{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:OFZ6NBOIVNLUGGP2IKJIF372XH","short_pith_number":"pith:OFZ6NBOI","canonical_record":{"source":{"id":"2605.13069","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2026-05-13T06:42:17Z","cross_cats_sorted":[],"title_canon_sha256":"00d55295d9a16d69a4fa73354a4c432a72f03e7682a85b257488916230852b88","abstract_canon_sha256":"21f644210044fab1c55c0ffeb2b63f564abc9ec7d40c7424b88159d5188f65de"},"schema_version":"1.0"},"canonical_sha256":"7173e685c8ab574319fa429282effab9c42fd48021f025f9a4492bb49dfeb1eb","source":{"kind":"arxiv","id":"2605.13069","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.13069","created_at":"2026-05-18T03:08:58Z"},{"alias_kind":"arxiv_version","alias_value":"2605.13069v2","created_at":"2026-05-18T03:08:58Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.13069","created_at":"2026-05-18T03:08:58Z"},{"alias_kind":"pith_short_12","alias_value":"OFZ6NBOIVNLU","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"OFZ6NBOIVNLUGGP2","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"OFZ6NBOI","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:OFZ6NBOIVNLUGGP2IKJIF372XH","target":"record","payload":{"canonical_record":{"source":{"id":"2605.13069","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2026-05-13T06:42:17Z","cross_cats_sorted":[],"title_canon_sha256":"00d55295d9a16d69a4fa73354a4c432a72f03e7682a85b257488916230852b88","abstract_canon_sha256":"21f644210044fab1c55c0ffeb2b63f564abc9ec7d40c7424b88159d5188f65de"},"schema_version":"1.0"},"canonical_sha256":"7173e685c8ab574319fa429282effab9c42fd48021f025f9a4492bb49dfeb1eb","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:08:58.914538Z","signature_b64":"p+A+4c+kGH8UtXqDnfPh4ZTL9/DuTLpZr2UqRjT+Pnz+z6sxp1YoopewVsuauEu8Pmf1Snt/8adTyuBSNSJICQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"7173e685c8ab574319fa429282effab9c42fd48021f025f9a4492bb49dfeb1eb","last_reissued_at":"2026-05-18T03:08:58.913687Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:08:58.913687Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.13069","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:08:58Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lSWrx66c1duZM+HGFvuezdvWOJpZsLCic/swByuALbWoAkQgl5lMmJUBAmlOLj1aChcdtqjcOsasNFTDsK5GAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:03:09.467072Z"},"content_sha256":"efe63a13ad42569e0495194e8720868d20309c536485fa7848fd7e25f2038173","schema_version":"1.0","event_id":"sha256:efe63a13ad42569e0495194e8720868d20309c536485fa7848fd7e25f2038173"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:OFZ6NBOIVNLUGGP2IKJIF372XH","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Not All Anquan Is the Same: A Terminological Proposal for Chinese Computer Science and Engineering","license":"http://creativecommons.org/licenses/by/4.0/","headline":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression.","cross_cats":[],"primary_cat":"cs.CY","authors_text":"Xingyu Zhao","submitted_at":"2026-05-13T06:42:17Z","abstract_excerpt":"In Chinese computer science and engineering, safety and security have long been translated by the same word, \"anquan\". This convention is concise in ordinary communication, but it creates persistent conceptual compression in standards interpretation, interdisciplinary collaboration, risk analysis and academic writing. When researchers need to discuss both whether a system is free from intolerable non-adversarial harm and whether it can resist adversarial threats, the single word \"anquan\" often cannot carry the distinction. This article argues that, while established legal and standards titles "},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"This is not a cosmetic translation preference, but a proposal for terminological governance in scientific cognition, engineering risk communication and assurance argumentation.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That the current single-term usage creates persistent conceptual compression that materially affects standards interpretation, risk analysis, and the examinability of scientific arguments in Chinese technical discourse.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"Proposes using 'anbao' for security and reserving 'anquan' for safety in Chinese technical writing to reduce conceptual overload in safety-security discussions.