Category: china | 中國 | 중국 | 中華

Ni hao – this category features any blog posts that relate to the People’s Republic of China, the Chinese communist party, Chinese citizens, consumer behaviour, business, and Chinese business abroad.

It is likely the post will also in other categories too.  For example a post about Tong Ren Tang might end up in the business section as well. Inevitably everything is inherently political in nature. At the moment, I don’t take suggestions for subject areas or comments on content for this category, it just isn’t worth the hassle.

Why have posts on China? I have been involved in projects there and had Chinese clients. China has some interesting things happening in art, advertising, architecture, design and manufacturing. I have managed to experience some great and not so great aspects of the country and its businesses.

Opinions have been managed by the omnipresent party and this has affected consumer behaviour. Lotte was boycotted and harassed out of the country. Toyota and Honda cars occasionally go through damage by consumer action during particularly high tensions with Japan.

I put stuff here to allow readers to make up their own  minds about the PRC. The size of the place makes things complicated and the only constants are change, death, taxes and the party. Things get even more complicated on the global stage.

The unique nature of the Chinese internet and sheltered business sectors means that interesting Galapagos syndrome type things happen.

I have separate sections for Taiwan and Hong Kong, for posts that are specific to them.

  • March 2025 newsletter

    March 2025 introduction

    Welcome to my March 2025 newsletter, this newsletter marks my 20th issue. Or one score, as they used to say down the Mecca bingo hall. A score is a common grouping used in everything from selling produce to indicating the scale of an accident in a news headline. In Japan, it signals legal adulthood and is celebrated with personal ceremonies.

    I didn’t know that March was Irish-American Heritage month. I just thought that we had St Patrick’s Day.

    Hopefully April will bring us warmer weather that we should expect of spring. In the meantime to keep my spirits up I have been listening to Confidence Man.

    New reader?

    If this is the first newsletter, welcome! You can find my regular writings here and more about me here

    Strategic outcomes

    Things I’ve written.

    • I curated some of the best analyses on DeepSeek, and more interesting things happening online.
    • Pharmacies are blatantly marketing prescription-only medicines. It’s illegal, there is no GLP-1 permission that allows consumer marketing of prescription-only medicines used for weight loss and weight management.
    • Clutch Cargo – how a 1960s animation managed to transform production and show the power of storytelling.
    • A look back at Skype. I will miss its ring tone when it shuts down in May.
    • Looking at the Majorana 1 chip promising a new generation of quantum computing, generative AI production, refrigeration and an oral history of Wong Kar wai’s In the Mood for Love & 2046.

    Books that I have read.

    • Now and again you come across a book that stuns you. Red Sky Mourning by Jack Carr, is one such book, but not in a good way. Carr is famous because of his service in the American military which he has since parlayed into a successful entrepreneurial career from TV series to podcasts. So he covers all things tactical knowledgeably. Conceptually the book has some interesting ideas that wouldn’t feel that out of place in a Neal Stephenson or William Gibson novel. So Carr had a reasonably solid plan on making a great story. But as the saying goes, no plan survives first contact with the enemy. Carr’s enemy was his own writing style without aggressive editing. The editing process is a force multiplier, breathing the artistic brevity of Ernest Hemingway into a manuscript and protecting the author from their own worst impulses. I found the book hard to read because I would repeatedly run up against small niggly aspects, making it hard to suspend disbelief and get into the story. Carr loves his product brands, in this respect Red Sky Mourning reminded me a lot of early Brett Easton-Ellis. Which got me thinking, who is Carr actually writing for? Part of the answer is Hollywood, Carr’s books have been optioned by Amazon, one of which was adapted as The Terminal List. I imagine that another audience would be young (privileged caucasian male) management consultant types who need a bit of down time as they travel to and from client engagements – after a busy few days of on-site interviews, possibly with a tumbler of Macallan 12 – which was purchased in duty-free. The kind of person who considers their Tumi luggage in a tactical manner. The friend who gave it to me, picked it up for light reading and passed it on with a degree of incredulity. On the plus side, at least it isn’t a self-help book. It pains me to end a review so negatively; so one thing that Jack Carr does get right is the absolute superiority of Toyota Land Cruisers in comparison to Land Rover’s products. If you have it in hard copy, and possess sufficient presence of mind, it could serve you well in improvised self-defence as it comes in at a substantial 562 pages including the glossary and acknowledgements.
    • The Decagon House Murders by Yukito Ayatsuji is a classic murder mystery. A university crime club with each member named after a famous fictional detective gather to investigate a murder on an isolated island. The book slowly unravels the answer to the K-University Mystery Club’s annual trip bringing it to a logical conclusion.
    • She Who Became the Sun by Shelley Parker-Chan was an interesting piece of Chinese historical fiction. It is less fantastic than the wuxia works of Louis Cha that dominated the genre previously. More here.
    • Chinese Communist Espionage – An Intelligence Primer by Peter Mattis and Matthew Brazil tells the story of modern China through the story of its intelligence services. From the chaos under Mao purges and the Cultural Revolution to forces let loose by ‘reform and opening up’. More here.
    • In the early 2000s, as we moved towards a social web, we saw a number trends that relied on the knowledge of a group of people. Crowdsourcing channeled tasks in a particular way and became a popular ‘innovation engine’ for a while. The wisdom of crowds captured the power of knowledge within nascent question and answer platforms. Prediction markets flourished online. Superforecasting by Tetlock and Gardner try and explain who and why these models work, particular where they rely on knowledge or good judgement. The book does a good job at referencing their sources and is readable in a similar way to a Malcolm Gladwell book.

