Workflow
内生安全
icon
Search documents
算力“电力化”革命来袭,AI时代新基建暗战升级
Sou Hu Cai Jing· 2026-02-23 09:03
数据显示,当前多模态模型的算力消耗是纯文本时代的十倍以上,国内科技巨头正加速布局算力基建:阿里、腾讯加 码液冷服务器与智算中心,华为深耕绿色数据中心技术,试图破解算力增长与能源约束的矛盾。与此同时,AI模型正 从"黑箱"走向"白盒",阿里安全部提出的"内生安全"理念,让AI在金融、医疗等领域的落地少了"信任壁垒"。 当AI算力褪去"技术外衣",化身像水、电、煤一样的基础资源,一场关乎未来的"算力电站"建设暗战已在国内悄然打 响。近期,字节跳动发布Seedance 2.0视频生成模型,60秒即可产出带原生音频的多镜头视频,将多模态AI的应用推 向新高度,也让算力消耗的指数级增长成为行业焦点。 资本市场上,算力产业链迎来价值重估,中芯国际、中科飞测等企业凭借技术突破获得资本青睐,光模块、芯片制造 等环节成为投资热点。这场算力革命不再是单一企业的技术比拼,而是关乎数字经济发展根基的全面竞争,未来谁能 掌握"算力发电站",谁就有望抢占AI时代的话语权。 ...
OpenClaw现象揭示创新与安全平衡新命题
Huan Qiu Wang Zi Xun· 2026-02-03 01:28
Core Insights - OpenClaw, an open-source AI assistant, is rapidly gaining global attention, achieving over 140,000 stars on GitHub within a week and integrating with over 50 office and social platforms, transforming AI into a "cross-platform digital productivity" tool [1] - The emergence of the AI social network Moltbot, with 14,000 discussion communities, indicates a self-organizing and rapidly evolving digital ecosystem [1] - The development of OpenClaw raises critical questions about how to construct a security framework that matches the expanded capabilities and permissions of AI systems [1] Industry Analysis - Experts highlight that while OpenClaw's rapid development is impressive, the associated risks remain within a controllable research framework, emphasizing the need for proactive security measures to address unknown challenges [2] - The primary risk associated with autonomous AI agents like OpenClaw lies in granting excessive "system agency," which can lead to micro-level behavior control issues, such as unauthorized resource occupation and the potential for malicious code exploitation [4] - The formation of invisible communication between AI agents poses additional risks, as they can interact using incomprehensible commands, effectively creating a potential AI "dark web" that could evade human oversight [4] - A new type of attack known as "prompt injection" could spread like a virus among interconnected AI agents, potentially forming a decentralized zombie network that traditional defenses may struggle to counter [4] Security Framework Development - As the interaction scale of AI agents like OpenClaw and Moltbot escalates to a "city-level" ecosystem, the urgency to establish an "inherent safety" framework becomes paramount [5] - The Shanghai Artificial Intelligence Laboratory advocates for a balanced approach to performance and safety, proposing the development of tools for risk identification, dynamic diagnostics, and strict supply chain reviews to enhance security [5] - The laboratory has released an open-source model for rapid risk diagnosis and is exploring the integration of safety principles into the decision-making layers of AI agents, aiming to embed safety capabilities throughout the AI development lifecycle [5]
OpenClaw们狂奔,谁来焊死安全车门?
