<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Scanning &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/scanning/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Fri, 18 Jun 2021 09:25:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>China raids Bitcoin &#8216;mine&#8217;</title>
		<link>https://en.spress.net/china-raids-bitcoin-mine/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 09:25:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bankers Association]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[các]]></category>
		<category><![CDATA[CBECI]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China News Weekly]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Far west]]></category>
		<category><![CDATA[Harsh]]></category>
		<category><![CDATA[He Yi]]></category>
		<category><![CDATA[Justin Sun]]></category>
		<category><![CDATA[OKEX]]></category>
		<category><![CDATA[Payment Association]]></category>
		<category><![CDATA[raids]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[Search Results]]></category>
		<category><![CDATA[Virtual private network]]></category>
		<category><![CDATA[WEIBO]]></category>
		<category><![CDATA[Xinjiang]]></category>
		<guid isPermaLink="false">https://en.spress.net/china-raids-bitcoin-mine/</guid>

					<description><![CDATA[The Chinese government has begun to crack down on Bitcoin mining sites across the country, and severely censor content about virtual currencies on the Internet. The regions with the most Bitcoin mining factories in China, such as Qinghai and Xinjiang, have been banned by local authorities. In particular, the Qinghai Provincial Administration of Industry and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Chinese government has begun to crack down on Bitcoin mining sites across the country, and severely censor content about virtual currencies on the Internet.</strong><br />
<span id="more-24948"></span> The regions with the most Bitcoin mining factories in China, such as Qinghai and Xinjiang, have been banned by local authorities. In particular, the Qinghai Provincial Administration of Industry and Technology has ordered the closure of Bitcoin mines from June 9, and banned companies from providing land and electricity for crypto projects. According to the <em> Xinhua News Agency</em> , the announcement comes just a day after Chinese President Xi Jinping visited the province and emphasized environmental protection in a speech.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_448_39176276/48b84e1d415fa801f14e.jpg" width="625" height="416"> <em> A Bitcoin mining site in Sichuan. Photo: EPA.</em> On the same day, the branch of the National Development and Reform Commission in Changji, an area in the far west of Xinjiang, ordered the closure of cryptocurrency mining workshops. Currently, Xinjiang is the world&#8217;s largest Bitcoin mining region based on hashrate &#8211; a measure of the total computing power of the blockchain. On the Internet, information related to cryptocurrencies has also been thoroughly removed by China. From June 10, search results related to Huobi, Binance and OKEx &#8211; the top three cryptocurrency exchanges &#8211; were blocked on Baidu and Weibo. However, keywords like &#8220;Huobi official website&#8221;, &#8220;download Huobi&#8221; or &#8220;Is Huobi legal&#8221; still appear. This is the second time in a year that Weibo has removed keywords and content related to cryptocurrency exchanges. In March, this social network suspended the accounts of all three exchanges mentioned above. In 2019, the account of Binance co-founder He Yi, along with crypto entrepreneur Justin Sun, was also locked. Last week, Weibo banned a series of crypto KOLs on its platform citing &#8220;violation of principles&#8221; and &#8220;relevant laws and regulations&#8221;. China&#8217;s recent &#8220;suppression&#8221; of crypto activities is cited as financial risk. However, the country is also concerned that mining problems will compromise its environmental goals. China has a goal of becoming a carbon neutral country by 2060. Bitcoin mining nowadays consumes a lot of energy. According to the latest estimates from the Cambridge University Bitcoin Electricity Consumption Index (CBECI), the amount of electricity used to &#8220;mine&#8221; Bitcoin amounts to 111.5 TWh per year, more than the total energy used by the Netherlands. The prevention of cryptocurrency mining will continue to be maintained by China in the future. On June 7, the Cyberspace Administration of China (CAC) held a meeting with the main content of strengthening supervision of blockchain-related service platforms, virtual private network (VPN) services. and cross-border Internet technologies. Earlier, the National Internet Finance Association, the Bankers Association, and the Payments Association jointly issued a statement on the ban on electronic money services, and the Inner Mongolia Development and Reform Commission also issued a regulation, banning electronic money services. Bitcoin mining operations. “It is possible that China will issue a permanent ban on Bitcoin and cryptocurrencies in general,” said Chen Weigang, general manager of the Financial Institutions Supervision Department of the China Banking and Insurance Regulatory Commission. talk to <em> China News Weekly</em> .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24948</post-id>	</item>