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"b6d37ab7cff975acde78c1ccd0e6f0fa32e311e68c891dbd0c0c7faeae8d1053"},"source":{"id":"2605.13069","kind":"arxiv","version":2},"verdict":{"id":"d644eb05-d2f8-4498-8c54-dd7da13e01a5","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-15T06:04:01.689909Z","strongest_claim":"This is not a cosmetic translation preference, but a proposal for terminological governance in scientific cognition, engineering risk communication and assurance argumentation.","one_line_summary":"Proposes using 'anbao' for security and reserving 'anquan' for safety in Chinese technical writing to reduce conceptual overload in safety-security discussions.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That the current single-term usage creates persistent conceptual compression that materially affects standards interpretation, risk analysis, and the examinability of scientific arguments in Chinese technical discourse.","pith_extraction_headline":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression."},"references":{"count":64,"sample":[{"doi":"","year":null,"title":"൮Ցԛགྷ safetyࠇsecurity ൈЌ਽ႇ໓ওᇿb২ೂoνಆྟč safetyĎ p oνЌྟ čsecurityĎ p b 2.଀b২ೂಯཿoGB/T 22239uྐ༏ν ॖඪૼoЧ໓ӫః෮උਵთູྐ༏ν Ќ/ຩ઎νЌp b 3.൐Ⴈ oνಆp ᆷսsecurityb ೏ં໓ఃൌษં੐ ଆđႪ༵ཿoνЌྟp b","work_id":"2dd6399b-bb43-44c9-a962-43154997bde4","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2023,"title":"China-Peru bilateral security liaison mechanism","work_id":"5773d096-3aea-4f83-b5fc-50b06d8852a1","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"For example, νಆྟčsafetyĎ and νЌྟčsecurityĎ","work_id":"a67175d4-ae32-4e06-ba61-7f2e1713229f","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"For example, still cite GB/T 22239 asЧေ౰ , and then explain that this article treats its field as ྐ༏νЌ/ຩ઎νЌ","work_id":"5ff77788-29f1-4d64-a080-782cfb6bdb99","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"If the paper is about vulnerabilities, attacks, authentication, access control or threat modeling, prefer νЌྟ","work_id":"83a2f1ff-9a6b-411a-9e60-2224ade4f8a1","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":64,"snapshot_sha256":"8c8eae12af41934486a09e5a5466d391252a5c70e157f2749ab9ee7f176ec6cf","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"d644eb05-d2f8-4498-8c54-dd7da13e01a5"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:08:58Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5NiFeXwiAqo8+l1T9oy6uDo+8sZtUmusrZ72i1aZtqxZx/L7NHE2PgQeDSQrTqx54LlrNbgEQmSWEK18rJbGBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:03:09.468284Z"},"content_sha256":"45471ce99b3340f35280b9b47af3415bb3a380011625dcad96cc6767fa58ec75","schema_version":"1.0","event_id":"sha256:45471ce99b3340f35280b9b47af3415bb3a380011625dcad96cc6767fa58ec75"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:OFZ6NBOIVNLUGGP2IKJIF372XH","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.SP.800-160v2r1.url) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ronald S. Ross et al. Developing Cyber-Resilient Systems: A Systems Security En- gineering Approach. Special Publication NIST SP 800-160 Vol. 2 Rev. 1. National Institute of Standards and Technology, Dec. 2021. doi: 10.6028/NIST.SP.800- 160","arxiv_id":"2605.13069","detector":"doi_compliance","evidence":{"ref_index":34,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ronald S. Ross et al. Developing Cyber-Resilient Systems: A Systems Security En- gineering Approach. Special Publication NIST SP 800-160 Vol. 2 Rev. 1. National Institute of Standards and Technology, Dec. 2021. doi: 10.6028/NIST.SP.800- 160","reconstructed_doi":"10.6028/NIST.SP.800-160v2r1.url"},"severity":"advisory","ref_index":34,"audited_at":"2026-05-19T06:50:02.841075Z","event_type":"pith.integrity.v1","detected_doi":"10.6028/NIST.SP.800-160v2r1.url","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"7378792d5286af71a44782fd5ca7743aa00703f8e8a97d25aea718bcf5d285f1","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":214,"payload_sha256":"3ed9f3bf9024c399b7a685add9c612802bdced5810b150342598c8d247d04cee","signature_b64":"arW5hKzFWQB5jdqjz26OBCBbNOYtG1vlcFJ201T8ldGDmYc0bH09vdl5jq9+bEMae2emCj9txNIIFz77iFTwBA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-19T06:51:53Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KTboIshMeUUfFUR3Aou2ImqMCM/6+FR7Thxs2QolVwICTMAkjYBAYMNBys1rGTlKfb2cNM63wQwf7i4vt9ylAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:03:09.469964Z"},"content_sha256":"445f7b4aaf33bd66aa9a5671abb77b952e0c5817189e6dbb43651fb27854f3ed","schema_version":"1.0","event_id":"sha256:445f7b4aaf33bd66aa9a5671abb77b952e0c5817189e6dbb43651fb27854f3ed"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:OFZ6NBOIVNLUGGP2IKJIF372XH","target":"integrity","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.6028/NIST.CSWP.29.url) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Cherilyn Pascoe, Stephen Quinn, and Karen Scarfone. The NIST Cybersecurity Framework (CSF) 2.0 . NIST