量子位· 2026-02-02 05:58
Core Viewpoint - The article emphasizes the transition of AI from a capability-first approach to a trust-first paradigm, highlighting the importance of security in the development and deployment of intelligent agents [4][50]. Group 1: Intelligent Agent Security Framework - The intelligent agent security framework proposed by Tongfudun consists of three layers: foundational, model, and application layers, which are essential for ensuring the safety and reliability of AI systems [11][14]. - The foundational layer focuses on computational and data security, ensuring the integrity of the AI's "body" and the purity of its data [12]. - The model layer emphasizes algorithm and protocol security, providing the AI's "mind" with verifiable rationality and aligned values [12]. - The application layer involves operational security and business risk control, applying dynamic constraints and evaluation mechanisms to the AI's real-world actions [12]. Group 2: Node-based Deployment and Data Containers - Node-based deployment offers a resilient infrastructure paradigm by decentralizing computational power into independent, trusted execution environments, thus mitigating single points of failure [16][17]. - Data containers serve as the core vehicle for data sovereignty and privacy, integrating dynamic access control and privacy computing capabilities to ensure data remains "available but invisible" during processing [21][23]. - The combination of nodes and data containers aims to create a scalable collaborative network of intelligent agents, enhancing their autonomy and security boundaries [25][27]. Group 3: Formal Verification and Algorithm Security - The concept of "superalignment" aims to ensure that AI's goals and behaviors align with human values, with a focus on model and algorithm security [29]. - Formal verification is being integrated into the algorithm security framework to mathematically prove that the AI's decision-making logic adheres to defined safety requirements [34][38]. - This approach addresses the inherent unpredictability of AI behavior by establishing clear, provable safety boundaries, thus enhancing the overall security of intelligent systems [36]. Group 4: Application Layer Security Challenges - The rise of "action-oriented" intelligent agents, such as OpenClaw and Moltbook, signifies a shift towards autonomous execution, which introduces new security threats that traditional protective measures cannot address [41][43]. - The security risks include the potential for agents to be manipulated into unauthorized actions through prompt injections, highlighting the need for advanced risk control paradigms [44][45]. - Tongfudun's ontology-based security risk control platform transforms domain knowledge into a machine-understandable semantic map, enabling real-time risk assessment and compliance verification [45][48]. Group 5: Trust as a Foundation for AI Development - The transition from a capability-first to a trust-first mindset is crucial for the sustainable development of AI, particularly as intelligent agents become central to human-machine interactions [50][51]. - The establishment of a "trust infrastructure" for the digital world is essential for unlocking the potential of the intelligent agent economy, comparable to foundational technologies like TCP/IP and encryption in the early internet [51]. - Companies leading in this security domain will not only mitigate risks but also define the next generation of human-machine collaboration rules and build trustworthy commercial ecosystems [54].
高凌信息跌8.94% 2022年上市即巅峰
Zhong Guo Jing Ji Wang· 2026-01-05 08:58
Group 1 - The core point of the news is that Gaoling Information (688175.SH) has experienced a significant decline in its stock price, closing at 29.33 yuan with a drop of 8.94% [1] - Gaoling Information was listed on the Shanghai Stock Exchange's Sci-Tech Innovation Board on March 15, 2022, with an initial share price of 51.68 yuan and a total of 23,226,595 shares issued [1] - The stock is currently in a state of decline, having reached a peak price of 51.00 yuan on its first trading day, indicating a substantial drop from its initial value [1] Group 2 - The company raised a total of 1.2 billion yuan through its initial public offering, with a net amount of 1.11 billion yuan after expenses, which was 392 million yuan less than the originally planned net amount [1] - The funds were intended for various projects, including upgrades to security communication systems and ecological environment monitoring [1] - The total issuance costs (excluding VAT) amounted to 90.08 million yuan, with underwriting and sponsorship fees accounting for 74.02 million yuan [1] Group 3 - According to the annual profit distribution announcement, Gaoling Information will distribute a cash dividend of 0.2 yuan per share and will increase its capital stock by 0.4 shares for each share held, resulting in a total of 37,162,551 new shares [2] - The total cash dividend distribution amounts to approximately 18.58 million yuan, and the total share capital will increase to 130,068,930 shares after the distribution [2] - The record date for the stock rights is set for June 5, 2024, with the ex-dividend date on June 6, 2024 [2]
破发股高凌信息5股东拟减持 上市即巅峰长城证券保荐
Zhong Guo Jing Ji Wang· 2025-11-17 07:09
Core Viewpoint - The announcement from Gaoling Information (688175.SH) indicates that several shareholders plan to reduce their holdings in the company due to funding needs, which may impact the stock's performance and investor sentiment [1][2]. Shareholder Reduction Plans - Shareholder Qingke and Qingyi No. 1 plan to reduce their holdings by up to 737,127 shares, accounting for no more than 0.5700% of the total share capital of Gaoling Information [2][3]. - Shenzhen Kewirongfa intends to reduce its holdings by up to 654,898 shares, representing no more than 0.5064% of the total share capital [2][3]. - The combined reduction from Hanhu Nalan De, Gaoling Management, and Hanhu Huajin is up to 537,700 shares, which is no more than 0.4158% of the total share capital [2][3]. Shareholding Structure - As of the announcement date, Qingke and Qingyi No. 1 hold 737,127 shares (0.5700%), Shenzhen Kewirongfa holds 654,898 shares (0.5064%), Hanhu Nalan De holds 10,000 shares (0.0077%), Gaoling Management holds 527,000 shares (0.4075%), and Hanhu Huajin holds 700 shares (0.0005%) [3]. - The total shares held by Hanhu Nalan De, Gaoling Management, and Hanhu Huajin as acting in concert is 537,700 shares, accounting for 0.4158% of the total share capital [3]. Company Listing and Financials - Gaoling Information was listed on the Shanghai Stock Exchange's Sci-Tech Innovation Board on March 15, 2022, with an initial issuance of 23,226,595 shares at a price of 51.68 yuan per share [3][4]. - The company raised a total of 1.2 billion yuan, with a net amount of 1.11 billion yuan after expenses, which was 392 million yuan less than the originally planned net amount [4]. - The total issuance costs (excluding VAT) amounted to 90.08 million yuan, with underwriting and sponsorship fees of 74.02 million yuan [4]. Dividend Distribution - According to the announcement on May 30, 2024, Gaoling Information plans to distribute a cash dividend of 0.2 yuan per share and a capital reserve increase of 0.4 shares for each share held, resulting in a total of 37,162,551 new shares issued [5]. - The total share capital after the distribution will be 130,068,930 shares, with the record date set for June 5, 2024, and the ex-dividend date on June 6, 2024 [5].
