palantir-inside-chinas-obsession</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chasing-palantir-inside-chinas-obsession</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 06 May 2026 14:02:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!U1-3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><em><strong>Who is China&#8217;s Palantir?</strong></em></p><p><em><strong>The answer isn&#8217;t a single company, but an emerging ecosystem</strong></em></p><p><em><strong>                                    &#8212;- An anonymous Chinese AI industry expert</strong></em></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U1-3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U1-3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 424w, https://substackcdn.com/image/fetch/$s_!U1-3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 848w, https://substackcdn.com/image/fetch/$s_!U1-3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 1272w, https://substackcdn.com/image/fetch/$s_!U1-3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U1-3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4076310,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nattothoughts.com/i/196576705?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U1-3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 424w, https://substackcdn.com/image/fetch/$s_!U1-3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 848w, https://substackcdn.com/image/fetch/$s_!U1-3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 1272w, https://substackcdn.com/image/fetch/$s_!U1-3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d29cec6-9e8e-4588-af6c-a318f4d393b7_1024x1024.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Palantir. Source: <a href="https://commons.wikimedia.org/wiki/File:Palantir_%28animated_AI_illustration%29.gif">WikiMedia Commons</a></figcaption></figure></div><p>In early April 2026, five weeks into the US and Israel&#8217;s war on Iran, a Washington Post <a href="https://www.washingtonpost.com/national-security/2026/04/04/china-ai-military-intelligence-iran-war">report</a> detailed a burgeoning market of private Chinese firms using artificial intelligence (AI) with open-source data to track U.S. military movements. These firms analyze intelligence on carrier groups and aircraft locations during the conflict. The report specifically highlighted two five-year-old companies : MizarVision (&#35269;&#29109;&#31185;&#25216;) and Jing&#8217;an Technology (&#38742;&#23433;&#31185;&#25216;). Both are based in Hangzhou, a city widely <a href="https://www.bloomberg.com/news/newsletters/2025-02-13/deepseek-s-hometown-hangzhou-emerges-as-center-of-china-s-ai-universe">considered</a> the &#8220;center of China&#8217;s AI universe.&#8221; The Natto Team discovered that these companies, and a dozen others, have vied for the honor of being considered &#8220;<a href="https://eu.36kr.com/en/p/3518782283848838">China&#8217;s Palantir,</a>&#8221; amid market hype over the role of AI in the military-industrial sector.</p><p>U.S.-based software company <a href="https://www.palantir.com/">Palantir Technologies</a> builds data integration and analytics platforms used by governments and commercial organizations around the world. Its products have reportedly played significant roles in recent <a href="https://www.youtube.com/watch?v=5MEooDH6XpU">conflicts</a>, including the Israeli Defense Ministry&#8217;s use of AI-driven battlefield analytics in <a href="https://www.business-humanrights.org/en/latest-news/palantir-allegedly-enables-israels-ai-targeting-amid-israels-war-in-gaza-raising-concerns-over-war-crimes/">Gaza</a> in 2024 and U.S. operations in Iran in 2026, which <a href="https://www.thetimes.com/world/middle-east/article/palantir-ai-software-us-iran-war-lwld892z9">enabled</a> the targeting of Iranian Supreme Leader Ali Khamenei. In April 2026, Palantir sparked global <a href="https://www.techpolicy.press/palantirs-manifesto-and-the-digital-sovereignty-of-other-nations/">controversy</a> by <a href="https://x.com/PalantirTech/status/2045574398573453312">publishing</a> a 22-point &#8220;manifesto&#8221; on X (formerly Twitter) that some <a href="https://www.techpolicy.press/palantirs-manifesto-is-as-subtle-as-a-maga-hat/">commentators</a> viewed as expressing a highly militaristic worldview with dangerous aspirations regarding AI, surveillance, and <a href="https://www.theguardian.com/technology/2026/apr/21/palantir-manifesto-uk-contract-fears-mps">autonomous weapons</a>.