14.8 C
New York
Monday, March 31, 2025
Home Blog Page 17

React Native Header title would not take full width on ios


In my react native app I am noticing that my header factor is behaving otherwise on ios than android. I set the header title to width: 100% however on ios it nonetheless has appreciable margins on either side. You possibly can see within the code that I am attempting to separate the title to have two strings displayed within the header so I want to use all of the house I can get. I’ve bought a dummy string displaying for now to obviously present the margins and variations between the platforms. Nothing I do appears to get the title to take the complete width. I’ve some easy kinds on the dummy string however I’ve extra full kinds on the splitHeaderContainer and it behaves the identical.

I respect any assist, thanks.

See linked photos for readability

import React from 'react';
import {createBottomTabNavigator} from '@react-navigation/bottom-tabs';
import FontAwesome6 from 'react-native-vector-icons/FontAwesome6';
import {useTranslation} from 'react-i18next';
import {createNativeStackNavigator} from '@react-navigation/native-stack';
import sort {RootStackParamList} from './sorts';
import AuthorityDetailsScreen from '../screens/authorities/AuthorityDetailsScreen';
import ElectionsScreen from '../screens/elections/ElectionsScreen';
import SignersScreen from '../screens/signers/SignersScreen';
import AuthoritiesScreen from '../screens/authorities/AuthoritiesScreen';
import SettingsScreen from '../screens/settings/SettingsScreen';
import {ChipButton} from '../elements/ChipButton';
import {Pressable, StyleSheet, View, Textual content} from 'react-native';
import {ExtendedTheme, useNavigation} from '@react-navigation/native';
import {useTheme} from '@react-navigation/native';
import NetworksScreen from '../screens/networks/NetworksScreen';
import sort {NavigationProp} from './sorts';

const Stack = createNativeStackNavigator();
const Tab = createBottomTabNavigator();

perform SplitHeaderTitle() {
    const {colours} = useTheme() as ExtendedTheme;
    return (
        
            
                Current Network
            
            
                Username Username
            
        
    );
}

function useTabHeaderOptions() {
    const {colors} = useTheme() as ExtendedTheme;
    const navigation = useNavigation();

    const handleNetworkPress = () => {
        navigation.navigate('Networks');
    };

    return {
        headerLeft: () => (
            
                
            
        ),
        headerRight: () => (
            
                
            
        ),
        //headerTitle: () => ,
        headerTitle: () => (
            
                Hello this is a very long text to show how it cuts off
            
        ),
        headerShadowVisible: false,
    };
}

const TabNavigator = () => {
    const {colors} = useTheme() as ExtendedTheme;
    const {t} = useTranslation();
    const tabHeaderOptions = useTabHeaderOptions();

    return (
         ({
                tabBarIcon: ({focused, color, size}) => {
                    let iconName: string;

                    switch (route.name) {
                        case 'Elections':
                            iconName="check-to-slot";
                            break;
                        case 'Signers':
                            iconName="person";
                            break;
                        case 'Authorities':
                            iconName="shield";
                            break;
                        case 'Settings':
                            iconName="gear";
                            break;
                        default:
                            iconName="alert";
                    }

                    return ;
                },
                tabBarActiveTintColor: colors.primary,
                tabBarInactiveTintColor: 'gray',
            })}>
            
            
            
            
        
    );
};

const styles = StyleSheet.create({
    splitHeaderContainer: {
        flex: 1,
        flexDirection: 'row',
        justifyContent: 'space-between',
        alignItems: 'center',
        paddingHorizontal: 2,
        width: '100%',
    },
    headerText: {
        fontSize: 16,
        fontWeight: '500',
    },
    networkText: {
        flex: 1,
        textAlign: 'left',
        marginRight: 8,
    },
    usernameText: {
        flex: 1,
        textAlign: 'right',
        opacity: 0.7,
    },
    headerButton: {
        padding: 8,
        marginHorizontal: 4,
        marginVertical: -2,
    },
});

export const RootNavigator = () => {
    const {t} = useTranslation();

    return (
        
            
             (
                        
                    ),
                }}
            />
            
        
    );
};

Images:

android_ios_side_by_side

inspector_view

Awards shortlist flags next-generation leaders for Scotland’s renewable vitality sector



Awards shortlist flags next-generation leaders for Scotland’s renewable vitality sector

Greater than 300 folks to attend awards in Glasgow on 1 Could 

The long run leaders of Scotland’s renewable vitality business have been shortlisted at the moment (27 March) for this yr’s Younger Professionals Inexperienced Vitality Awards.