    Things I have been inspired by.

    Why does humour in advertising work?

    My Dad is a big fan of the Twix bears advertisement, so much so, that he repeats the script verbatim when it comes on. We know that humour works and that it’s under-used in advertising, but it would be good to have data behind that in order to support it as a suggestion to clients.

    twix bears

    WARC have published What’s Working In Humorous Advertising which goes a good way to providing that support.

    The takeouts from the report include:

    • Humour as a memory hook: Comedy surprises and delights, it makes consumers stop, engage and then remember. Over time it builds into nostalgia.
    • It relies on universal insights – that work across age cohorts, cultures and geographies. Its also intrinsically shareable – and not just on social platforms.
    • Celebrity x humour drives fame: Well-executed humour paired with celebrity endorsements, (Ryan Reynolds being a standout example) boosting brand impact.
    • Well executed humour can supercharge marketing ROI. Ads with humour are 6.1x more likely to drive market share growth than neutral or dull ads.

    Accessible advertising

    The Ad Accessibility Alliance have launched The Ad Accessibility Alliance Hub, which made me reflect on accessibility as a subject. I can recommend the hub as it provides good food for thought when considering mandatories for creative. ISBA’s reframing accessible advertising helps make the business case beyond the social benefits of inclusivity. The ISBA also provides links to useful assets. Finally, I can recommend Designing Interactions by Bill Moggridge which provides a broader context to help think about accessible advertising as part of a system.

    Social platform benchmarks

    RealIQ have done great research of engagement rates across thousands of brands in a number of sectors. What we get is an engagement benchmark set across platforms and industries. We can debate the value of engagement, and the different nature of platforms, so you can’t compare across platforms.

    Chart of the month.

    What I could compare in the RealIQ data was the rate in change in engagement rates year-on-year. The clear losers over time were Facebook and Twitter at an aggregate level. This also explains the x-tortion (as Forrester Research described them) tactics being deployed by Twitter. Combining high rates of engagement decline and reduced reach means that Twitter doesn’t look particularly attractive as a platform vis-a-vis competitors.

    Change in platform engagement

    Things I have watched. 

    Hunt Korean spy film

    Hunt (헌트) is a great Korean film. It provides a John Le Carré style spy hunt story in 1980s era South Korea prior to the move towards democracy. It’s a stylish, if brutal film that touches on parts of South Korea’s history which we in the west tend to know very little about. Hunt takes an unflinching look at the legacy of the military government as well as their North Korean rivals.

    Philip Kaufman‘s The Right Stuff is a movie adaptation of Tom Wolfe’s account based on US post-war fighter development through to the height of the Mercury space programme. The film went on to receive eight nominations at the Academy Awards. You have an ensemble cast of great character actors who deal with the highs and lows at the cutting edge of aerospace technology. The Right Stuff is as good as its reputation would have you believe. The film captures the drama and adventure that Wolfe imbued his written account of the journey to space. As a society it is good to be reminded that if we put our mind to it the human race is capable of amazing audacious things.

    Disco’s Revenge – an amazing Canadian documentary which has interviews with people from soul and disco stars including Earl Young, David Mancuso, Joe Bataan, Nicky Siano – all of whom were seminal in the founding of disco.

    It also featured names more familiar to house music fans including DJ Spinna, Frankie Knuckles, Kevin Saunderson and John ‘Jellybean’ Benitez – who was key in proto vocal house productions.

    The documentary also shows hip-hop was influenced by disco mixing.

    Along the way it covers the fight for gay rights in the US and its easy to see the continuum onwards to house music and the current dance music scene. It’s one thing knowing it and having read the right books, but the interviews have a power of their own.

    It takes things through to ‘club quarantine’ during the COVID-19 lockdown.

    I hate that’s its streaming only, rather than Blu-Ray but if you can put that one issue aside and watch it. If you try it and enjoy it, you’ll also love Jed Hallam‘s occasional newsletter Love Will Save The Day.

    I picked up a copy of Contagion on DVD, prior to COVID and watched it with friends in a virtual social manner during lockdown. This probably wasn’t the smartest move and I spent the rest of lockdown building my library of Studio Ghibli films instead. It’s a great ensemble film in its own right. Watching it back again now I was struck by how much Contagion got right from Jude Law’s conspiracy theorist with too much influence and combative congressional hearings.

    The film makers had the advantage of looking back at SARS which had hit Hong Kong and China in 2002 – 2004. Hong Kong had already been hit by Avian flu H5N1 from 1997 to 2002. Both are a foot note in history now, I had a friend who picked up their apartment on the mid-levels for 30 percent below 1997 market rates due to the buffeting the Hong Kong economy took during this time. The only thing that the film didn’t envision was the surfeit of political leadership in some notable western countries during COVID, which would have added even more drama to Contagion, not even Hollywood script writers could have made that up.

