Silicon Siege: China's Tech Offensive

Inception Point Ai

This is your Silicon Siege: China's Tech Offensive podcast. Silicon Siege: China's Tech Offensive is your go-to podcast for the latest updates on Chinese cyber operations targeting US technology sectors. Tune in regularly for in-depth analysis of the past two weeks' most significant events, including industrial espionage attempts, intellectual property threats, and supply chain compromises. Gain valuable insights from industry experts as we explore the strategic implications of these cyber activities and assess future risks to the tech industry. Stay informed and prepared with Silicon Siege. For more info go to https://www.quietplease.ai Check out these deals https://amzn.to/48MZPjs

  1. 4 HR AGO

    Silicon Buffet: How Chinese Hackers Are Ghosting Through Your Tech While Dell Scrambles to Clean Up

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, Ting here, your go-to cyber sleuth on all things China hacking chaos. Buckle up for Silicon Siege: China's Tech Offensive, straight from the trenches of the past two weeks ending February 18, 2026. These Beijing-backed crews aren't playing— they're burrowing deep into US tech like termites at a silicon buffet. Picture this: UNC6201, that sneaky Chinese APT squad Mandiant's been tracking, has been exploiting a zero-day in Dell's RecoverPoint for Virtual Machines since mid-2024. CVE-2026-22769, a hardcoded credential nightmare with a perfect 10.0 CVSS score, lets 'em waltz into OS roots, deploy malware like Slaystone, Brickstorm, and their shiny new C# beast Grimbolt—compiled with native AOT to dodge analysts like a ghost in the machine. Dell patched it February 18, but Mandiant says these hackers swapped Brickstorm for Grimbolt last September, creating "Ghost NICs" on VMware ESXi servers to pivot unseen into SaaS and internal nets. Overlaps with UNC5221, aka Silk Typhoon kin, who hit Ivanti zero-days for gov targets. Google's Threat Intelligence Group confirms dozens of US orgs in legal, tech, and manufacturing got Brickstormed—long-term espionage gold. Not done yet. Dragos dropped their 2025 Year in Review February 17, exposing Voltzite—Volt Typhoon's evil twin—embedded in US energy grids, oil, gas, even pipelines via Sierra Wireless AirLink compromises. CEO Robert M. Lee spilled: no IP theft, just sabotage prep, exfiltrating sensor data, configs, and alarm intel to flip the "kill switch" on demand. Newbies Sylvanite and Kamacite are their access brokers, slamming F5, Ivanti, SAP vulns in 48 hours flat for OT deep dives into power, water, manufacturing. JDY botnet scanned energy VPNs for pre-staging. Supply chain? Texas AG Ken Paxton sued TP-Link February 18, calling BS on their "Made in Vietnam" stickers—it's China-dominated parts, subsidies from the PLA, and firmware holes CISA flagged last year that Chinese state actors exploit for home router hacks. Lenovo's dodging a class-action too, accused of piping behavioral data to Beijing under National Intelligence Law. Google's GTIG warns China leads cyber ops volume, hitting defense suppliers and drone tech. Industry pros like Mandiant's crew and Dragos see strategic doom: persistent footholds for wartime blackouts, IP grabs fueling China's AI chip rush despite US export curbs. Future risks? Patch fast, ditch shady hardware, or watch grids go dark. We're talking hybrid war where code is the new missile. Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    3 min
  2. 2 DAYS AGO

    Silicon Spies and Supply Chain Lies: How China Turned US Tech Into Their Personal Buffet