</p><p>In a November 2025 <a href="https://www.youtube.com/watch?v=0JlXtkTcmaM&amp;t=13s">interview</a> with The Axios Show, a digital media outlet based in the U.S., when asked &#8220;what should we worry about AI?,&#8221; Palantir CEO Alex Karp stated that the biggest risk of AI is the possibility of China winning the race for dominance. It appears Mr. Karp&#8217;s concerns seem valid; Palantir serves as a beacon for numerous Chinese companies striving for global influence. Many believe that China&#8217;s own Palantir(s) are those high growth companies that the Chinese government wants and needs to win global dominance.</p><p>In this post, the Natto Team analyzes two studies about Palantir from Chinese perspectives&#8212;one written in 2017 by an academic scholar and the other in 2026 by an industry AI expert&#8212;to reveal reasons behind China&#8217;s obsession with Palantir and barriers to the emergence of Chinese Palantir wannabes. It also sheds light on the evolution of the Chinese military-industrial sector and identifies the companies inspired by Palantir.</p><p>Although China&#8217;s Palantir-like companies have not fully emerged, they are on the horizon.</p><p>(Note: The appendix of this post provides a list of Chinese companies that have been mentioned by various Chinese media or have self-identified as being, or resembling, China&#8217;s Palantir. For more information about these companies, please contact <a href="mailto:nattoteam@nattothoughts.com">nattoteam@nattothoughts.com</a>.)</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/chasing-palantir-inside-chinas-obsession">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Chinese Firm Claims AI-Driven Bug Discovery Near Claude Mythos Scale]]></title><description><![CDATA[Chinese companies could match the capabilities attributed to Claude Mythos within months, according to industry experts, reinforcing existing cyber offense asymmetries]]></description><link>https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability</link><guid isPermaLink="false">https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 22 Apr 2026 13:03:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TRDG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3e4f5-c84e-44fd-bace-cf37376dd738_660x377.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p>&#8220;Whoever masters automated vulnerability discovery technology holds the upper hand in cyber offense and defense&#8221; &#8211; Zhou Hongyi, Chairman and CEO, 360 Digital Security Group (2018)</p></blockquote><p>On April 7, 2026, artificial intelligence developer Anthropic <a href="https://www.anthropic.com/glasswing">introduced</a> its new general-purpose model Claude Mythos Preview to a restricted partnership of over 40 vetted organizations, including major technology and cybersecurity firms, as part of its defensive security initiative Project Glasswing. The company stated that the Claude Mythos model has identified thousands of high-severity vulnerabilities across widely used software, including major operating systems and web browsers. Crucially, in some cases it can autonomously develop exploits and chain vulnerabilities without human intervention. Anthropic has not released the system publicly, citing the risks associated with such capabilities and the need for further safeguards before deployment at scale.</p><p>While independent assessment remains limited and technical details are sparse, governments are already responding: U.S. officials have <a href="https://www.theguardian.com/technology/2026/apr/10/us-summoned-bank-bosses-to-discuss-cyber-risks-posed-by-anthropic-latest-ai-model">reportedly briefed</a> financial institutions on AI-enabled cyber risks, while German authorities <a href="https://web.archive.org/web/20260410201011/https://www.politico.eu/article/german-cyber-agency-braces-for-significant-disruption-from-anthropics-ai-hacking-tech/">have warned</a> of significant disruption and the capacity of such systems to transform vulnerability discovery.</p><p>Recent developments suggest that similar capabilities are being explored in China. In February 2026, Natto Thoughts <a href="https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps">described</a> how a team from 360 Digital Security Group (&#22855;&#34382;360, hereafter &#8220;360&#8221;), which won first place at the 2026 Tianfu Cup, a major Chinese exploit hacking contest,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> had relied extensively on AI-assisted discovery and exploitation, with its team lead stating that AI has evolved &#8220;from an auxiliary tool to the core engine of vulnerability discovery.