← Back to Library

Chinese AI rings in the year of the horse

Jordan Schneider's latest dispatch from ChinaTalk cuts through the festive noise of the Lunar New Year to reveal a frantic, high-stakes industrial sprint that defines the current state of Chinese artificial intelligence. While the rest of the world is celebrating, Schneider argues that China's tech sector is treating the holiday deadline as a strategic launch window, creating a unique convergence of product releases, regulatory maneuvers, and geopolitical maneuvering that demands immediate attention.

The Distillation Dilemma and the Agent Pivot

Schneider opens by highlighting the eerie silence from DeepSeek, a lab that has become a focal point of global AI anxiety. "It has now been more than a year since DeepSeek R1 came out, and everyone is anticipating major moves from the secretive frontier lab to usher in the Year of the Horse." Yet, the real story isn't the lack of an official announcement, but the quiet beta-testing of a new model that appears to be a direct competitor to Western frontier systems. Schneider notes that the new iteration boasts a context window "nearly eight times bigger than the context window of V3.2," signaling a massive leap in capability.

Chinese AI rings in the year of the horse

The piece takes a darker turn when addressing the methods behind these gains. Schneider details a memo from OpenAI accusing DeepSeek of sophisticated data theft. "We have observed accounts associated with DeepSeek employees developing methods to circumvent OpenAI's access restrictions and access models through obfuscated third-party routers." This is not merely about copying code; it represents a maturing ecosystem of "adversarial distillation attempts" where Chinese actors are blending synthetic data generation with large-scale cleaning to bypass restrictions. Schneider writes, "Chinese actors have moved beyond Chain-of-Thought extraction toward more sophisticated, multi-stage pipelines." This framing is crucial because it shifts the narrative from simple espionage to a systemic, industrial-scale effort to reverse-engineer American advantages.

"The shift from chatbots to agents optimized for economically productive tasks is clearly underway."

Beyond the controversy, Schneider identifies a clear market pivot: the move from conversational bots to "agentic engineering." Companies like Zhipu and MiniMax are no longer just selling chat interfaces; they are selling coding partners and autonomous workers. Zhipu's GLM-5, for instance, is explicitly "targeted at long-horizon agentic tasks," while MiniMax advertises its M2.5 model as "intelligence too cheap to meter." This aggressive pricing and functional shift suggests a market that is rapidly commoditizing basic intelligence to focus on high-value, autonomous execution. Critics might argue that this rush to market could compromise safety, but the economic pressure to deploy these tools seems to be outpacing regulatory caution.

The Robotics Spectacle and the Hardware Reality

The commentary then shifts to the physical world, where the Lunar New Year Gala served as a de facto product launch for China's humanoid robotics sector. Schneider observes that the event was a "complete invasion" of robots, with companies like Unitree showcasing fluid backflips and kung-fu moves that stand in stark contrast to the rigid movements of the previous year. The market reaction was immediate: "The crazy robotics performances reportedly caused a 300% month-on-month increase in searches for robots on JD.com and a 150% increase in orders."

However, Schneider also highlights the darker undercurrents of this technological showcase. While companies celebrate the "world's first robot-powered gala," the software driving these machines is facing scrutiny. Alibaba's new open-source model, RynnBrain, claims to beat Google and Nvidia in spatial reasoning, yet Schneider notes, "It's too early to tell how good these robots or models are in non-controlled environments." The gap between the controlled stage performance and real-world application remains a significant vulnerability.

Simultaneously, the article exposes a critical shift in the semiconductor landscape. With global memory giants focused on high-bandwidth memory for AI, a shortage has emerged for consumer electronics. Schneider points out that major PC makers like HP and Dell are now "qualifying CXMT for their products," and even Apple is reportedly exploring Chinese suppliers. This has led to a surprising policy reversal: "The Pentagon removed both CXMT and YMTC from their Section 1260H blacklist, lessening barriers for them to operate in America." This move suggests that the US administration is pragmatic enough to allow Chinese memory makers to fill the gap in the consumer supply chain, even as it restricts advanced logic chips. Schneider writes, "The Department of Defense's actions indicate that the US might be okay with China picking up the slack in the memory market." This nuance is often missed in broader discussions of the tech war, where the focus is usually on total containment rather than selective interdependence.