		<item>
		<title>4 recommendations to limit risks from ransomware</title>
		<link>https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</link>
		
		<dc:creator><![CDATA[Khánh Linh]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 17:16:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[FTP]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[recommendation]]></category>
		<category><![CDATA[Recommendations]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Right from the start]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[website]]></category>
		<guid isPermaLink="false">https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</guid>

					<description><![CDATA[Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats. Appropriate measures should be taken to limit the risk from ransomware. Illustration. With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats.</strong><br />
<span id="more-20877"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/fcc826223760de3e8771.jpg" width="625" height="351"> </p>
<p> <em> Appropriate measures should be taken to limit the risk from ransomware. Illustration. </em> With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and demand ransom. Cybercriminals carry out cyberattacks according to a concise strategy that is applicable to many industries. An analysis of recent experts shows that, in 2020 alone, the amount of damage related to ransomware attacks has reached billions of dollars. More dangerously, this behavior also targets the government&#8217;s information technology systems, causing serious impact. To protect critical data from attacks, government IT systems need to ensure external layers of security, while having the added responsibility of maintaining the infrastructure if an intrusion occurs. offense. According to studies, despite the development and expansion of the scope, the attacker&#8217;s methods still have similarities. Most hackers will illegally exploit the lowest-level vulnerabilities first, through some common and easy-to-implement method. Therefore, experts recommend to prevent ransomware from this initial step through some of the following methods. <strong> 1. Secure remote access</strong> Remote access is a familiar method often used by attackers, especially through unpatched vulnerabilities of information systems. Accordingly, hackers are constantly scanning the internet, looking for ways to exploit these vulnerabilities to perform attacks. To combat vulnerability scanning, organizations should prioritize patching vulnerabilities first. Along with that, to protect the system, experts recommend that organizations identify remote access systems to their systems by looking up IP addresses. If an attack is suspected, users should block public access to remote desktop protocol services (iRemoteDesktop &#8211; RDP), a secure shell that encrypts transmission data (Secure Socket Shell &#8211; SSH) ) and file transfer protocol (File Transfer Protocol &#8211; FTP). Agencies and organizations need to ensure that systems for remote access such as firewalls, VPN gateways, and email gateways are regularly patched, perform scanning for security holes, and deploy multi-factor authentication. Multi-factor Authentication (MFA) for accounts that are authorized for remote access. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/6d7e059ab8d9518708c8.jpg" width="625" height="499"> Hackers take advantage of security holes to attack the network. Illustration. <strong> 2. Email security</strong> Many ransomware incidents can start with an email sent to a user. This attack method is gradually becoming popular for hackers to perform blackmail. Experts say it&#8217;s safer to prevent unsolicited emails in the first place. The email security system acts as a &#8220;fence&#8221; to protect the strange messages from the internet and private mailboxes in the intranet system. To avoid email threats, users need to make sure email messages are scanned through a filtering system, and check attachments and links for advanced threats. In addition, account holders should audit or block password-protected documents as hackers often use this method to bypass email data scanning. <strong> 3. Keep data backups safe </strong> The third most common method for ransomware is to identify the target, encrypt the data, and then completely delete the backups. In addition to the data on the network and the data being used directly, the hacker will search all backups and encrypt them, disabling the data to increase the possibility of ransom from the victim. The victim then has a high probability of paying to buy back these encrypted data. Therefore, individuals, agencies and organizations should have backup plans to ensure the safety of all data. <strong> 4. Implement a 3-2-1 . Backup Strategy</strong> Without the right protections, backups, and archiving, concurrent copies on the same network are vulnerable to hackers. To avoid network-wide attacks, experts have come up with a safe backup measure for users&#8217; data systems. For all important files, users should store 3 copies, including 1 primary backup for daily use and 2 backup copies. In it, the files will be saved on 2 different media environments to reduce the possibility of mass attacks. These copies must be in place so that data can be accessed and restored easily and quickly in the event of a failure. At the same time, users should save 1 copy outside the work network or home network, in case of force majeure situations due to natural disasters, unexpected disasters.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20877</post-id>	</item>