The annual awards, organised by Scottish Renewables, shine a highlight on the pioneers of tomorrow who’re able to disrupt the established order with their daring concepts and unstoppable ambition to reshape Scotland’s clear energy future.

Greater than 30 rising stars within the renewable vitality business have been shortlisted throughout eight classes together with:

  • Megan Martin, a Design Engineer at Tony Gee and Companions LLP, who took a lead function in designing Viking wind farm’s turbine foundations at each the optioneering and detailed design levels.
  • Obey Suleyman, a PhD scholar on the College of Strathclyde, whose pioneering analysis on the manufacture of wind turbine parts is advancing the sustainability of Scotland’s renewable vitality business.
  • Ben Younger, an engineer at SLR, who has been engaged on the event of export and inter array cable system designs.

The complete record of finalists is out there on Scottish Renewables’ web site.

The Younger Professionals Inexperienced Vitality Awards shall be offered at Radisson Blu Lodge, Glasgow, on 1 Could.

Claire Mack, Chief Government of Scottish Renewables, mentioned:

“The way forward for Scotland’s renewable vitality business is within the palms of a brand new wave of trailblazers as we see first-hand a brand new technology of leaders who’re actively shaping the way forward for our business.

“The Younger Professionals Inexperienced Vitality Awards recognise these on the forefront of this transformation which shall be essential in supporting the continued drive in the direction of a sustainable Scotland powered by clear vitality.

“To be nominated for these awards is a outstanding accomplishment in itself and I really hope this recognition will encourage every nominee to construct on the distinctive work they’ve already contributed to our business, paving the way in which for even higher achievements.”

Winners of the Younger Professionals Inexperienced Vitality Awards can even be put ahead for the Younger and Inspiring Award on the Scottish Inexperienced Vitality Awards later this yr.

The complete record of finalists is out there beneath:

Tutorial Award, sponsored by ETP

  • Millie Anderson, ORE Catapult
  • Connor Jordan, The College of Edinburgh
  • Jake Scott, Story Scotland
  • Obey Suleyman, AMRL, College of Strathclyde

Analyst Award, sponsored Ocean Winds

  • Marta Bera, Muir Mhòr Offshore Wind Farm
  • Martin Brown, WSP
  • Elizabeth Dimitrova, Renewable Components
  • Suzie Saunders, ScottishPower Renewables

Tradition Change Award

  • Hannah Belford, SSE Renewables
  • Isobel Inexperienced, SSEN Transmission
  • Millie Zagulak, Xodus

Engineer Award, sponsored by ESB

  • Isobel Inexperienced, SSEN Transmission
  • Megan Martin, Tony Gee and Companions LLP
  • Harry Ross, Tony Gee and Companions LLP
  • Ben Younger, SLR

Innovator Award          

  • Lewis Bates, SSEN Transmission
  • Megan Martin, Tony Gee and Companions LLP
  • Sian O’Malley, SSEN Transmission

Private Enchancment Award

  • Andrew Fischbacher, Ocean Winds
  • Cerys Gordon, Flotation Vitality
  • Reuben Sharp, LOC Rent
  • Kimberly Thomson, Scottish Enterprise
  • Adanna Ugo-Okoye, Statkraft

Skilled Service Award, sponsored by SLR

  • Hannah Belford, SSE Renewables
  • Kudakwashe Chinyani, CMS
  • Katie Forrest, IGNE
  • Chloe Giles, Pier Options
  • Megan Martin, Tony Gee and Companions LLP

Undertaking Growth Award    

  • Emanuele Dentis, Northland Energy
  • Rachel Forbes, BayWa r.e. UK
  • Ellen Kane, ScottishPower Renewables
  • Aleks Schmidt-Sweetingham, Ocean Winds

Prime 3 MS Workplace Exploits Hackers Use in 2025 – Keep Alert!

0


Prime 3 MS Workplace Exploits Hackers Use in 2025 – Keep Alert!

Hackers have lengthy used Phrase and Excel paperwork as supply autos for malware, and in 2025, these tips are removed from outdated. From phishing schemes to zero-click exploits, malicious Workplace information are nonetheless one of many best methods right into a sufferer’s system.