Cybersecurity White Paper NIST CSWP 29. Na- tional Institute of Standards and Technology, Feb. 26, 2024. doi: 10.6028/NIST. CSWP.29. url: ","arxiv_id":"2605.13069","detector":"doi_compliance","evidence":{"ref_index":32,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Cherilyn Pascoe, Stephen Quinn, and Karen Scarfone. The NIST Cybersecurity Framework (CSF) 2.0 . NIST Cybersecurity White Paper NIST CSWP 29. Na- tional Institute of Standards and Technology, Feb. 26, 2024. doi: 10.6028/NIST. CSWP.29. url: ","reconstructed_doi":"10.6028/NIST.CSWP.29.url"},"severity":"advisory","ref_index":32,"audited_at":"2026-05-19T06:50:02.841075Z","event_type":"pith.integrity.v1","detected_doi":"10.6028/NIST.CSWP.29.url","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"af8f76675513f7cdcef0cd298c4694030d023b1a311b4913a187198752d253bf","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":213,"payload_sha256":"3df49eeae06251fa4c8cc027c485a67664ccebd81e8e8e89b92144a3ceb46ac5","signature_b64":"xKFIJWKV8AfvdgvtZuupEUz6RbIOllUwk+fEk/vgEtxtYX4pIChYPIozPjnZBB2dyjEgyWM4XdfkdJDNPfWVDA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-19T06:51:53Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pJJa4Uy3raqXEgftc89mJbtxx41Nmnu+HLDnROeGeLrtzI44Ll0aR2H9L7wfzRGoM8qoXaVqdZc8HwldCuuVBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:03:09.470545Z"},"content_sha256":"77fe5119e93eae7ec1e146ef39d7bec48e3243a0246ded4e57b5d76d36ae3c00","schema_version":"1.0","event_id":"sha256:77fe5119e93eae7ec1e146ef39d7bec48e3243a0246ded4e57b5d76d36ae3c00"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/bundle.json","state_url":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T20:03:09Z","links":{"resolver":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH","bundle":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/bundle.json","state":"https://pith.science/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/state.json","well_known_bundle":"https://pith.science/.well-known/pith/OFZ6NBOIVNLUGGP2IKJIF372XH/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:OFZ6NBOIVNLUGGP2IKJIF372XH","merge_version":"pith-open-graph-merge-v1","event_count":4,"valid_event_count":4,"invalid_event_count":0,"equivocation_count":1,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"21f644210044fab1c55c0ffeb2b63f564abc9ec7d40c7424b88159d5188f65de","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2026-05-13T06:42:17Z","title_canon_sha256":"00d55295d9a16d69a4fa73354a4c432a72f03e7682a85b257488916230852b88"},"schema_version":"1.0","source":{"id":"2605.13069","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.13069","created_at":"2026-05-18T03:08:58Z"},{"alias_kind":"arxiv_version","alias_value":"2605.13069v2","created_at":"2026-05-18T03:08:58Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.13069","created_at":"2026-05-18T03:08:58Z"},{"alias_kind":"pith_short_12","alias_value":"OFZ6NBOIVNLU","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"OFZ6NBOIVNLUGGP2","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"OFZ6NBOI","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:45471ce99b3340f35280b9b47af3415bb3a380011625dcad96cc6767fa58ec75","target":"graph","created_at":"2026-05-18T03:08:58Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"This is not a cosmetic translation preference, but a proposal for terminological governance in scientific cognition, engineering risk communication and assurance argumentation."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"That the current single-term usage creates persistent conceptual compression that materially affects standards interpretation, risk analysis, and the examinability of scientific arguments in Chinese technical discourse."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"Proposes using 'anbao' for security and reserving 'anquan' for safety in Chinese technical writing to reduce conceptual overload in safety-security discussions."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression."}],"snapshot_sha256":"b6d37ab7cff975acde78c1ccd0e6f0fa32e311e68c891dbd0c0c7faeae8d1053"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In Chinese computer science and engineering, safety and security have long been translated by the same word, \"anquan\". This convention is concise in ordinary communication, but it creates persistent conceptual compression in standards interpretation, interdisciplinary collaboration, risk analysis and academic writing. When researchers need to discuss both whether a system is free from intolerable non-adversarial harm and whether it can resist adversarial threats, the single word \"anquan\" often cannot carry the distinction. This article argues that, while established legal and standards titles ","authors_text":"Xingyu Zhao","cross_cats":[],"headline":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression.","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2026-05-13T06:42:17Z","title":"Not All Anquan Is the Same: A Terminological Proposal for Chinese Computer Science and Engineering"},"references":{"count":64,"internal_anchors":0,"resolved_work":64,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"൮Ցԛགྷ safetyࠇsecurity ൈЌ਽ႇ໓ওᇿb২ೂoνಆྟč safetyĎ p oνЌྟ čsecurityĎ p b 2.