The Data Advantage and the Copyright Clash

Finally, Schneider tackles the video generation sector, where Chinese models like ByteDance's Seedance 2.0 and Kuaishou's Kling 3.0 are challenging Hollywood's dominance. The argument here is stark: data is the new oil, and China has a massive, untapped reserve. "ByteDance, for instance, owns Douyin, which has well over a billion users. That translates directly into training advantage." Schneider explains that while US models are hamstrung by copyright scrutiny, Chinese firms are leveraging their "vast video data resources" to train models that are "100-1000x more resource-intensive" than text models.

"It seems that data is what is keeping China's AI models competitive."

This data advantage, however, comes with significant legal and ethical baggage. Schneider details how Hollywood studios have threatened to sue over the use of copyrighted characters, and how independent creators have demonstrated that Seedance can approximate a person's voice from a single photo. "Tech blogger Pan Tianhong publicly demonstrated that Seedance could approximate his voice from just a single uploaded photograph of his face." The response from the company was a suspension of features, but the underlying issue of training data remains unresolved. Schneider notes that unlike the open-source consensus in the LLM space, "there is far less sector-wide consensus around openness in video," with top-tier systems remaining proprietary.

Bottom Line

Schneider's analysis succeeds in reframing the Lunar New Year not as a pause in activity, but as a critical inflection point where Chinese AI is aggressively pivoting toward agentic tasks, robotics, and data-driven video models. The strongest part of the argument is the exposure of the "distillation ecosystem" and the pragmatic shift in US semiconductor policy regarding memory chips. However, the piece's biggest vulnerability lies in its optimism about the immediate scalability of these technologies; the gap between a gala performance and a reliable industrial robot, or between a beta-tested model and a safe, compliant product, remains wide. Readers should watch closely to see if the aggressive deployment of these models triggers a new wave of international regulatory backlash or if the data advantage proves insurmountable.

Deep Dives

Explore these related deep dives:

  • DeepSeek

    The article discusses this Chinese AI company as the central focus, mentioning their R1 model and alleged distillation practices

  • OpenAI

    The article references OpenAI's memo accusing DeepSeek of蒸馏 (distillation) and circumventing access restrictions

Sources

Chinese AI rings in the year of the horse

by Jordan Schneider · ChinaTalk · Read full article

The Year of the Fire Horse is upon us, meaning China’s AI industry spent the final weeks before Lunar New Year frantically racing to ship new models before everyone disappears for the break. Chinese tech companies treat the New Year cutoff like a product-launch deadline, knowing that a strong pre-holiday release captures press cycles at a moment when the whole country is at home scrolling on social media. Regulators, too, have learned to time their moves, issuing new rules and penalties when attention is at its peak.

All the ensuing noise can make it hard to see what matters most. So the ChinaTalk team is here to parse out hype from reality and highlight some trends likely to shape Chinese AI in 2026.

Today’s updates explore LLMs, robotics, hardware, video models, and governance.

Caption: Draco Malfoy is the LNY mascot the world never knew it needed. Source.

Chatbots, Coding, and Agentic Updates.

It has now been more than a year since DeepSeek R1 came out, and everyone is anticipating major moves from the secretive frontier lab to usher in the Year of the Horse. As of February 18, we have seen nothing official from DeepSeek. Clever users, however, have noticed that they seem to be beta-testing what could be V4 through its chatbot interface. Currently, querying DeepSeek with “who are you” returns an introduction where the chatbot states that it has a context window of one million tokens, which is nearly eight times bigger than the context window of V3.2.

This new DeepSeek is prone to snappy parallelisms and as eager to please as ever. It’s somewhat eerily reminiscent of GPT-4, even down to the “You’re absolutely right!” refrain:

“Your follow-up question is absolutely right. ”

And there might be a reason why: on February 12, OpenAI accused DeepSeek of covert distillation of its models in a memo to the House Select Committee on Strategic Competition between the US and the Chinese Communist Party. Here’s how OpenAI describes what it calls “adversarial distillation attempts” in the memo:

We have observed accounts associated with DeepSeek employees developing methods to circumvent OpenAI’s access restrictions and access models through obfuscated third-party routers and other ways that mask their source. We also know that DeepSeek employees developed code to access US AI models and obtain outputs for distillation in programmatic ways. We believe that DeepSeek also uses third-party routers to access frontier models from ...