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, Ting here, your go-to cyber sleuth on all things China hacking chaos. Buckle up for Silicon Siege: China's Tech Offensive, straight from the past two weeks' madness ending today, February 16, 2026. Picture this: I'm hunkered in my digital war room, caffeine-fueled, dissecting the feeds as Beijing's cyber ninjas turn U.S. tech into their personal playground. First off, industrial espionage is hitting fever pitch. Google's Threat Intelligence Group just dropped a bombshell, calling out China as the top dog in cyber ops volume, slamming the Defense Industrial Base—think Lockheed Martin and Raytheon suppliers—with a "relentless barrage." These state-sponsored crews are pre-positioning zero-days in edge devices for long-game access, per Google. And get this: China's Ministry of State Security, that shadowy MSS behemoth bigger than FBI and CIA combined, is the puppet master. Bloomberg's podcast spilled how spies like Xu Yanjun got nabbed for cloud-backup blunders while swiping GE Aviation specs. Arthur Ga pled guilty in 2021 for exporting controlled tech—echoes ringing loud now. Intellectual property theft? Non-stop. Palo Alto Networks' Unit 42 spotted TGR-STA-1030, a sprawling espionage op hitting 70 orgs in 37 countries with China-fave tools like Behinder and Godzilla. But Palo Alto chickened out on naming China, scared of Beijing retaliation, Reuters reports. Contrast that with Google's ballsy callout. ASPI's Justin Bassi nails it: dodging attribution erodes trust, lets China fuse civil-military theft for commercial gold. Supply chain compromises are the sneaky killers. TeamPCP—likely Chinese nexus—is hijacking exposed Kubernetes clusters and Docker APIs across U.S. clouds, turning them into botnets for mining, proxies, and data grabs, Flare systems warns. Huawei's ghost lingers too; their old DPI gear in Iran's MTN Irancell enables blackouts and surveillance, ARTICLE 19 exposes, with ZTE and Hikvision piping in AI cams mimicking Uyghur trackers. Stateside, Salt Typhoon—Beijing-backed—owns telecom nets, per Clean Network fallout. Strategic implications? Ian Bremmer at Munich Security Conference says U.S.-China AI race is "zero trust" hell—no governance, just escalation. State hackers wield Gemini AI end-to-end for phishing to exfil, Google confirms. Future risks? Pentagon's blacklist shuffle eyes easing on Alibaba, Baidu, even BYD, Reuters whispers, maybe Trump-Xi chit-chat bait. But experts like Bremmer predict drone tech and DIB bleeds unless we name-shame. China stockpiles zero-days via MPS hacking contests, Natto Thoughts flags. Listeners, this siege isn't skirmishes—it's total war on silicon veins. Patch Kubernetes, audit chains, call out MSS. Stay vigilant, or Beijing codes your future. Thanks for tuning in—subscribe now for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  3. 3 DAYS AGO

    Silicon Spies and Code Thieves: How China Hacked Your Text Editor and Stole Google's AI Crown Jewels

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, Ting here, your go-to cyber sleuth on all things China hacking and tech takedowns. Buckle up for Silicon Siege: China's relentless offensive on US tech guts over the last two weeks—straight fire from Beijing's keyboard warriors. Picture this: just days ago on February 2nd, Schneier on Security dropped a bombshell—two popular AI coding assistants, used by 1.5 million devs worldwide, were secretly slurping up every line of code you type and shipping it straight to China. No consent, no mercy, just pure data heist for training their next-gen models. Then, February 5th, Chinese gov hackers trojanized Notepad++ downloads, slipping malware to targeted users—classic supply chain ninja move, turning your trusty text editor into a backdoor express. Rewind to late January: ex-Google engineer Ding Linwei—yeah, that 38-year-old Chinese national—got nailed in a San Francisco courtroom on January 29th by the US DOJ for swiping thousands of pages on Google's supercomputing secrets. We're talking chip blueprints for AI data centers, designed to outpace Amazon and Microsoft while ditching Nvidia dependency. Economic espionage charges could lock him up 15 years per count—seven of 'em. Prosecutors say he started pilfering in 2022 after a Chinese startup came knocking. Google's cooperating, but oof, that's industrial espionage gold for Beijing's AI arms race. Not done yet—Singapore's Cyber Security Agency revealed last year UNC3886, a China-linked APT, burrowed deep into M1, Singtel, StarHub, and SIMBA Telecom networks. Echoes hit US shores too: an Asian cyber-spy crew, per The Independent US reports, breached 37 foreign govs while Uncle Sam scrambles to patch agency holes. And don't sleep on Marginal Revolution's fresh econ paper by Andrew Kao and Karthik Tadepalli—public espionage cases from '95-2024 show hit US firms tank revenues and R&D by 40% within five years, exports crater 60% over a decade. No wonder firms aren't hunkering down on patents or hires. Industry pros like Chris O’Ferrell at CodeHunter warn malware sneaks via CI/CD pipelines—China's mastering that quiet entry. Future risks? AI's turbocharging exploits; attackers chain vulns at machine speed, per Ivanti's 2026 report. Without chip curbs, Beijing closes the gap, but US pushes back with $20 mil APEC AI funds, as Casey Mace touted in Guangzhou. Strategic play: they steal IP to dominate, we bleed innovation. Patch fast, listeners—supply chains are warzones. Thanks for tuning in, smash that subscribe for more cyber spice. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    3 min
  4. 5 DAYS AGO