    Leslie Cheung photographed while playing

    Hong Kong film star Leslie Cheung was taken from us too early due to depression. But the body of work that he left behind is still widely praised today. Double Tap appeared in 2000. In it Cheung plays a sport shooter of extraordinary skill. The resulting film is a twisting crime thriller with the kind of action that was Hong Kong’s trademark. It represents a very different take on the heroic bloodshed genre. At the time western film critics compared it to The Matrix – since the US film was influenced by Hong Kong cinema. Double Tap has rightly been favourably compared by film critics to A Better Tomorrow – which starred Cheung and Chow Yan Fat.

    Useful tools.

    Knowledge search

    Back when I worked at Yahoo!, one of our key focuses was something called knowledge search. It was searching for opinions: what’s the best dry cleaner in Bloomsbury or where the best everyday carry items for a travelling executive who goes through TSA style inspections a few times a week. Google went on to buy Zagat the restaurant review bible. Yahoo! tried to build its own corpus of information with Yahoo! Answers, that went horribly wrong and Quora isn’t much better. A more promising approach by Gigabrain tries to do knowledge search using Reddit as its data source. I’ve used it to get some quick-and-dirty qualitative insights over the past few months.

    Digital behaviour ‘CliffsNotes’

    Simon Kemp launched this year’s Digital 2025 compendium of global online behaviours. It’s a great starter if you need to understand a particular market.

    Encrypting an external hard drive

    I needed to encrypt an external hard drive to transfer data and hadn’t used FileVault to do it in a while. Thankfully, Apple has a helpful guide buried in its support documents. From memory the process seems to have become more complicated over time. It used to be able to be done by using ‘control’ and click on the drive before scrolling down. Now you need to do it inside Disk Utility.

    The sales pitch.

    now taking bookings

    I am now taking bookings for strategic engagements; or discussions on permanent roles. Contact me here.

    More on what I have done here.

    bit.ly_gedstrategy

    The End.

    Ok this is the end of my March 2025 newsletter, I hope to see you all back here again in a month. Be excellent to each other and onward into spring, and enjoy the Easter break.

    Don’t forget to share if you found it useful, interesting or insightful.

    Get in touch if there is anything that you’d like to recommend for the newsletter.

  • She Who Became the Sun & Chinese Communist Espionage

    She Who Became the Sun was a book that I had on my to read list for a while. It glared at my from my must-read stack. Its bright red spine a constant reminder that I hadn’t read it yet.

    I have seen it categorised as ‘transgender fiction’ and fantasy. I thought of it as being closer to the historical fiction genre, a middle-kingdom analogue of Dan Jones’ Essex Dogs trilogy. The protagonist of the book takes on her brother’s name not to identify as male per se, but as a security mechanism, initially finding refuge in a monastery and then concealing her real identity as a soldier.

    At least one of the supporting characters is homosexual, but that reflects the diversity in society at large. Parker-Chan is a fictionalised version of Chinese history, but not one that Louis Cha Leung-yung would have written. It’s for this reason that I reject the notion of the fantasy label from being attached to She Who Became the Sun.

    Like Dan Jones’ work, Parker-Chan does a good job of capturing the grim reality of being poor, the austerity of being religious and the horror of battle. Parker-Chan plays with who gets to be a hero, or a villain and the strong hand of fate throughout the story.

  • DeepSeek & more things

    DeepSeek

    I decided to pull together some of the better resources I could find on DeepSeek. It distracted and disrupted my writing calendar as I was researching a post what will be called Intelligence per Watt, once i have it published.

    John Yun’s take on DeepSeek is well researched and thoughtful rather than a hot take trying to explain why the sky fell in on Nvidia’s share price.

    ChinaTalk have put together a large amount of expert opinions on DeepSeek.

    DeepSeek FAQ – Stratechery by Ben Thompson

    With DeepSeek, China innovates and the US imitates | FT

    DeepSeek displaces ChatGPT as the App Store’s top app | TechCrunch

    Advances by China’s DeepSeek sow doubts about AI spending | FT

    DeepSeek cost tough for Nvidia but great for corporate world | Axios

    Consumer Behaviour

    Going gaga over Labubu – by BBH Culture Studio – Bleats – Chinese toymaker POPMART is the Bearbrick of the 2020s

    We Asked 12 Young Men Across America How They Feel About Trump, Masculinity, and Money. | Esquire

    Everyone’s done with dating apps | Doomscrollers

    FMCG

    Health

    Rapid trials prompt deals rush for Chinese ‘super me-too’ drugs | FT

    More than one in 10 women are taking weight-loss jabs, survey finds | The Telegraph – Concerns around those who are a healthy weight obtaining injections privately, as well as distribution of fake pens

    Study: 67% Of Gen Zs Want To Take Charge Of Their Health But Face Gaps In Communication | Provoke Media – Despite being known as the digitally native generation, Gen Z is skeptical of online health information and even telehealth appointments. In fact, eight in 10 Gen Zs say they’ve encountered false or misleading health information online and more than 60% say prioritizing in-person visits over virtual ones is important to feeling respected by healthcare providers.