		<item>
		<title>Scanning the QR code on the CCCD card, what information do citizens get?</title>
		<link>https://en.spress.net/scanning-the-qr-code-on-the-cccd-card-what-information-do-citizens-get/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 18 May 2021 06:39:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Address]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[CCCD]]></category>
		<category><![CDATA[Chip mount]]></category>
		<category><![CDATA[Circular 06 2021 TT BCA]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[ID]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[ID CCCD]]></category>
		<category><![CDATA[Identity card]]></category>
		<category><![CDATA[If]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Old]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Resident]]></category>
		<category><![CDATA[Right corner]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[sex]]></category>
		<category><![CDATA[System software]]></category>
		<category><![CDATA[To scan]]></category>
		<guid isPermaLink="false">https://en.spress.net/scanning-the-qr-code-on-the-cccd-card-what-information-do-citizens-get/</guid>

					<description><![CDATA[Information on the QR code includes the CCCD number (12 digits); old 9-digit ID card number (if any); First and last name; Date of birth; Sex; Permanent address; Date of issue. Currently, the Ministry of Public Security and the Public Security of the country are still actively receiving applications for issuance of Citizen Identification Cards [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Information on the QR code includes the CCCD number (12 digits); old 9-digit ID card number (if any); First and last name; Date of birth; Sex; Permanent address; Date of issue.</strong><br />
<span id="more-15767"></span> Currently, the Ministry of Public Security and the Public Security of the country are still actively receiving applications for issuance of Citizen Identification Cards (CCCD) with chips to reach the goal of completing 50 million CCCD cards to citizens before July 1.</p>
<p> Since the implementation of the chip-based CCCD card, many citizens have received the card with the form and design, the features are said to be more beautiful and modern, and more convenient than before the ID card/CCCD card. that barcode. Notably, when citizens scan the QR code on the CCCD chip, a series of information will appear. Many readers wonder how to scan the QR code on the CCCD card? What is the meaning of the information obtained after scanning?&#8230; <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_114_38811358/2395dfd9c19b28c5718a.jpg" width="625" height="468"> <em> People can use the camera in their smartphone to scan the QR code. Photo: DANG LE</em> To be able to scan the QR code on the CCCD card, people just need to have a smartphone and use the QR Code feature (with a QR code icon) in the Zalo application, or use the camera on their phone to Point the camera at the QR code area on the CCCD card to be able to extract this data. According to the provisions of Circular 06/2021/TT-BCA regulating the CCCD card model, the QR code is printed on the front, top right corner of the CCCD card. After scanning the QR code, citizens will know the following information: CCCD number (12 digits); previous ID card number 9 (if any); First and last name; Date of birth; Sex; Permanent address; Date of issue. Thus, the old 9-digit ID card number has also been integrated in the QR code, so people when going to handle administrative procedures will not need to present a confirmation of the old ID number for comparison. However, now when citizens transfer from 9-digit ID card to CCCD, they are issued with a certificate confirming the old ID card number. According to Circular 40/2019 of the Ministry of Public Security, when citizens carry out the procedures for granting, changing or re-granting CCCD cards, the citizen identification management agency where the application is received is responsible for issuing a Certificate of ID number to all cases of transferring from 9-digit ID card to CCCD card. In addition, in the process of handling administrative procedures and civil transactions, agencies, organizations and units can also use the QR code scanning function to check personal information and old ID card numbers of customers. people as a basis for settlement. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_114_38811358/94ef62a37ce195bfccf0.jpg" width="625" height="907"> <em> The last sequence of numbers in the QR code scanning information of this CCCD card shows that this person is male, born on December 11, 1995, and the date of issue is February 27, 2021. Photo: DANG LE</em> However, in a few practical cases today, after scanning the QR code on the CCCD card of some citizens, there is no information about the old 9-digit ID card number. In this regard, citizens should not worry because according to the Ministry of Public Security, the reason is that citizens do not declare information about their 9-digit ID number in the residential information collection form, so there is no population database in the population database. this information. The solution for this is that for cases where there is lack of information about the 9-digit ID number in the national population database and CCCD application, the local police will conduct search, verification, and supplementation. supplement and update information. For cases where citizens change from 12-digit ID card to CCCD card, cases of changing or re-issuing CCCD card where citizens have previously declared information about 9-digit ID number, in the citizen identification data there is information. In this case, the National Population Data Center will adjust the system software to automatically update and supplement information.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15767</post-id>	</item>
		<item>
		<title>Last Post: The unforgiving war</title>
		<link>https://en.spress.net/last-post-the-unforgiving-war/</link>
					<comments>https://en.spress.net/last-post-the-unforgiving-war/#respond</comments>
		
		<dc:creator><![CDATA[Hà Thanh]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 05:34:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian Government]]></category>
		<category><![CDATA[Copyright infringement]]></category>
		<category><![CDATA[Crash]]></category>
		<category><![CDATA[Destructively]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[fight]]></category>
		<category><![CDATA[Google News Showcase]]></category>
		<category><![CDATA[Hoang Vinh Bao]]></category>
		<category><![CDATA[Lesson]]></category>
		<category><![CDATA[License]]></category>
		<category><![CDATA[Media Negotiation Law]]></category>
		<category><![CDATA[Ministry of Information and Communications]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[News agency]]></category>
		<category><![CDATA[People s Deputies Newspaper]]></category>
		<category><![CDATA[Post]]></category>
		<category><![CDATA[Press Agency]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[Tolerance]]></category>
		<category><![CDATA[TV channel VOV]]></category>
		<category><![CDATA[unforgiving]]></category>
		<category><![CDATA[War]]></category>
		<guid isPermaLink="false">https://en.spress.net/last-post-the-unforgiving-war/</guid>

					<description><![CDATA[Australia&#8217;s victory over Facebook over paying for news is seen as a clear lesson for Vietnam in the fight against piracy. To eliminate the &#8220;problem&#8221; that has eroded the press&#8217;s revenue as well as the reputation of the media for many years, not only the efforts of the content production units are needed, but also [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Australia&#8217;s victory over Facebook over paying for news is seen as a clear lesson for Vietnam in the fight against piracy.</strong><br />
<span id="more-784"></span> </p>
<p>To eliminate the &#8220;problem&#8221; that has eroded the press&#8217;s revenue as well as the reputation of the media for many years, not only the efforts of the content production units are needed, but also the drastic participation of the agency state management.</p>
<p><strong>Lessons from the Australian war with Facebook</strong><br />
The incident stems from a bill called the Communications Negotiation Law, which was introduced by the Australian Government in 2020 when the state news agency could not reach a voluntary agreement with companies. technology in the face of difficulties caused by Covid-19. On February 18, Facebook removed the entire data feed of dozens of Australian media outlets and restricted the sharing of news content in the country.</p>
<p><img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_11_38531826/223e2ab600f4e9aab0e5.jpg" width="625" height="416"></p>
<p><em> The situation of media piracy in Vietnam is increasing. Photo: Victory</em></p>
<p>Some Australian emergency services have been seriously affected after the move, including pages that report on the Covid-19 epidemic, wildfires or tornadoes &#8230; However, soon after, the Prime Minister Australia Scott Morrison took a tough national stance in his assertion: Facebook&#8217;s actions were arrogant and disappointing.<br />
Faced with the uncompromising attitude of the Australian side, on February 20, Facebook was forced to return to the negotiating table. On February 23, after reaching an agreement, Facebook restored the operation of Australian news sites on the social network. Specifically, the Australian government has agreed to make some amendments to the law to address Facebook&#8217;s concerns with the fact that it has to pay news agencies. In addition, Facebook will conduct specific negotiations on the fees payable for news agencies with content appearing on its platform.<br />
On February 25, the Australian Government officially passed the Law on Negotiation of Digital Platforms and Media, thereby becoming the first country in the world to have its own agency to decide the price of the guys. The tech giant pays if trade negotiations with local news outlets are unsuccessful. This new law will ensure that news companies are paid fair remuneration for the content they create, helping to maintain journalism.<br />
Thus, it can be seen that, although the real tension only lasted for about a week, the impact was extremely great when the Australian Government helped the media in this country get paid properly for their labor. they spend, at the same time creating a stable source of income for many years to come.<br />