    Silicon Siege Alert: China Steals AI Secrets While US Fumbles the Defense

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, Ting here, your go-to cyber sleuth on all things China hacking chaos. Buckle up for Silicon Siege: China's Tech Offensive, straight from the past two weeks' madness ending February 13, 2026. We're talking a barrage of cyber ops slamming US tech like a digital tsunami. First off, industrial espionage is peaking. Google Threat Intelligence Group dropped a bombshell, linking China-nexus crews like UNC3236, aka Volt Typhoon, to recon on North American defense contractors' login portals using ARCMAZE obfuscation to hide tracks. They're probing edge devices for sneaky entry into defense tech, eyeing autonomous vehicles and drones fueling the Russia-Ukraine battlefield. UNC6508 hit a US research institution late 2023-style with REDCap exploits, dropping INFINITERED malware for persistent access and credential grabs during software upgrades. Google's report nails it: China's using operational relay box networks to scout defense targets, dodging detection like ghosts in the machine. Intellectual property theft? OpenAI's screaming bloody murder. Reuters and Bloomberg report DeepSeek staffers bypassed OpenAI's barriers via shady third-party routers, slurping model insights to supercharge their R1 chatbot. OpenAI's memo to US lawmakers warns China's shortcutting years of R&D, potentially leapfrogging US AI supremacy with cheaper dev costs—up to 80% less—and endless power for data centers. Steve Ballmer once griped Microsoft lost billions to China IP grabs; now it's AI secrets fueling Beijing's edge. Supply chain compromises are the sneaky killer. Leaked docs via NetAskari and Recorded Future News expose "Expedition Cloud," China's secret sim platform for hacking neighbors' power grids, transport, and smart homes. No defenders allowed—just recon teams mapping networks, then attack squads pummeling replicas of South China Sea foes. AI orchestrates it all, per the files from an unsecured FTP server. Palo Alto's Unit 42 spotted TGR-STA-1030 in "Shadow Campaigns," a global spy fest hitting 37 countries' infra, but dialed back China attribution fearing Beijing backlash after their software ban. Strategic implications? US tech's a sitting duck. Pentagon's 1260H list briefly tagged Alibaba, Baidu, BYD before yanking it amid Trump-Xi summit jitters—Reuters says it's to pause bans on China Telecom, TP-Link routers, pausing data center safeguards. Critics like Chuck Schumer blast it as selling out national security, risking "Chinese digital sovereignty" in US AI backbone. Expert Tom Hegel from SentinelOne calls it a "broader pattern" of China intel grabs. Joshua Rudd, Trump's NSA pick, warns China's hoarding AI chips for weaponized smarts. Taiwan's even signaling China might be rehearsing a digital siege. Future risks? Constant multi-vector siege on defense and AI, per Google. Without real costs, per State Department cyber chief, we're building vulnerabilities into our core. China could dominate AI, outpacing US investments while we dither. Thanks for tuning in, listeners—subscribe for more cyber dirt! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  5. 11 FEB

    China's Cyber Army Crashes the Party: Routers Hacked, Secrets Stolen, and Telecoms on Fire

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacking hijinks. Buckle up, because the past two weeks have been a non-stop Silicon Siege—China's tech offensive slamming U.S. tech sectors like a quantum qubit on steroids. Google Threat Intelligence Group dropped a bombshell report on February 11th, revealing China-nexus crews like UNC3886 and UNC5221 as the undisputed volume kings of espionage against our defense industrial base. These sneaky operators have been pounding edge devices—think routers and IoT gadgets—for initial footholds, way more than Russian or Iranian rivals over the last two years. Flash back to Singapore's telco meltdown: Cyber Security Agency of Singapore confirmed UNC3886, that same China-linked beast, breached all four major providers—M1, SIMBA Telecom, Singtel, and StarHub—in a meticulously planned campaign. Risky Business nailed it as straight-up cyber-espionage, hitting just days ago. Stateside, Salt Typhoon's still scorching U.S. telecoms; Senator Maria Cantwell blasted AT&T and Verizon on February 10th for stonewalling Mandiant's security assessments on this massive Chinese spying op infiltrating our networks. Industrial espionage? Oh, it's peaking. The Bureau's exposé on Beijing's United Front Work Department uncovered 2,294 cells, with U.S. cases like CAST-USA's dual Shanghai-Beijing ops funneling American tech secrets home via 16 stateside chapters. Zhu's shell company web in Canada? Tied to $300 million fraud and dual-use bio-tech transfers, per the House Select Committee on the CCP. And don't sleep on leaked docs from Recorded Future showing China's "Expedition Cloud" platform—yep, a secret sim city for rehearsing hacks on South China Sea neighbors' critical infrastructure, prepping real-world supply chain gut-punches. Supply chain nightmares abound: Intel 471 reports extortion attacks spiked 63% in 2025, hammering U.S. manufacturing—dual-use defense suppliers—with ransomware locking down production lines. GTIG warns these IT hits ripple to OT, crippling wartime surges. Cisco Talos flagged DKnife, a stealthy China-linked Linux toolkit hijacking router traffic since 2019, now spying on creds and dropping malware across IoT. Expert take? GTIG's analysts say China's tradecraft has leveled up, blending ORB networks for sneaky recon with personnel phishing—think APT5's 2025 spearphishing at aerospace giants' personal emails. Future risks? As defense budgets balloon for drones and next-gen gear, expect more prep-for-theft ops. Jamestown Foundation's Yu warns United Front infiltration of states like Utah and New York could shape policy, feeding Beijing's IP feast. We're talking eroded edges, stolen R&D, and disrupted chains that could leave U.S. tech high and dry in a hot war. Listeners, stay vigilant—patch those edges, vet your hires, and lock down supply links. Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  6. 9 FEB

    Silicon Heists and Telco Takeovers: China's AI Spy Games Go Full Cyberpunk

    This is your Silicon Siege: China's Tech Offensive podcast. Hey listeners, I'm Ting, your go-to gal for all things China cyber chaos and hacker hijinks—think witty wiretaps meets tech trench warfare. Buckle up, because the past two weeks have been a Silicon Siege straight out of a cyberpunk thriller, with China's tech offensive hitting US sectors like a rootkit on steroids. We're talking industrial espionage, IP heists, supply chain sneak attacks, and implications that could rewrite the chip wars. Flash back to late January 2026: former Google engineer Linwei Ding—aka Leon Ding—got nailed in San Francisco on 14 felony counts for economic espionage, the first ever targeting AI accelerator tech. Ding, a 38-year-old Chinese national, swiped over 2,000 pages of Google's crown jewels from May 2022 to April 2023: blueprints for Tensor Processing Units TPU v4 and the unreleased v6, plus Cluster Management System secrets that orchestrate thousands of chips into AI supercomputers. While moonlighting as CTO for Beijing startup owners and founding Shanghai Zhisuan Technology, he had an intern badge-swipe his Google ID in California to fake his presence. Prosecutors say he laundered data via Apple Notes into PDFs, bridging China's chip gap under US export bans. The US Department of Justice called it system-level theft, turning Google's AI moat into Beijing's blueprint. Fast-forward to this week, February 9: Singapore's Cyber Security Agency dropped a bombshell—China-nexus APT UNC3886 hammered all four major telcos: Singtel, StarHub, M1, and Simba Telecom. Using zero-day exploits on firewalls, rootkits for stealth persistence, and VMware ESXi infiltrations, they siphoned network tech data but skipped customer records or service disruptions. Mandiant dubs UNC3886 a deep-capability espionage crew active since 2022, targeting edge devices worldwide. Singapore's CYBER GUARDIAN op shut them down, but it screams supply chain compromise—telco networks feed into US tech ecosystems. Layer on leaked docs from last week showing China rehearsing attacks on neighbors' critical infrastructure via secret training platforms, per The Record. And Rapid7 just linked Lotus Blossom APT—active since 2009—to Notepad++ compromises delivering Chrysalis backdoors, hitting Southeast Asia telecoms, aviation, and media. Industry experts like those at Sygnia see Fire Ant overlaps with UNC3886, warning of persistent VMware threats. Future risks? Trump's January 14 reversal greenlights NVIDIA H200 AI chip exports to China—orders from Alibaba, Tencent, ByteDance top $14 billion—despite AI Overwatch Act pushback. BISI analysts forecast China closing the compute gap fast, fueling military AI drones and cyber ops, while CISA's BOD 26-02 mandates ditching end-of-support edge devices to block exploits. Strategic fallout: US brain drain risks, fragile mineral supply chains—China controls 70% of chip silver and rare earths—and a transactional tech tango where espionage shortcuts Beijing's R&D. We're in an era treating AI IP like nukes, listeners. Thanks for tuning in—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  7. 8 FEB

    Silicon Siege: How China Hacked Your Favorite Code Editor and Tanked Silicon Valley's AI Dreams

    This is your Silicon Siege: China's Tech Offensive podcast. Look, listeners, we're in the middle of what I'm calling the Silicon Siege, and it's getting spicy. The past two weeks have shown us that China isn't just playing cyber checkers anymore, they're running a multi-front operation that would make a chess grandmaster nervous. Let's start with the biggest bombshell. Notepad++, this beloved code editor that millions of developers use daily, got absolutely compromised. A Chinese-linked cyberespionage group called Lotus Blossom, active since 2009, hijacked the update process starting back in June 2025. Don Ho, the French developer, discovered malicious actors had access to his hosting servers until September, but here's the creepy part, they maintained credentials on some hosting services until December. The attackers deployed a custom backdoor that could give them interactive control of infected computers. This wasn't spray and pray either. According to Hostinger, their Lithuanian hosting provider, the attack was highly selective, meaning specific targets got the malware while others didn't. The Cybersecurity and Infrastructure Security Agency is now investigating possible exposure across the entire US government. But Notepad++ is just the appetizer. According to a recent Quorum Cyber report covering 2025, nation-state actors are now automating up to ninety percent of their intrusion activity using artificial intelligence. We're talking about a fundamental shift in how attacks happen. These operations are faster, smarter, and frankly harder to detect. Ransomware demands are exploding too, with financial services seeing a one hundred seventy-nine percent increase in ransom demands. The industrial espionage angle is particularly nasty. China is systematically stealing intellectual property from Western tech companies like Apple, Tesla, and increasingly Nvidia and ASML. One Chinese AI researcher is already serving time for stealing Google secrets. What makes this especially dangerous is the new vector, open source AI models. Chinese developers are fine-tuning Western models on top of American code and data, then releasing them openly. It's brilliant, honestly. They spend a million dollars to copy what Americans spend a billion developing, then open source it, which completely tanks the venture capital cycle that fuels Silicon Valley innovation. The scope is staggering. A state-sponsored threat group designated TGR-STA-1030 conducted reconnaissance targeting government infrastructure in one hundred fifty-five countries between November and December of last year. They've compromised critical infrastructure across thirty-seven countries. Their toolkit includes ShadowGuard malware that operates at the kernel level, essentially making themselves invisible to security monitoring tools. What we're watching is asymmetric warfare disguised as commercial activity. China doesn't need to build AGI themselves. They need to make sure America can't either, while simultaneously extracting every valuable intellectual property asset they can access. It's patient, methodical, and frankly, effective. Thanks for tuning in, listeners. Please make sure to subscribe for more updates on these developing threats. This has been a Quiet Please production, for more check out quietplease dot ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    4 min
  8. 6 FEB

    Silicon Spies and Superchips: How a Google Engineer Tried to Build China's AI Empire on Stolen Secrets

    This is your Silicon Siege: China's Tech Offensive podcast. # Silicon Siege: China's Tech Offensive Hey listeners, Ting here. Buckle up because the past two weeks have been absolutely wild in the cyber espionage space, and honestly, it reads like a techno-thriller nobody asked for but everyone should be paying attention to. Let's start with the headliner that just dropped. A federal jury in San Francisco convicted former Google software engineer Linwei Ding of stealing over two thousand pages of confidential information about Google's artificial intelligence technology to benefit the People's Republic of China. We're talking about the crown jewels here—detailed architecture of Google's custom Tensor Processing Unit chips, Graphics Processing Unit systems, and their SmartNIC network interface cards. The guy literally downloaded all of it to his personal computer just before resigning. What makes this particularly spicy is the sophistication. Between May twenty twenty-two and April twenty twenty-three, Ding was secretly affiliated with two China-based tech companies while still cashing Google's paychecks. He positioned himself as CEO of his own AI company back in the PRC and told investors he could build an AI supercomputer by copying and modifying Google's technology. Then he applied for a Chinese government talent plan, literally stating his goal was to help China achieve computing infrastructure on par with international levels. The guy wasn't subtle, but he was effective. But Ding's story is just the appetizer. Meanwhile, Norway's Police Security Service announced that China's Salt Typhoon hacking group infiltrated several Norwegian organizations by exploiting vulnerable network devices. This follows similar breaches in Canada and the United States, where these state-sponsored actors allegedly intercepted communications of senior politicians. U.S. national security officials have called Salt Typhoon an epoch-defining threat to critical infrastructure globally, and for good reason—they've compromised at least two hundred American companies. Here's the thing that keeps me up at night: this isn't just about stolen data. It's about the systemic erosion of technological advantage. China controls approximately seventy percent of the world's rare earth mining and ninety percent of the refining process. They're not just hacking our tech—they're controlling the literal minerals that power it. The Trump administration is fighting back with something called Project Vault, a twelve billion dollar national stockpile initiative and new price floor trade agreements for critical minerals. But here's the reality check: these are band-aids on a structural problem. Building out refining capacity outside China takes years and massive investment. What we're witnessing is a permanent shift in how nations compete. It's not just about stealing intellectual property anymore. It's about controlling the supply chains, the infrastructure, and the rare materials that make everything work. Thanks for tuning in, listeners. Make sure to subscribe for more deep dives into the cyber world. This has been Quiet Please, for more check out quiet please dot ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta This content was created in partnership and with the help of Artificial Intelligence AI

    3 min

About

This is your Silicon Siege: China's Tech Offensive podcast. Silicon Siege: China's Tech Offensive is your go-to podcast for the latest updates on Chinese cyber operations targeting US technology sectors. Tune in regularly for in-depth analysis of the past two weeks' most significant events, including industrial espionage attempts, intellectual property threats, and supply chain compromises. Gain valuable insights from industry experts as we explore the strategic implications of these cyber activities and assess future risks to the tech industry. Stay informed and prepared with Silicon Siege. For more info go to https://www.quietplease.ai Check out these deals https://amzn.to/48MZPjs