    Innovation

    Have America’s industrial giants forgotten what they are for? | FT – Critics say fragmented ownership, weak culture and a fixation on financial results have harmed innovation. The ghost of Jack Welch and Chicago School of Economics continues. But all this isn’t a new idea Judy Estrin’s book Closing The Innovation Gap laid all this out back in 2008.

    Legal

    “Torrenting from a corporate laptop doesn’t feel right”: Meta emails unsealed – Ars Technica

    Luxury

    Louis Vuitton APAC strategy: Inside the luxury brand’s Asian success | Jing Daily“Given the economic downturn and competitive luxury market in China, Louis Vuitton has been seen adjusting its strategy to appeal to more diverse audiences, i.e. launching more affordable bag styles, participating in pricing games (points collecting, coupons refund), and launching cross-over marketing activities,” says Yu.

    This year alone, the house has hosted its exclusive four-hands dinner at its Michelin-starred restaurant, The Hall, alongside Chengdu’s Latin American Michelin one-star restaurant, Mono; launched ultra-limited-edition diamond bracelets and a serpent-inspired timepiece for the Year of the Snake; rolled out its highly anticipated Murakami collaboration; and unveiled a new men’s store at Shanghai’s IFC Mall.

    “[Louis Vuitton’s] strategy is rooted in consistency,” says Xuan Wang, activation director and partner at Tong Global and luxury PR veteran. “It has embraced a more localized approach — granting its Chinese team greater creative autonomy — while not losing the essence of the brand.”

    Breitling to add a third watch brand? | Professional Watches – I am not sure that this is going to work out that well.

    Marketing

    How Beats navigates being at the forefront of culture, not culture wars | The Drum

    Materials

    Interesting video on carbon fibre fabrication and how it has evolved over time, from an artisanal process to mass manufacturing.

    Media

    Apple asks court to halt Google search monopoly case | The Verge

    Online

    The Death of Social Media – by Jonathan Stringfield

    Social media is dead – Boundless Magazine

    Retailing

    Japan’s Costco Resale Shops Struggle to Distinguish Themselves – Unseen Japan

    Technology

    Antiqua et nova. Note on the Relationship Between Artificial Intelligence and Human Intelligence (28 January 2025) – the Holy See on generative AI

    Reckitt: Don’t use AI to increase efficiency at the expense of recruiting junior talent

    Kaspersky finds hardware backdoor in 5 generations of Apple silicon – Robby Pedrica’s Tech Blog

    Tools

    AI prompts for communication and PR | Gemini for Workspace | Google Demini – useful for strategists as well

    Web-of-no-web

    The mainstreaming of AI glasses starts today | Machine Society

    endless.downward.spiral – is this the beginning of the end of What3Words? – Terence Eden’s Blog

    Meta’s CTO said the metaverse could be a ‘legendary misadventure’ if the company doesn’t boost sales, leaked memo shows – probably not that likely.

  • Technical capability notice

    The Washington Post alleged that the British government had served a technical capability notice against Apple in December 2024 to provide backdoor global access into encrypted Apple iCloud services. The BBC’s subsequent report appears to support the Post’s allegations. And begs philosophical question about what it means when the government has a copy of your ‘digital twin’?

    DALL-E surveillance image

    What is a technical capability notice

    A technical capability notice is a legal document. It is issued by the UK government that compels a telecoms provider or technology company that compels them to maintain the technical ability to assist with surveillance activities like interception of communications, equipment interference, or data acquisition. When applied to telecoms companies and internet service providers, it is usually UK only in scope. What is interesting about the technical capability notice allegedly served against Apple is extra-territorial in nature. The recipient of a technical capability notice, isn’t allowed to disclose that they’ve been served with the notice, let alone the scope of the ask.

    Apple outlined a number of concerns to the UK parliament in March 2024:

    • Breaks systems
    • Lack of accountability in the secrecy
    • Extra-territoriality

    Tl;DR – what the UK wants with technical capability notices is disproportionate.

    Short history of privacy

    The expectation of privacy in the UK is a relatively recent one. You can see British spy operations going back to at least the 16th century with Sir Francis Walsingham. Walsingham had a network that read couriered mail and cracked codes in Elizabethan England.

    By Victorian times, you had Special Branch attached to the Metropolitan Police and related units across the British Empire. The Boer War saw Britain found permanent military intelligence units that was the forerunner of the current security services.

    By world war one the security services as we now know them were formed. They were responsible to intercept mail, telegraph, radio transmissions and telephone conversations where needed.

    Technology lept forward after World War 2.

    ECHELON

    ECHELON was a cold war era global signals intelligence network ran by Australia, Canada, New Zealand, the UK and the US. It originated in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971.

    ECHELON was partly inspired by earlier US projects. Project SHAMROCK had started in 1940 and ran through to the 1970s photographing telegram communications in the US, or transiting through the US. Project MINARET tracked the electronic communications of listed American citizens who travelled abroad. They were helped in this process by British signals intelligence agency GCHQ.