Listed here are the highest three Microsoft Workplace-based exploits nonetheless making the rounds this 12 months and what it is advisable know to keep away from them.

1. Phishing in MS Workplace: Nonetheless Hackers’ Favourite

Phishing assaults utilizing Microsoft Workplace information have been round for years, they usually’re nonetheless going robust. Why? As a result of they work, particularly in enterprise environments the place groups always change Phrase and Excel paperwork.

Attackers know that individuals are used to opening Workplace information, particularly if they arrive from what seems like a colleague, a shopper, or a accomplice. A faux bill, a shared report, or a job supply: it would not take a lot to persuade somebody to click on. And as soon as the file is open, the attacker has their probability.

Phishing with Workplace information usually goals to steal login credentials. These paperwork would possibly embody:

  • Hyperlinks to faux Microsoft 365 login pages
  • Phishing portals that mimic firm instruments or providers
  • Redirect chains that ultimately land on credential-harvesting websites

On this ANY.RUN malware evaluation session, an Excel file comprises malicious phishing hyperlink:

View evaluation session with Excel file

Excel file containing malicious hyperlink detected inside ANY.RUN sandbox

When clicked, the sufferer is taken to a webpage that reveals a Cloudflare “Confirm you are a human” verify.

CloudFlare verification handed with ANY.RUN’s automated interactivity

After clicking by, there’s one other redirect; this time to a faux Microsoft login web page.

Malicious hyperlink to faux Microsoft login web page with random characters

At first look, it’d look actual. However contained in the ANY.RUN sandbox, it is simple to identify pink flags. The Microsoft login URL is not official; it is stuffed with random characters and clearly would not belong to Microsoft’s area.

Give your staff the suitable software to detect, examine, and report threats quicker in a safe atmosphere.

Get a trial of ANY.RUN to entry superior malware evaluation

This faux login web page is the place the sufferer unknowingly palms over their login credentials straight to the attacker.

Attackers are additionally getting extra inventive. Recently, some phishing paperwork include QR codes embedded in them. These are supposed to be scanned with a smartphone, sending the sufferer to a phishing web site or triggering a malware obtain. Nonetheless, they are often detected and analyzed with instruments like ANY.RUN sandbox too.

2. CVE-2017-11882: The Equation Editor Exploit That Will not Die

First found in 2017, CVE-2017-11882 continues to be exploited in the present day, in environments operating outdated variations of Microsoft Workplace.

This vulnerability targets the Microsoft Equation Editor – a hardly ever used part that was a part of older Workplace builds. Exploiting it’s dangerously easy: simply opening a malicious Phrase file can set off the exploit. No macros, no further clicks wanted.

On this case, the attacker makes use of the flaw to obtain and run a malware payload within the background, usually by a distant server connection.

In our evaluation session, the payload delivered was Agent Tesla, a recognized info-stealer used to seize keystrokes, credentials, and clipboard information.

View evaluation session with malicious payload

Phishing e mail containing malicious Excel attachment

Within the MITRE ATT&CK part of this evaluation, we will see how ANY.RUN sandbox detected this particular approach used within the assault:

Exploitation of Equation Editor detected by ANY.RUN

Though Microsoft patched the vulnerability years in the past, it is nonetheless helpful for attackers concentrating on techniques that have not been up to date. And with macros disabled by default in newer Workplace variations, CVE-2017-11882 has develop into a fallback for cybercriminals who need assured execution.

3. CVE-2022-30190: Follina’s Nonetheless within the Sport

The Follina exploit (CVE-2022-30190) continues to be a favourite amongst attackers for one easy motive: it really works with out macros and would not require any consumer interplay past opening a Phrase file.

Follina abuses the Microsoft Assist Diagnostic Device (MSDT) and particular URLs embedded in Workplace paperwork to execute distant code. Which means simply viewing the file is sufficient to launch malicious scripts, usually PowerShell-based, that contact a command-and-control server.

View evaluation session with Follina

Follina approach detected inside ANY.RUN sandbox

In our malware evaluation pattern, the assault went a step additional. We noticed the “stegocampaign” tag, which signifies using steganography – a way the place malware is hidden inside picture information.