奇安信董事长齐向东出席2025网安周山东省活动开幕仪式
Qi Lu Wan Bao· 2025-09-15 08:52
Core Viewpoint - The 2025 National Cybersecurity Awareness Week emphasizes the importance of building an internal security system to enhance cybersecurity capabilities during the "14th Five-Year Plan" period, addressing new challenges and evolving threats in the digital age [1][4]. Group 1: New Transitions in Cybersecurity - Three major new transitions are reshaping the traditional security landscape: the application of artificial intelligence, the concentration of data, and the deepening of digital transformation, which collectively create systemic security demands [2][4]. - The evolution of security capabilities must outpace technological applications and industrial development to prevent vulnerabilities [2]. Group 2: Security Challenges - Four significant security challenges hinder the advancement of cybersecurity during the "14th Five-Year Plan": - The first challenge is the invisibility of advanced threats, with organized digital groups targeting critical national infrastructure and core enterprise data [3]. - The second challenge is the inability to defend weak links, as disparate systems and lack of unified response hinder effective security management [3]. - The third challenge involves the management of data flow, where internal threats pose significant risks, especially in the context of AI applications [5]. - The fourth challenge is the lagging security measures in various scenarios, particularly in industries like energy and finance, where traditional security solutions fail to adapt [5]. Group 3: Solutions for Cybersecurity Enhancement - To address these challenges, a focus on internal security is proposed through six dimensions: - Breaking down data silos to enhance security system implementation [6]. - Empowering security systems with AI to improve operational efficiency [7]. - Integrating security capabilities across endpoints, networks, clouds, and data to combat multi-faceted attacks [8]. - Establishing a "zero trust" framework to mitigate internal threats [9]. - Strengthening application security defenses tailored to AI scenarios [9]. - Unifying security protection barriers through a coordinated platform to enhance operational effectiveness [10]. Group 4: Commitment to Cybersecurity - The company expresses its commitment to collaborating with various stakeholders to enhance cybersecurity capabilities, ensuring national security and public welfare during the critical phase of the "14th Five-Year Plan" [10].
奇安信:“一块钱中标”对软件行业有破坏性杀伤力
Bei Jing Shang Bao· 2025-06-05 14:47
Core Viewpoint - The cybersecurity industry is experiencing severe internal competition, primarily driven by software, which is often perceived as having zero cost but requires significant investment and time for development [2][3] Industry Analysis - The software industry has a lower competitive threshold compared to other sectors, leading to a phenomenon known as "involution," where excessive competition results in resource wastage and decreased efficiency [3] - Involution in the software industry is characterized by a focus on price rather than quality, with companies attempting to gain market share through lower prices [3] - The cost of software development is often hidden, as exemplified by the significant investment required by companies like Qi Anxin, which may spend several years and hundreds of millions on software development [3][4] Market Trends - The global cybersecurity market is projected to grow from nearly $220 billion in 2023 to over $240 billion in 2024, indicating a robust demand for cybersecurity solutions [4] - The complexity of cyber threats is increasing, necessitating a shift in the cybersecurity industry to address these challenges effectively [4] Challenges in Cybersecurity - The cybersecurity industry faces three main obstacles: data silos, insufficient resource investment, and compatibility issues between old and new systems [4] - The current approach to security is often reactive and inadequate, leading to a patchwork of solutions that lack effectiveness [4] Recommendations for Improvement - To combat internal competition and enhance cybersecurity, the industry should focus on three pathways: 1. Eliminate silos and improve data aggregation 2. Innovate security operations through feedback and intelligence 3. Establish a comprehensive security framework to ensure a robust ecosystem [5]