    In 2000, the European Commission filed a final report on ECHELON claimed that:

    • The US-led electronic intelligence-gathering network existed
    • It was used to provide US companies with a competitive advantage vis-à-vis their European peers; rather like US defence contractors have alleged to undergone by Chinese hackers

    Capenhurst microwave tower

    During the cold war, one of the main ways that Irish international data and voice calls were transmitted was via a microwave land bridge across England and on to the continent.

    Microwave Network

    Dublin Dame Court to Holyhead, Llandudno and on to Heaton Park. Just next to the straight line path between Llandudno and Heaton Park was a 150 foot tower in Capenhurst on the Wirral. This siphoned off a copy of all Irish data into the British intelligence system. The Capenhurst tower wasn’t that secret, word got about it in the area after it had been built and pretty close guesses were made as to its usage.

    Post-Echelon

    After 9/11, there were widespread concerns about the US PATRIOT Act that obligated US internet platforms to provide their data to US government, wherever that data was hosted. After Echelon was exposed, it took Edward Snowden to reveal PRISM that showed how the NSA was hoovering up data from popular internet services such as Yahoo! and Google.

    RAMPART-A was a similar operation taking data directly from the world’s major fibre-optic cables.

    US programme BULLRUN and UK programme Edgehill were programmes designed to crack encrypted communications.

    So privacy is a relatively new concept that relies the inability to process all the data taken in.

    Going after the encrypted iCloud services hits different. We are all cyborgs now, smartphones are our machine augmentation and are seldom out of reach. Peering into the cloud ‘twin’ of our device is like peering into our heads. Giving indications of hopes, weaknesses and intent. Which can then be taken and interpreted in many different ways.

    What would be the positive reasons to do a technical capability notice?

    Crime

    Increasing technological sophistication has gone hand in hand with the rise of organised crime groups and new criminal business models such as ‘Klad‘. Organised crime is also transnational in nature.

    But criminals have already had access to dedicated criminal messaging networks, a couple of which were detailed in Joseph Cox’ Dark Wire . They use the dark web, Telegram and Facebook Marketplace as outlets for their sales.

    According to Statista less than six percent of crimes in committed in the UK resulted in a charge or summons in 2023. That compares to just under 16 percent in 2015.

    Is going after Apple really going to result in an increased conviction rate, or could the resources be better used elsewhere?

    Public disorder

    Both the 2011 and 2024 riots caught the government off-guard. Back in 2011, there was concern that the perpetrators were organising over secure BlackBerry messaging. The reality that the bulk of it was being done over social media. It was a similar case with the 2024 public disturbances as well.

    So gaining access to iCloud data wouldn’t be that much help. Given the effort to filter through it, given that the signals and evidence were out there in public for everyone to see.

    The big challenge for the police was marshalling sufficient resources and the online narrative that took on a momentum of its own.

    Paedophiles

    One of the politicians strongest cards to justify invasion of privacy is to protect against nonces, paedos and whatever other label you use to describe the distribution of child sexual abuse images. It’s a powerful, emotive subject that hits like a gut punch. The UK government has been trying to explore ways of understanding the size of abuse in the UK.

    Most child abuse happens in the home, or by close family members. Child pornography rings are more complex with content being made around the world, repeatedly circulated for years though various media. A significant amount of the content is produced by minors themselves – such as selfies.

    The government has a raft of recommendations to implement from the The Independent Inquiry into Child Sexual Abuse. These changes are more urgently needed like getting the police to pay attention to vulnerable working-class children when they come forward.

    Terrorism

    The UK government puts a lot of work into preventing and combating terrorism. What terrorism is has evolved over time. Historically, cells would mount terrorist attacks.

    Eventually, the expectation of the protagonist surviving the attack changed with the advent of suicide tactics. Between 1945 and 1980, these were virtually unheard of. The pioneers seem to have been Hezbollah against UN peacekeepers in Lebanon.

    This went on to influence 9/11 and the London bombings. The 9/11 commission found that the security services didn’t suffer from a lack of information, but challenges in processing and acting on the information.

    More recently many attacks have been single actors, rather than a larger conspiracy. Much of the signs available was in their online spiral into radicalisation, whether its right-wingers looking to follow the example of The Turner Diaries, or those that look towards groups like ISIS.

    Axel Rudakubana’s actions in Southport doesn’t currently fit into the UK government’s definition of terrorism because of his lack of ideology.

    I am less sure what the case would be for being able to access every Apple’s cloud twin of their iPhone. The challenge seems to be in the volume of data and meta data to sift through, rather than a lack of data.

    Pre-Crime

    Mining data on enough smartphones over time may show up patterns that might indicate an intent to do a crime. Essentially the promise of predictive crime solving promised in the Tom Cruise dystopian speculative future film Minority Report.

    Currently the UK legal system tends to focus on people having committed a crime, the closest we have to pre-crime was more intelligence led operations during The Troubles that were investigated by the yet to be published Stalker/Sampson Inquiry.

    There are so many technical, philosophical and ethical issues with this concept – starting with what it means for free will.

    What are the negative reasons for doing a technical capability notice?

    There are tensions between the UK government’s stated opinion on encrypted services and the desire to access the data, outlined in Written testimony of Chloe Squires, Director National Security, Home Office.