Use of Steganography within the assault

The picture is downloaded and processed utilizing PowerShell, extracting the precise payload with out elevating rapid alarms.

Picture with malicious payload analyzed inside ANY.RUN

To make issues worse, Follina is usually utilized in multi-stage assault chains, combining different vulnerabilities or payloads to extend the influence.

What This Means for Groups Utilizing MS Workplace

In case your staff depends closely on Microsoft Workplace for day-to-day work, the assaults talked about above ought to be a wake-up name.

Cybercriminals know Workplace information are trusted and extensively utilized in enterprise. That is why they proceed to use them. Whether or not it is a easy Excel sheet hiding a phishing hyperlink or a Phrase doc silently operating malicious code, these information can pose severe dangers to your group’s safety.

This is what your staff can do:

  • Overview how Workplace paperwork are dealt with internally; restrict who can open or obtain information from exterior sources.
  • Use instruments like ANY.RUN sandbox to examine suspicious information in a secure, remoted atmosphere earlier than anybody in your staff opens them.
  • Replace all Workplace software program commonly and disable legacy options like macros or the Equation Editor the place attainable.
  • Keep knowledgeable about new exploit strategies tied to Workplace codecs so your safety staff can reply shortly.

Analyze Cell Malware with ANY.RUN’s New Android OS Assist

The risk would not cease at Workplace information. Cell units at the moment are a key goal, and attackers are spreading malware by faux apps, phishing hyperlinks, and malicious APKs.

This implies a rising assault floor for companies and the necessity for broader visibility.

With ANY.RUN’s new Android OS assist, your safety staff can now:

  • Analyze Android malware in an actual cellular atmosphere
  • Examine suspicious APK conduct earlier than it hits manufacturing units
  • Reply to cellular threats quicker and with extra readability
  • Assist incident response throughout each desktop and cellular ecosystems

It is a huge step towards full protection and it is out there on all plans, together with free.

Begin your first Android risk evaluation in the present day and provides your safety analysts the visibility they should shield your cellular assault floor.

Discovered this text fascinating? This text is a contributed piece from one among our valued companions. Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



G2 Names INE 2025 Cybersecurity Coaching Chief

0


INE, a worldwide chief in networking and cybersecurity coaching and certifications, is proud to announce it’s the recipient of twelve badges in G2’s Spring 2025 Report, together with Grid Chief for Cybersecurity Skilled Improvement, On-line Course Suppliers, and Technical Expertise Improvement, which spotlight INE’s superior efficiency relative to opponents. 

“INE solves the issue of accessible, hands-on safety coaching with structured studying paths and real-world labs,” says SOC Analyst Sai Tharun Ok. “It helps bridge the hole between concept and sensible abilities. For me, it has been very helpful in refining my penetration testing, cloud safety, and risk evaluation abilities.”

G2 calculates rankings utilizing a proprietary algorithm sourced from verified evaluations of precise product customers and is a trusted overview supply for 1000’s of organizations all over the world. Its recognition of INE’s sturdy efficiency in enterprise, small enterprise, and international affect for technical coaching showcases the depth and breadth of INE’s on-line studying library

“We’re extremely proud to as soon as once more be on the forefront of the coaching trade, acknowledged by G2 customers in a time when cyber threats are escalating in each frequency and complexity,” mentioned Dara Warn, CEO of INE. “This recognition displays our dedication to offering coaching that not solely retains tempo with however anticipates the dynamic intersection of cybersecurity with networking, cloud companies, and broader IT disciplines. At INE, we imagine deeply in equipping professionals and organizations with the sturdy, up-to-date abilities essential to navigate and safe immediately’s quickly altering digital landscapes. An enormous thanks to our devoted group and learners, who’re important in our mission to remodel cybersecurity coaching to fulfill the pressing calls for of the present atmosphere.”

INE’s G2 Spring 2025 Report highlights embody:

  • Momentum Chief, Cybersecurity Skilled Improvement
  • Momentum Chief, On-line Course Suppliers
  • Momentum Chief, Technical Expertise Improvement
  • Grid Chief, Cybersecurity Skilled Improvement
  • Grid Chief, On-line Course Suppliers
  • Grid Chief, Technical Expertise Improvement
  • Regional Chief, Europe On-line Course Suppliers
  • Regional Chief, Asia On-line Course Suppliers
  • Regional Chief, Asia Pacific On-line Course Suppliers
  • Grid Chief, Small-Enterprise Technical Expertise Improvement
  • Grid Chief, Small-Enterprise On-line Course Suppliers
  • Excessive Performer, India On-line Course Suppliers

“INE’s hands-on labs and real-world eventualities have helped me refine by abilities,” mentioned Leonard R.G., a Pentesting Guide. “INE is fixing the hiring points most HR individuals have when they’re hiring cybersecurity staff,” provides Batuhan A., a Cyber Safety Researcher. 