&#8221; The team that placed third made similar claims. This raises a central question: have Chinese companies already developed systems with capabilities comparable to those claimed for Claude Mythos, and how might differences in institutional context shape their impact?</p><p>This analysis focuses on 360 as a primary case study, given its position as a leading cybersecurity company in China, its strong track record in top-tier vulnerability research, and the relative visibility of its recent AI-related disclosures.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>  Recent disclosures describe internally developed multi-agent systems capable of identifying vulnerabilities, supporting exploit development, and automating parts of the research workflow that were previously manual, with claimed discovery at a scale approaching Anthropic&#8217;s description of Claude Mythos. Other firms appear to be pursuing similar approaches, though with more limited public information. The analysis then considers how such capabilities could translate into an asymmetric offensive advantage in China&#8217;s favor.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Pick Your Innovation Path in AI: Chinese Edition]]></title><description><![CDATA[China&#8217;s advances in AI show the effects of a state approach of &#8220;introduce, digest, absorb, re-innovate&#8221; and years of debate on the balance between market-driven innovation and state-led development]]></description><link>https://www.nattothoughts.com/p/debating-chinas-ai-path-alternative</link><guid isPermaLink="false">https://www.nattothoughts.com/p/debating-chinas-ai-path-alternative</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 09 Jul 2025 16:01:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EsIF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0348e2cd-d3e2-4266-8c2d-ba390861e829_1402x645.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>When the Chinese start-up <a href="https://api-docs.deepseek.com/news/news1210">DeepSeek launched</a> its artificial intelligence (AI) chatbot in December 2024, many Americans suddenly realized that <a href="https://www.nytimes.com/2025/05/19/opinion/china-us-trade-tariffs.html">China could compete in AI.</a> News of this breakthrough sparked debate on whether <a href="https://www.wired.com/story/stanford-study-global-artificial-intelligence-index/">China could win the AI race</a> and <a href="https://www.economist.com/china/2025/05/25/xi-jinpings-plan-to-overtake-america-in-ai">surpass the dominance</a> of the United States in AI and on <a href="https://www.foreignaffairs.com/united-states/what-if-china-wins-ai-race">the implications if China were to succeed.</a> In April 2025, Chinese President Xi Jinping delivered <a href="https://cset.georgetown.edu/publication/xi-politburo-collective-study-ai-2025/">remarks</a> on artificial intelligence during a Politburo study session on AI, Xi&#8217;s first pronouncement on the subject since 2018. &#8220;Persist in Being Self-Reliant, Be Strongly Oriented Toward Applications, and Push the Orderly Development of Artificial Intelligence,&#8221; was Xi&#8217;s main message, according to a Chinese state media summary of his speech. <a href="https://digichina.substack.com/p/xis-ai-message-to-the-politburo-analyzed">Experts suggested</a> that Xi&#8217;s comments signaled China&#8217;s determination to achieve AI supremacy. China has come a long way since the release of the State Council&#8217;s <a href="https://www.newamerica.org/cybersecurity-initiative/digichina/blog/full-translation-chinas-new-generation-artificial-intelligence-development-plan-2017/">New Generation Artificial Intelligence Development Plan</a> in 2017. Back then, Chinese schola&#8230;</em></p>
      <p>
          <a href="https://www.nattothoughts.com/p/debating-chinas-ai-path-alternative">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Red Dragon Searches for Pearls Through Quantum Tunneling – But You’ve Got the Wrong Paper]]></title><description><![CDATA[A September paper, soon hushed up, shows Chinese researchers may have discovered a class of quantum-annealing algorithm capable of attacking cryptography in a novel way]]></description><link>https://www.nattothoughts.com/p/chinas-quantum-tunneling-breakthrough</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-quantum-tunneling-breakthrough</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Tue, 22 Oct 2024 17:45:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zqlW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zqlW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zqlW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zqlW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zqlW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zqlW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zqlW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2600130,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zqlW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zqlW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zqlW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zqlW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb94bfc1f-090c-486e-b383-b9ca458e21ba_4368x3144.