    The UK Government supports strong encryption and understands its importance for a free, open and secure internet and as part of creating a strong digital economy. We believe encryption is a necessary part of protecting our citizens’ data online and billions of people use it every day for a range of services including banking, commerce and communications. We do not want to compromise the wider safety or security of digital products and services for law abiding users or impose solutions on technology companies that may not work within their complex systems.

    Extra-territorial reach

    Concerns about the US PATRIOT Act and PRISM saw US technology companies lose commercial and government clients across Europe. Microsoft and Alphabet were impacted by losing business from the likes of UK defence contractor BAE Systems and the Swedish government.

    The UK would likely experience a similar effect. Given that the UK is looking to biotechnology and technology as key sectors to drive economic growth, this is likely to have negative impact on:

    • British businesses looking to sell technology services abroad (DarkTrace, Detica and countless fintech businesses). They will lose existing business and struggle to make new sales.
    • Britain’s attractiveness to inbound investments be it software development, regional headquarter functions or infrastructure such as data centres. Having no exposure to the UK market may be more attractive to companies handling sensitive data.
    • You have seen a similar patten roll out in Hong Kong as more companies have moved regional headquarters to Singapore instead.

    The scope of the technical capability notice, as it is perceived, damages UK arguments around freedom-of-speech. State surveillance is considered to have a chilling effect in civilian discussions and has been criticized in the past, yet the iCloud backdoor access could be considered to do the exactly same thing as the British government opposes in countries like China, Hong Kong and Iran.

    Leverage

    The UK government has a challenge in terms of the leverage that it can bring to bear on foreign technology multinationals. While the country has a sizeable market and talented workforce, it’s a small part of these companies global revenues and capabilities.

    They can dial down services in the UK, or they can withdraw completely from the UK marketplace taking their jobs and infrastructure investment with them. Apple supports 550,000 jobs through direct employment, its supply chain, and the iOS app economy. In 2024, Apple claimed that it had invested over £18 billion over the previous five years.

    In terms of the number of people employed through Apple, it’s a big number, let me try to bring it to life for you. Imagine for a moment if every vehicle factory (making cars, tractors,, construction vehicles, race cars and wagons), parts plant, research and development, MOT station, dealership and repair shop in the UK fired half their staff. That is the toll that Apple leaving the UK would have on unemployment.

    Now think about how that would ripple through the community. Less goods bought in the supermarket, less pints poured in a pub or less frequent hair cuts given.

    Where’s the power in the relationship between the tech sector and the government?

    Precedent

    Once it is rumoured that Apple has given into one country’s demands. The equivalent of technical capability notices are likely to be employed by governments around the world. Apple would find it hard not to provide similar access to other 5is countries, China, India and the Gulf states.

    Even if they weren’t provided with access, it’s a lot easier to break in when you know that a backdoor already exists. A classic example of this in a different area is the shock-and-awe felt when DeepSeek demonstrated a more efficient version of a ChatGPT-like LLM. The team had a good understanding of what was possible and started from there.

    The backdoor will be discovered, if not by hackers then by disclosure like the Capenhurst microwave tower that was known about soon after it went up, or by a Edward Snowden-like whistle-blower given the amount of people that would have access to that information in allied security apparatus.

    This would leave people vulnerable from around the world to authoritarian regimes. The UK is currently home to thousands of political emigres from Hong Kong who are already under pressure from the organs of the Chinese state.

    Nigel Farage

    From a domestic point-of-view while the UK security services are likely to be extremely professional, their political masters can be of a more variable quality. An authoritarian populist leader could put backdoors allowed by a technical capability notice to good use.

    Criminal access

    The hackers used by intelligence services, especially those attributed to China and Russia have a reputation for double-dipping. Using it for their intelligence masters and then also looking to make a personal profit by nefarious means. Databases of iCloud data would be very tempting to exploit for criminal gain, or sell on to other criminals allowing them to mine bank accounts, credit cards, conduct retail fraud.

    Vladimir Putin

    It could even be used against a country’s civilians and their economy as a form of hybrid warfare that would be hard to attribute.

    Xi Jinping

    In the past intelligence agencies were limited in terms of processing the sea of data that they obtained. But technology moves on, allowing more and more data to be sifted and processed over time.

    What can you do?

    You’ve got nothing to hide, so why worry? With the best will in the world, you do have things to hide, if not from the UK government then from foreign state actors and criminals – who are often the same people:

    • Your bank account and other financial related logins
    • Personal details
    • Messages that could be taken out of context
    • I am presuming that you don’t have your children’s photos on your social media where they can be easily mined and fuel online bullying. Your children’s photos on your phone could be deep faked by paedophiles or scammers.
    • Voice memos that can be used to train a voice scammer’s AI to be good enough
    • Client and proprietary information
    • Digital vehicle key
    • Access to academic credentials
    • Access to government services

    So, what should you do?

    Here’s some starting suggestions:

    • Get rid of your kids photos off your phone. Get a digital camera, have prints made to put in your wallet, a photo album book, use an electronic picture frame that can take an SD card of images and doesn’t connect to the web or use a cloud service.
    • Set up multi-factor authentication on passwords if you can. It won’t protect you against a government, but it will make life a bit more difficult for criminals who may move on to hacking someone else’s account instead – given that there is a criminal eco-system to sell data en-masse.
    • Use the Apple password app to generate passwords, but keep the record off them offline in a notebook. If you are writing them down, have two copies and use legible handwriting.
    • You could delete ‘important’ contacts from your address book and use an old school filofax or Rolodex frame for them instead. You’re not likely to be able to do this with all your contacts, it wouldn’t be practical. If you are writing them down, have two copies and use legible handwriting.
    • Have a code word with loved ones. Given that a dump of your iCloud service may include enough training data for a good voice AI, having a code word to use with your loved ones could prevent them from getting scammed. I put this in place ages ago as there is enough video out there on the internet of me in a public speaking scenario to train a passable voice generative AI tool.
    • Use Signal for messaging with family and commercially sensitive conversations.
    • My friend and former Mac journalist Ian Betteridge recommended using an alternative service like Swiss-based Proton Cloud. He points out that they are out of the legal jurisdiction of both the US and UK. However, one has to consider history – Crypto AG was a Swiss-based cryptography company actually owned by the CIA. It gave the intelligence agency access to secure communications of 120 countries including India, Pakistan and the Holy See. Numerous intelligence services including the Swiss benefited from the intelligence gained. So consider carefully what you save to the cloud.
    • if you are not resident in the UK, consider using ‘burn devices’ with separate cloud services. When I worked abroad, we had to do client visits in an authoritarian country. I took a different cellphone and laptop to protect commercially sensitive information. When I returned these were both hard reset by the IT guy and were ready for future visits. Both devices only used a subset of my data and didn’t connect to my normal cloud services, reducing the risk of infiltration and contamination. The mindset of wanting to access cloud services around the world may be just the thin end of the wedge. Countries generally don’t put down industrial and political espionage as justifications for their intelligence services powers.

    What can criminals do?

    Criminals already have experience procuring dedicated secure messaging services.

    While both dark web services and messaging platforms have been shut down, there is an opportunity to move the infrastructure into geographies that are less accessible to western law enforcement: China, Hong Kong, Macau or Russia for instance. A technical capability notice is of no use. The security services have two options to catch criminals out:

    • Obtain end devices on the criminal:
      • While they are unlocked and put them in a faraday cage to prevent the device from being wiped remotely.
      • Have an informant give you access to their device.
    • Crack the platform:
      • Through hacking
      • Setting the platform up as a sting in the first place.

    If the two criminals are known to each other a second option is to go old school using a one-time pad. This might be both having the same edition of a book with each letter or word advancing through the book .

    So if you used the word ‘cat’ as the fourth word on line 3 of page 2 in a book you might get something like 4.3.2, which will mean nothing if you don’t have the same book and if the person who wrote the message or their correspondent don’t use 4.3.2 to signify cat again. Instead they would move onwards through the book to find the next ‘cat’ word. A sleuthing cryptographer may be able to guess your method of encryption by the increasing numbers, but unless they know the book your feline secret is secure from their efforts.

    NSA DIANA one time pad

    Above is two pages from an old one-time pad issued by the NSA called DIANA.

    The point is, those criminals that really want to evade security service understanding their business can do. Many criminals in the UK are more likely to rely on a certain amount of basic tactics (gloves, concealing their face, threatening witnesses) and the low crime clearance rate in the UK.

    Instead of a technical capability notice, these criminals are usually caught by things like meta analysis (who is calling who, who is messaging who, who is transferring money etc.), investigative police work including stings, surveillance and informers.

    Why?

    Which begs the questions:

    • Why Apple and why did they choose to serve it in December 2024?
    • What trade-offs have the UK government factored in considering the potiential impact on its economic growth agenda and political ramifications?
    • The who-and-why of the leak itself? Finally, the timing of the leak was interesting, in the early days of the Trump administration.

    I don’t know how I feel about the alleged technical capability notice and have more questions than answers.

    More information

    European Commission Final Report on Echelon  and coverage that appeared at the time of the report’s release: EU releases Echelon spying report • The Register

    Patriot Act und Cloud Computing | iX – German technology press on the risks posed by the Patriot Act

    US surveillance revelations deepen European fears | Reuters – PRISM negatively impacted US technology companies

    NSA’s Prism surveillance program: how it works and what it can do | guardian.co.uk

    The strange similarities in Google, Facebook, and Apple’s PRISM denials | VentureBeat

    Tech Giants Built Segregated Systems For NSA Instead Of Firehoses To Protect Innocent Users From PRISM | TechCrunch

    Computer Network Exploitation vs. Computer Network Attack | Schneier on Security

    EXPLANATORY MEMORANDUM TO THE INVESTIGATORY POWERS (TECHNICAL CAPABILITY) REGULATIONS 2018

  • Zing + more things

    Zing

    HSBC’s Zing shuts down. It didn’t manage to compete effectively against Revolut and Wise. Zing provided cheap foreign exchange. On the face of it HSBC had a number of use cases in its main retail banking markets that would have made sense.