In 2024, the celebrated SC Awards acknowledged INE Safety, INE’s cybersecurity-specific coaching, because the Greatest IT Safety-Associated Coaching Program. This designation additional underscores INE Safety’s function as a frontrunner in cybersecurity coaching for companies, offering the instruments and data important for tackling immediately’s advanced cyber threats.

INE Safety was additionally offered with 4 awards from World InfoSec Awards at RSAC 2024, together with: 

  • Greatest Product – Cybersecurity Schooling for Enterprises
  • Most Revolutionary – Cybersecurity Schooling for SMBs
  • Writer’s Alternative – Cybersecurity Coaching
  • Slicing Edge – Cybersecurity Coaching Movies

Mixed, these accolades spotlight INE’s management in delivering revolutionary and efficient networking and cybersecurity schooling throughout numerous market segments, together with enterprises and small to medium-sized companies.

About INE Safety

INE Safety is the premier supplier of on-line networking and cybersecurity coaching and certification. Harnessing a robust hands-on lab platform, cutting-edge know-how, a worldwide video distribution community, and world-class instructors, INE Safety is the highest coaching selection for Fortune 500 corporations worldwide for cybersecurity coaching in enterprise and for IT professionals seeking to advance their careers. INE Safety’s suite of studying paths gives an incomparable depth of experience throughout cybersecurity and is dedicated to delivering superior technical coaching whereas additionally reducing the obstacles worldwide for these seeking to enter and excel in an IT profession.

Disclaimer: It is a sponsored press launch distributed by CyberNewswire, PR syndication platform for cybersecurity corporations. Cyber Safety Information doesn’t endorse or take duty for its content material, accuracy, high quality, promoting, merchandise, or any associated supplies.

Scientists Simply Transplanted a Pig Liver Right into a Particular person for the First Time

0


Our liver has admirable regenerative properties. However it takes a beating each day. Ultimately, its tissues scar, and if the organ fails, a liver transplant is the one answer.

Donor livers are laborious to come back by, nonetheless. This week, a Chinese language staff turned to a different supply—pig livers—and revealed the primary outcomes exhibiting how they operate inside a human recipient. The liver within the research underwent heavy gene modifying to rid it of genes that set off immune rejection and add genes making it seem extra human to the physique.

Simply two hours after transplant, the pig liver started producing bile, a sort of digestive fluid that breaks down fats. The organ remained useful till the tip of the experiment 10 days later, with out marked indicators of rejection or irritation.

“That is the primary time we tried to unravel whether or not the pig liver may work effectively within the human physique,” stated research writer Lin Wang at Xijing Hospital in China in a press briefing. The pig liver is supposed to be a stop-gap measure moderately than a full alternative. It may briefly maintain sufferers alive till a human donor organ turns into accessible or the affected person’s personal liver recovers.

“The research represents a milestone within the historical past of liver xenotransplantation,” stated Iván Fernández Vega on the College of Oviedo in Spain, who was not concerned within the research. “I discovered the work very related, however now we have to be cautious.”

Crossing Species

There’s a extreme lack of donated organs. As of March 2025, over 104,600 individuals are on a transplant waitlist, which may take months, if not years. Some don’t survive the wait.

Xenotransplantation, or the transplantation of organs from one animal into one other, affords one other answer. For the previous decade, scientists have been eyeing different species as sources for useful organs that would change damaged human physique components. Bama miniaturized pigs are particularly promising as a result of their inner organs are related in measurement and performance to ours.

However there are caveats. Pig organs are dotted with sugars that spur our immune methods into motion. Immune cells assault the overseas organ, damaging its operate or triggering rejection.

There’s additionally the chance posed by porcine endogenous retroviruses or PERVs. These are tough viruses embedded contained in the genomes of all pigs. Though they don’t appear to hurt pigs, they can infect some human cells and probably result in illness.