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Art image: &#32005;&#40845;&#23563;&#29664; (Red Dragon Seeking for Pearls) commissioned by Natto Thoughts. See the artist&#8217;s interpretation in the note section.</figcaption></figure></div><p>Recent <a href="https://www.theregister.com/2024/10/14/china_quantum_attack/">media coverage</a> has intensified discussions about quantum computing&#8217;s potential threat to modern cryptography, following a <a href="https://www.scmp.com/news/china/science/article/3282051/chinese-scientists-hack-military-grade-encryption-quantum-computer-paper">South China Morning Post (SCMP) report</a> on a breakthrough by Chinese researchers using quantum-based techniques to compromise symmetric encryption algorithms. The SCMP article highlighted research published in the <em>Chinese Journal of Computers</em> (CJC) (&#35745;&#31639;&#26426;&#23398;&#25253;) on September 30; however the article did not specify the date of the Journal publication. The reported research detailed the use of the D-Wave Advantage quantum processor to attack the lightweight encryption ciphers of PRESENT, GIFT-64, and RECTANGLE. </p><p>Most <a href="https://www.forbes.com/sites/craigsmith/2024/10/16/department-of-anti-hype-no-china-hasnt-broken-military-encryption-with-quantum-computers/">news outlets</a> mistakenly cited the same authors&#8217; earlier paper, <a href="https://web.archive.org/web/20240716145900/http://cjc.ict.ac.cn/online/onlinepaper/wc-202458160402.pdf">published in May 2024</a>, that used D-Wave to run annealing algorithms targeting the RSA (Rivest-Shamir-Adleman) encryption system. Confusing the new research with t&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-quantum-tunneling-breakthrough">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[When This “Red Boy” Grows Up, AI-Based Tool 360GPT Could Give China an Edge in Cyber Conflict ]]></title><description><![CDATA[Will 360GPT boost Qihoo 360&#8217;s network defense capability? It is still too early to tell, but company founder and CEO Zhou Hongyi has been a key tech tycoon honing China's cyber warfare readiness.]]></description><link>https://www.nattothoughts.com/p/when-this-red-boy-grows-up-ai-based</link><guid isPermaLink="false">https://www.nattothoughts.com/p/when-this-red-boy-grows-up-ai-based</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Fri, 12 May 2023 02:39:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uIYW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab49c270-302b-449f-bf82-7025181233da_640x360.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On April 6, Zhou Hongyi (&#21608;&#40511;&#31054;), the founder, and CEO of Qihoo 360, the largest cyber security company in China, <a href="https://web.archive.org/web/20230510021509/https://www.sohu.com/a/664049411_135869">boasted</a> at a local digital development forum that the company&#8217;s <a href="https://www.360.cn/brain_of_security/">360 Brain of Security</a>, allegedly &#8220;the world&#8217;s largest distributed intelligence security system,&#8221; will incorporate Generative Pre-trained Transformers (GPT), an artificial intelligence (AI) tool, to defend clients against network attacks. Zhou touted GPT as a productivity enhancement tool that will unleash a new industrial revolution. Indeed, he said, all software, applications, and websites ought to be reinvented with GPT&#8217;s capability. Zhou revealed that Qihoo 360 has the world&#8217;s largest pool of security big data. This data advantage, together with &nbsp;GPT&#8217;s knowledge, understanding and reasoning ability and the company&#8217;s existing Brain of Security system, will enable Quihoo 360 to excel in defending clients against network attacks in the future.</p><h1>Meet 360GPT, the Red Boy</h1><p>Zhou Hongyi is the first Chinese tech tycoon wh&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/when-this-red-boy-grows-up-ai-based">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>