<strong>What should the Vietnamese press do?</strong><br />
It can be said that the most important factors for the Australian press to win against Facebook are the solidarity between the press agencies in the country as well as the drastic and uncompromising action from the government. At the forum &#8220;Copyright protection of press works&#8221; held in November 2020, Deputy Minister of Information and Communications Hoang Vinh Bao made a commitment to work closely with press agencies to eliminate the situation of piracy.</p>
<p>When encountering the phenomenon of copyright infringement, the press agencies need to set up a section to keep track of the violations, collate information, and submit written petitions to the competent agency to propose handling. At the same time, closely coordinate with state management agencies in the process of developing legal documents related to copyright issues and closely participate in the implementation process, comment on amendments to legal documents. copy.<br />
On the other hand, press agencies also need to link together and link with network enterprises providing services to comply with the law on copyright issues on the basis of sharing interests, promoting advantages. strong. Not only that, it is also necessary to study, review and consult the experiences of other countries in the handling of copyright of press works, refer to how to trace and protect copyright to best protect the products. intellectual property of their own &#8230; &#8211; Deputy Minister Hoang Vinh Bao offers a solution.<br />
Recognizing that the press copyright infringement originated mainly from the spread of news websites, right from the end of 2019, the Ministry of Information and Communications has launched a series of solutions to rectify as well as improve efficiency. State management results for this group. Specifically, the licensing of general websites has been suspended, and at the same time, strengthening the review with licensed news sites, if there is a situation of taking articles from newspapers and magazines without asking for permission. or acts like electronic newspapers are subject to administrative penalties to license revocation.<br />
In addition, since November 15, 2019, news websites that synthesize news and articles from press agencies are required to have a written agreement, and at the same time must show the link. For access to the news, the original article is below the news, the article is retrieved.<br />
At a lower level, one of the solutions given to limit piracy supported by many press agencies is to form a coalition of press &#8211; management agencies &#8211; technology enterprises to take advantage of its own strength thereby eliminating &#8220;spending time&#8221; which has been aching for many years. And the establishment of the Digital Copyright Center under the Vietnam Digital Media Association at the end of 2020 is one of the concrete strides when for the first time in Vietnam there is a unit applying technology to monitor micro-crime. piracy of the press.<br />
The Digital Copyright Center will apply technology solutions to help press agencies to track their products in real time, thereby determining whether piracy is violated and the extent of infringement. percentage, thereby providing a solution to prevent. Currently the Center&#8217;s system has scanned over 600 newspapers, forums, blogs, 90 million Facebook profiles, 2 million pages and 3 million groups on social networks like Facebook and YouTube &#8230;<br />
According to the director of the Center for Digital Copyright Hoang Dinh Chung, to thoroughly deal with copyright infringement, the press requires intervention by technology, not manually. Violators often use technology to commit violations, so only technology can stop them. With being able to scan the press works through content, images, audio or video &#8230; automatically, detecting violations is very easy and fast.<br />
It is known that the Digital Copyright Center now has many partners who are major newspapers such as VOV TV channel, Tuoi Tien Phong and Children newspaper, Literature and Art Times, People&#8217;s Deputies Newspaper .. .</p>
<p><strong>Countries are claiming benefits for the press from Facebook, Google</strong></p>
<p>The United States: This country&#8217;s Alliance for News and Communications, with nearly 2,000 member organizations, is lobbying Australia to develop the &#8220;Conservation and Competition Press Act&#8221;, allowing publishers to negotiate with Online platform for content distribution terms. Canada: After a campaign in 2020 launched by 105 local newspapers, the Government of Canada has pledged to enact new laws forcing tech giants to pay for news content to appear on its platform. surname. &#8211; France: The French Competition Authority for many years has come up with solutions to call for technology platforms to pay for news. So far, Google is signing a deal worth $ 76 million with a series of French news agencies, allowing their news content to appear on Google News Showcase.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/last-post-the-unforgiving-war/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">784</post-id>	</item>
	</channel>
</rss>