2028: Two scenarios for global AI leadership
…illicit and evasive compute access , by smuggling AI chips directly into China and accessing offshore data centers, and illicit model access , through which they carry out distillation attacks on US frontier models…