Press "Enter" to skip to content

Apple Reportedly Found No Signs of Microchip Tampering

Following the publication of a Bloomberg Businessweek report last week, tech giants Apple, Amazon, and Supermicro denied through their press releases that their systems tampered. The accusations were pointed at some of the Chinese agents who introduced microchips into servers manufactured in the country.

Apple top security officer told Congress on Sunday that it had discovered no indication of suspicious transmissions or other proof that it had been penetrated in a complex assault on its inventory network.

Apple Vice President for Information Security, George Stathakopoulos wrote in a letter to the Senate and House trade councils that the organization had more than once investigated and found no proof for the principle points in a Bloomberg Businessweek article published on Thursday, including that chips inside servers sold to Apple by Super Micro Computer Inc allowed for backdoor transmissions to China.

According to a letter he wrote to Reuters, “Apple’s exclusive security tools are ceaselessly scanning for definitely this sort of outbound traffic, as it shows the presence of malware or other malicious activity. Nothing was ever discovered.” He rehashed Apple’s announcements to the press that it never found malicious microchips or vulnerabilities intentionally positioned in any server or been reached by the Federal Bureau of Investigation (FBI) about such concerns. He further added that he would be present to brief Congressional staff on the subject this week.

In its original proclamation, Apple said that while Bloomberg Businessweek requested the organization to comment on the accusations as of late, it conducted thorough inward examinations in view of their inquiries and hadn’t discovered any evidence of tampering with the microchips. Beyond each of the company’s respective disavowals, US and UK legislative offices have upheld them up, each saying that they do not have any reason to question their statements.


Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *