IT'S ALIVE! China's Jade Rabbit rover RETURNS from the DEAD

'Mechanical abnormality' still a problem, though


It appears that China's Jade Rabbit lunar explorer is not as dead as it looked, as Chinese officials say that the moon rover has managed to awaken from its slumber.

China initially reported that the country's first lunar rover, Yutu, or the Jade Rabbit, couldn't be restored after it experienced a "mechanical abnormality" right before it went into shutdown while awaiting the return of the Sun to power up its solar panels.

But a spokesman for the Moon programme said that the team had managed to get a response from the plucky machine, though experts were still trying to figure out what was wrong with it.

"Yutu has come back to life!" Pei Zhaoyu told state news agency Xinhua.

Pei said the rover was now receiving signals normally, but it's not out of the woods yet as it's still troubled by that pesky "mechanical control abnormality".

"The rover stands a chance of being saved now that it is still alive," he said.

Yutu, named after the pet rabbit of mythological Moon goddess Change'e, whose moniker is used throughout China's Moon missions, was feared dead after it suffered from a glitch right before heading into the lunar night at the end of January.

The State Administration of Science, Technology and Industry for National Defence said at the time that the rover was having trouble because of the "complicated lunar surface environment". The rover landed on the Moon in December for a mission that was hoped could last three months. ®

Similar topics

Broader topics


Other stories you might like

  • Beijing-backed baddies target unpatched networking kit to attack telcos
    NSA, FBI and CISA issue joint advisory that suggests China hardly has to work for this – flaws revealed in 2017 are among their entry points

    State-sponsored Chinese attackers are actively exploiting old vulnerabilities to "establish a broad network of compromised infrastructure" then using it to attack telcos and network services providers.

    So say the United States National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI), which took the unusual step of issuing a joint advisory that warns allied governments, critical infrastructure operators, and private industry organizations to hurry up and fix their IT estates.

    The advisory states that network devices are the target of this campaign and lists 16 flaws – some dating back to 2017 and none more recent than April 2021 – that the three agencies rate as the most frequently exploited.

    Continue reading
  • Former chip research professor jailed for not disclosing Chinese patents
    This is how Beijing illegally accesses US tech, say Feds

    The former director of the University of Arkansas’ High Density Electronics Center, a research facility that specialises in electronic packaging and multichip technology, has been jailed for a year for failing to disclose Chinese patents for his inventions.

    Professor Simon Saw-Teong Ang was in 2020 indicted for wire fraud and passport fraud, with the charges arising from what the US Department of Justice described as a failure to disclose “ties to companies and institutions in China” to the University of Arkansas or to the US government agencies for which the High Density Electronics Center conducted research under contract.

    At the time of the indictment, then assistant attorney general for national security John C. Demers described Ang’s actions as “a hallmark of the China’s targeting of research and academic collaborations within the United States in order to obtain U.S. technology illegally.” The DoJ statement about the indictment said Ang’s actions had negatively impacted NASA and the US Air Force.

    Continue reading
  • TikTok US traffic defaults to Oracle Cloud, Beijing can (allegedly) still have a look
    Alibaba hinted the gig was worth millions each year

    The US arm of Chinese social video app TikTok has revealed that it has changed the default location used to store users' creations to Oracle Cloud's stateside operations – a day after being accused of allowing its Chinese parent company to access American users' personal data.

    "Today, 100 percent of US user traffic is being routed to Oracle Cloud Infrastructure," the company stated in a post dated June 18.

    "For more than a year, we've been working with Oracle on several measures as part of our commercial relationship to better safeguard our app, systems, and the security of US user data," the post continues. "We still use our US and Singapore datacenters for backup, but as we continue our work we expect to delete US users' private data from our own datacenters and fully pivot to Oracle cloud servers located in the US."

    Continue reading

Biting the hand that feeds IT © 1998–2022