଀b২ೂಯཿoGB/T 22239uྐ༏ν ॖඪૼoЧ໓ӫః෮උਵთູྐ༏ν Ќ/ຩ઎νЌp b 3.൐Ⴈ oνಆp ᆷսsecurityb ೏ં໓ఃൌษં੐ ଆđႪ༵ཿoνЌྟp b","work_id":"2dd6399b-bb43-44c9-a962-43154997bde4","year":null},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":2,"title":"China-Peru bilateral security liaison mechanism","work_id":"5773d096-3aea-4f83-b5fc-50b06d8852a1","year":2023},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":3,"title":"For example, νಆྟčsafetyĎ and νЌྟčsecurityĎ","work_id":"a67175d4-ae32-4e06-ba61-7f2e1713229f","year":null},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":4,"title":"For example, still cite GB/T 22239 asЧေ౰ , and then explain that this article treats its field as ྐ༏νЌ/ຩ઎νЌ","work_id":"5ff77788-29f1-4d64-a080-782cfb6bdb99","year":null},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"If the paper is about vulnerabilities, attacks, authentication, access control or threat modeling, prefer νЌྟ","work_id":"83a2f1ff-9a6b-411a-9e60-2224ade4f8a1","year":null}],"snapshot_sha256":"8c8eae12af41934486a09e5a5466d391252a5c70e157f2749ab9ee7f176ec6cf"},"source":{"id":"2605.13069","kind":"arxiv","version":2},"verdict":{"created_at":"2026-05-15T06:04:01.689909Z","id":"d644eb05-d2f8-4498-8c54-dd7da13e01a5","model_set":{"reader":"grok-4.3"},"one_line_summary":"Proposes using 'anbao' for security and reserving 'anquan' for safety in Chinese technical writing to reduce conceptual overload in safety-security discussions.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"Chinese technical discourse should use 'anbao' for security and reserve 'anquan' for safety to avoid conceptual compression.","strongest_claim":"This is not a cosmetic translation preference, but a proposal for terminological governance in scientific cognition, engineering risk communication and assurance argumentation.","weakest_assumption":"That the current single-term usage creates persistent conceptual compression that materially affects standards interpretation, risk analysis, and the examinability of scientific arguments in Chinese technical discourse."}},"verdict_id":"d644eb05-d2f8-4498-8c54-dd7da13e01a5"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:efe63a13ad42569e0495194e8720868d20309c536485fa7848fd7e25f2038173","target":"record","created_at":"2026-05-18T03:08:58Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"21f644210044fab1c55c0ffeb2b63f564abc9ec7d40c7424b88159d5188f65de","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2026-05-13T06:42:17Z","title_canon_sha256":"00d55295d9a16d69a4fa73354a4c432a72f03e7682a85b257488916230852b88"},"schema_version":"1.0","source":{"id":"2605.13069","kind":"arxiv","version":2}},"canonical_sha256":"7173e685c8ab574319fa429282effab9c42fd48021f025f9a4492bb49dfeb1eb","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"7173e685c8ab574319fa429282effab9c42fd48021f025f9a4492bb49dfeb1eb","first_computed_at":"2026-05-18T03:08:58.913687Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:08:58.913687Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"p+A+4c+kGH8UtXqDnfPh4ZTL9/DuTLpZr2UqRjT+Pnz+z6sxp1YoopewVsuauEu8Pmf1Snt/8adTyuBSNSJICQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:08:58.914538Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.13069","source_kind":"arxiv","source_version":2}}},"equivocations":[{"signer_id":"pith.science","event_type":"integrity_finding","target":"integrity","event_ids":["sha256:445f7b4aaf33bd66aa9a5671abb77b952e0c5817189e6dbb43651fb27854f3ed","sha256:77fe5119e93eae7ec1e146ef39d7bec48e3243a0246ded4e57b5d76d36ae3c00"]}],"invalid_events":[],"applied_event_ids":["sha256:efe63a13ad42569e0495194e8720868d20309c536485fa7848fd7e25f2038173","sha256:45471ce99b3340f35280b9b47af3415bb3a380011625dcad96cc6767fa58ec75"],"state_sha256":"0eb4202775b988bdae5a2ae8f0fa979fa3feef95d58986d7ad860946bcc79ca6"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hNcedfxVRn0UVc5sHsH1/RnllrI68eTe5ZwPrimYfslS1VPJKkaScB+ZrMKQ4QCZ3tKGS/udnyP1n8TFSsGDBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T20:03:09.475449Z","bundle_sha256":"b775726230764d292de493492f44acd9fdcca740d3c24507fbb716840510e61a"}}