Xiang Ligang thinks: "It is a conspiracy theory to say that the remote detonation of the Apple mobile phone is a conspiracy theory", what do you think?
Can an Apple phone really become a bomb? Xiang Ligang's "conspiracy theory" detonated public opinion
The story begins with an article titled "Saying that the remote detonation of the Apple phone is indeed a conspiracy theory". This article by communications expert Xiang Ligang is like a pebble thrown into a calm lake, which instantly stirs up a thousand waves. The comment section of the observer's online exploded, with netizens questioning the expert's point of view, arguing that he underestimated the possibility of certain forces weaponizing technology. And I, too, joined the discussion, trying to cut through the fog and see what was behind it.
1. Replay of the incident: Experts detonated a public opinion bomb
Xiang Ligang's core point is that it is a conspiracy theory that Apple's mobile phone can be remotely detonated. He believes that Apple's mobile phone users are all over the world, and in order to protect the interests of the company, Apple will not participate in such extreme behavior. He also suggested that the idea of weaponizing high-tech products was too "conspiracy theory."
Netizens didn't buy it. They cite the "black history" of United States intelligence agencies, from spying on allied leaders to working with Israel's spyware company NSO to pinpointing the killing of Iran's military and political leaders, all pointing to a troubling truth: The weaponization of technology is not a fantasy. What's more, he brought out the personal experience of Snowden, the protagonist of "Prism Gate", and pointed to the existence of backdoors in electronic communication equipment and network equipment to facilitate United States surveillance.
2. Peel back the cocoon: the undercurrent behind the incident
The focus of this debate is not only whether the iPhone can be turned into a bomb, but also a deep thinking about national security, technology ethics and international politics.
Money and Life and Death:
Tech giants such as Apple rely on the global market to build their business empires. Once caught in the political maelstrom, its economic interests will suffer a heavy blow. In the face of national security and geopolitical games, can the weight of money still weigh the weight of life and death? History tells us that this is not always the case.
Exception Comparison:
On the one hand, there are optimistic estimates by experts about the "decoratory" of tech giants, and on the other hand, there are unbridled surveillance and assassinations by intelligence agencies; On the one hand, there are people's concerns about personal privacy and security, and on the other hand, there is the convenience and temptation brought by technological progress. This stark contrast makes people wonder, what kind of world do we live in?
Transitions and Thrills:
Mr. Xiang's views sparked a public backlash, which in itself was a dramatic turn. And those exposed surveillance and assassination incidents have stimulated people's nerves and made people realize how sharp the double-edged sword of technology is.
3. Objective evaluation: clear the fog and see the truth
Xiang Ligang's view is not entirely unreasonable. From a business perspective, Apple really has no incentive to actively weaponize its products. He overlooked a key factor: the intervention of state power. In the face of national interests, it is difficult for any enterprise to stand alone. As mentioned in the article, the swift compromise of the Telegram founder's arrest and Zuckerberg's warning from Trump show that tech giants are often vulnerable to power.
More importantly, we cannot underestimate the "bottomlessness" of some national intelligence agencies. In order to achieve their ends, they can do whatever it takes, even ignoring international law and ethics. Historically, the United States deliberately spread the smallpox virus in order to conquer the Indians, resulting in the near extinction of the race. This kind of cruel act is enough to prove that on the road of pursuing interests and expansion, certain countries will do everything they can.
Rather than believing in the "self-discipline" of tech giants, it is better to strengthen the supervision and prevention of technology abuse. We must recognize that technology is a double-edged sword, which can benefit humanity or bring devastating disasters. How to harness this sword is a difficult problem in front of us.
The data corroborates the following:
Snowden's exposure of the "Prismgate" incident exposed the secret program of the United States National Security Agency (NSA) to massively monitor global communications. According to reports, the NSA collects more than 200 million phone records a day and is able to access the servers of the world's major Internet companies to obtain user data. These figures are enough to prove that the surveillance capabilities of some national intelligence agencies have reached alarming levels.
Case Study:
Israel's NSO Group developed spyware "Pegasus", which can hack into a target's phone, steal information, listen to calls, and even control cameras and microphones. The software has been used by intelligence agencies and law enforcement agencies in several countries, causing widespread controversy and concern.
Multi-Perspective Discussion:
From a technical point of view, it is not impossible to implant a backdoor in chips and operating systems. From a political perspective, the risk of weaponization of technology has been exacerbated by the game and confrontation between countries. From an ethical point of view, the misuse of technology poses a serious threat to the privacy and security of individuals.
Question Guidance:
In today's ever-changing technology, how should we balance technological development and security? How can you prevent the misuse of technology? How do you protect your privacy and security?
Solution:
strengthen international cooperation and formulate international norms to regulate the development of science and technology; improve cyber security technology to strengthen protection against malware and cyber attacks; Enhance the public's awareness of cyber security and improve their ability to protect themselves.
I would like to invite you to think about it:
In an age where technology and power are intertwined, how can we protect our safety and freedom? Feel free to leave a message in the comment area and share your views and opinions.