Xenotransplant efforts over the previous decade have tried gene modifying pig organs to rid them of PERVs. Different edits inhibit genes answerable for immune rejection and make the organs seem extra human to the physique.

There have been successes. Genetically engineered pig hearts transplanted into baboons with coronary heart failure allowed them to thrive for over six months. Pig kidney grafts with 69 genetic edits retained operate after transplantation in monkeys.

And though extremely experimental, xenotransplantation has already been utilized in people. In 2021, a staff carried out the primary transplant of a genetically modified pig kidney right into a brain-dead particular person. The kidney was connected to blood vessels within the higher leg outdoors the stomach and coated with a protecting defend.

Since then, surgeons have transplanted hearts, kidneys, and a thymus straight contained in the our bodies of residing volunteers, with blended outcomes. One pig coronary heart recipient quickly handed away after the xenotransplant. One other fared higher with a pig kidney: The 53-year-old grandma returned dwelling this February after receiving the organ late final yr.

Her ”restoration from an extended historical past of kidney failure and dialysis remedy has been nothing wanting outstanding,” stated research lead Robert Montgomery at NYU Langone Transplant Institute on the time.

Liver xenotransplants, nonetheless, pose further issues.

The organ “is so difficult,” stated Wang. As the final word multitasker, it metabolizes medication and different chemical compounds, makes bile and different digestive juices, cleans out outdated blood cells, and produces proteins for blood clotting. Every of those capabilities is orchestrated by a symphony of molecules that would differ between pigs and people. A mismatch may lead to a pig liver that may’t work within the human physique or one which triggers harmful immune responses.

In 2023, a staff from the College of Pennsylvania took a stab on the drawback. They linked a genetically engineered pig liver to the bloodstream of a brain-dead particular person with the organ outdoors the physique. The donor liver, engineered by the biotechnology firm eGenesis to cut back the possibility of immune rejection, remained wholesome for a minimum of 72 hours.

Plus One

The brand new research aimed to indicate {that a} pig liver transplant may last more and carry out its standard duties. The staff sourced the liver from Clonorgan Biotechnology based mostly in Chengdu, China.

The donor organ was from a seven-month-old Bama miniature pig and had six gene edits. Nearly all of the edits have been designed to forestall hyperacute rejection, the place the immune system launches a full onslaught towards the transplant inside minutes.

The recipient was a brain-dead, middle-aged man who nonetheless had a working liver. Slightly than attempting to exchange his liver, the staff needed to search out out whether or not a pig liver may survive and performance inside a human physique whereas performing its regular roles.

Surgeons hooked the gene-edited pig liver to the donor’s blood provide and monitored it for 10 days—the period of time the recipient’s household accepted for the experiment. Inside hours, the organ started synthesizing and pumping out bile at a regularly rising quantity. The liver additionally made albumin, a protein essential for sustaining fluids and transporting molecules.

Blood from the recipient flowed easily all through the liver, which seemingly prevented blood clots usually related to liver transplants. Due to immunosuppressant medication, the affected person’s immune system stayed comparatively quiet and didn’t assault the pig organ.

“That is the world’s first [published] case of a transplant of a genetically modified pig liver right into a brain-dead human,” stated Rafael Matesanz, creator and founding father of the Nationwide Transplant Group in Spain, who was not concerned within the work.

Many questions stay. The liver has a number of capabilities, however the research solely examined bile and albumin manufacturing. Might the pig liver additionally filter toxins from the blood or break down drugs? Additionally, the research solely noticed one particular person for a comparatively brief time. The outcomes won’t maintain for different demographics, and the transplant may falter down the highway.

And since the volunteer nonetheless had a useful liver, “we can’t extrapolate the extent to which this xenograft would have supported a affected person in liver failure,” stated Peter Good friend on the College of Oxford, who was not concerned within the research.

Even so, a short lived bridge transplant—the place a pig liver would assist bodily capabilities short-term whereas the recipient waits for a everlasting transplant—may save lives.

The identical staff lately accomplished a full pig-to-human liver transplant, swapping out the liver of a brain-dead human with one from a genetically-modified pig. They plan to launch the information in a future publication. “Whether or not it may change the unique human liver sooner or later [is unknown],” stated Wang on the press briefing. “It’s our dream to make this achievement.”