    Hong Kong:

    • 7+ percent of the population are expats. This has been pretty constant over previous decades, though people are constantly coming and departing. A big group of these communities are domestic workers from the Philippines, Indonesia, Myanmar and Sri Lanka. All of whom would benefit from cheap foreign money transfers.
    • Like other developed Asian countries, many young Hong Kongers study abroad. Having a way to cheaply transfer money to and from Hong Kong would be useful for this second group.
    • Finally Hong Kong has a diaspora, with families being spread across the United Kingdom, Australia and Canada.

    UK:

    • 30+ percent of Londoners were born outside the UK. Overall, the UK had ethnic minorities which make up 8 – 10 percent of the population. Many of them have multi-generational links with their homelands.
    • The NHS in particular has a large proportion of skilled foreigners working for them from Filipino intensive care nurses to Greek X-ray technicians.

    Zing decided to launch only in the UK. Despite HSBC’s footprint, it didn’t grab the visibility or market share achieved by Revolut or Wise. It also failed to make money and HSBC seems to have taken a shorter term view to succeed or quit compared to its startup competitors. One could charitably view Zing as a correct view of the ‘fast failure’ model, if learnings from it are taken from it by HSBC and applied effectively.

    Zing shutdown

    Zing is emblematic of Clayton Christensen’s Innovator’s Dilemma where established companies lose market share as they fail to disrupt themselves to compete against new upstart businesses.

    Financial innovation is hard. Barclays closed down their mobile payment system Pingit, NatWest stepped back from its digital bank offering and Vodafone has struggled to expand M-Pesa.

    Beauty

    SkinGPT – hyper-realistic skin simulations powered by GenAI

    China

    US TikTok ‘refugees’ make surprise move to China’s ‘RedNote’ | FT – Xiaohongshu’s technical team were not ready for the complexity of a western audience. What’s interesting is that the move was a political statement to US politicians and a tacit rejection of Meta’s competitor platforms very soon after their ‘pivot to free speech’.

    Economics

    Gen Z Americans are leaving their European cousins in the dust | FT

    Energy

    Toyota rethinks its bet on hydrogen | FT – renewed focus on commercial vehicles that will help drive the build out of hydrogen infrastructure.

    Gadget

    Honda, Sony launch Afeela with microLED external display | EE News Europe – showcased at CES

    Vintage | Hi-Fi News – modern reviews on classic hi-fi models that give you a realistic understanding about how they compare to the current state-of-the-art. A number of the pieces come off much more favourably than I was expecting.

    Obsolete Sony are doing a great job at documenting Sony’s history:

    Ideas

    Kameron Hurley: There Have Always Been Times Like These – Locus OnlineHard times are coming, when we’ll be wanting the voices of writers who can see alternatives to how we live now, can see through our fear-stricken society and its obsessive technologies to other ways of being, and even imagine real grounds for hope. We’ll need writers who can remember freedom. –Ursula K. Le Guin

    Luxury

    ISSUE #1 — ARTSUMERISM – Power Dynamics by COPE – massification of luxury goods might have taken the artisan out of luxe. But has enabled it to develop an art collaboration somewhere between patron and influencer relationship.

    Marketing

    Interesting contrast between Ivy Yang’s A 2025 PR Playbook for an Unpredictable World – by Ivy Yang and Edelman’s Trust Barometer hand wringing around a crisis of grievance – 2025 Edelman Trust Barometer Reveals High Level of Grievance Towards Government, Business and the Rich.

    Kantar Media to be sold to US investment firm for £820m

    Materials

    Shoemaking experts Rose Anvil interview Fitasy on the advantages and challenges of using additive manufacturing for shoes. Fitasy provide a more realistic perspective on the circular economy benefits of filament printing at the end of the interview.

    Media

    It’s Time to End our Subscription Addiction | Futureproof News – the Substack economy can’t scale.

    Advertising folk, Britain’s young news readers are not all like you – The Media Leader

    Online

    About-Face(book) | Spyglass – MG Seigler covers the journey of Meta and Mark Zuckerberg

    Meta puts the ‘Dead Internet Theory’ into practice – Computerworld – Computerworld on Meta’s AI social media profiles designed to have personalities.

    Google’s mobile search results are dropping the ‘breadcrumbs’ from URLs – The Verge

    Will Video Kill the Audio Star in 2025? | Vulture – I find it a bit odd as an idea, but then I do listen to a lot of talking heads YouTube channels without looking at the participants such as TLDR, Chip Stock Investor et al and much of the CNBC content I listen to is an audio track from their TV feed.

    Technology

    ‘ChatGPT’ Robotics Moment in 2025 | AI Supremacy – this is a very software orientated look at things. Lights out factories have been pursued for decades. A big limitation is the physics governing strain wave bearings, which affects size and loads that can be managed. Much of the innovation has been in software until hardware can catch up.

    UK’s elite hardware talent is being wasted. | Josef – this reminds me a lot of working in the chemical and petrochemical industry at the start of my career. When enough people opt out the capability collapses in on itself.

    Daring Fireball: Siri Is Super Dumb and Getting Dumber

    Web of no web

    Tiny chip could offer spectral sensing for everyday devices | TechXplore