-
-
-
- They aren’t m. But it’s soooo, sooo much easier to spy using software and malware. Building in hardware to spy on a design that wasn’t meant to receive an extra chip... do you realize how difficult that is? It’s like putting square tires on a car.10-05-18 11:52 AMLike 0
- 10-05-18 11:58 AMLike 0
- Definitely harder to implement than software but has a much longer shelf life if it indeed made it through the entire supply chain. Cameras and mics bring the greatest threat.10-05-18 02:22 PMLike 0
- still waiting for the details. with Blu embedded gps location "test" chip issue early last year, I am not surprised. insert extra chip is not as difficult as many imagined - if you only send schematic to sub-contract and let them do the layout and generate Gerber files for the board, and you demand final product to be fully tested with boundry scan only, but not check / sign off on detail layout (performance only), I can see it rather easy to add a "test point" chip...- if that chip has enhanced functionality, you might have problem - e.g. security. As I said before, I am still waiting to see the details. IMHO.10-05-18 02:42 PMLike 0
-
-
Now they are taking their cash and buying up the West Coast of the U.S. and Canada. Think that new Chinese residents in North America don't have loyalty to their homeland and would not steal secrets and IP?10-05-18 04:34 PMLike 0 - still waiting for the details. with Blu embedded gps location "test" chip issue early last year, I am not surprised. insert extra chip is not as difficult as many imagined - if you only send schematic to sub-contract and let them do the layout and generate Gerber files for the board, and you demand final product to be fully tested with boundry scan only, but not check / sign off on detail layout (performance only), I can see it rather easy to add a "test point" chip...- if that chip has enhanced functionality, you might have problem - e.g. security. As I said before, I am still waiting to see the details. IMHO.10-05-18 04:35 PMLike 0
-
"Whether a chip, as described, can do what's being described and whether or not the group being described could produce such a chip are among the debate topics."
"About the only thing everyone agrees on is that there's no evidence any customer data — any of our data — has been compromised."anon(10218918) and app_Developer like this.10-05-18 04:38 PMLike 2 - CIA/NSA did similar things at a hard drive plant in SE asia corrupted their firmware such that formatting the drive wouldn't get rid of the malware.anon(10218918) likes this.10-05-18 05:12 PMLike 1
-
- Agree. The worst mistake the West ever made was opening up China in the early-1970s. Then we started treating them like a friendly trading partner and ignoring all the abuses.
Now they are taking their cash and buying up the West Coast of the U.S. and Canada. Think that new Chinese residents in North America don't have loyalty to their homeland and would not steal secrets and IP?10-05-18 05:24 PMLike 0 - The very notion that you could just deposit a tiny chip, with a few snipets of code, into a device that can talk to everything through encryption and then relay all the information back to the mothership is absurd imo.
"Whether a chip, as described, can do what's being described and whether or not the group being described could produce such a chip are among the debate topics."
"About the only thing everyone agrees on is that there's no evidence any customer data — any of our data — has been compromised."
Time will tell.10-05-18 07:27 PMLike 0 - While I agree with your post, I’m curious if this isn’t some kind of “fake” news that could be planted for other reasons. Not saying that it’s possible or impossible but that social media allows for a level of planting false or exaggerated information for the purpose of misdirection. All larger developed countries are using social media for multiple agendas not always fully apparent.
Posted via CB1010-05-18 07:45 PMLike 0 - Just an observation, I have no idea either way. On side note, I tagged you in another thread where somebody was looking for supertube10-05-18 08:22 PMLike 0
- The very notion that you could just deposit a tiny chip, with a few snipets of code, into a device that can talk to everything through encryption and then relay all the information back to the mothership is absurd imo.
"Whether a chip, as described, can do what's being described and whether or not the group being described could produce such a chip are among the debate topics."
"About the only thing everyone agrees on is that there's no evidence any customer data — any of our data — has been compromised."
Our company has a Chinese cyber expert whose response to this news was, "It's a major attack, but it's only the tip-of-the iceberg. Now consider every 'smart' device being produced in China and figure 5-10 percent of IoT devices are compromised in the factory.". One security researcher said we should just replace the word "smart" with the word "dangerous" when talking about technology in general!
The Chinese treat cyber espionage as a long game. They have large military and civilian units focused on exactly these kinds of advanced persistent threats.
If you ask me whether I believe the security researchers or the corporate suits covering their asses headed into the fourth quarter for consumer sales, it's an easy decision whom to trust!
Posted with my trusty Z1010-05-18 08:41 PMLike 3 -
Posted with my trusty Z1010-05-18 08:50 PMLike 0 - One might wonder why a Chinese company might licence BlackBerry under the mistaken impression that these phones were still popular amongst government and business users.
On the other hand, "BlackBerry effort to enable OEMs establishing a BlackBerry Secure hardware root of trust from their own assembly line. As part of the service, BlackBerry will provide a remote and secure workstation—connected to the BlackBerry Network Operations Center (NOC)—that will provision and assign secure tokens and certificates. This should provide a strong defense for rootkits, which are almost impossible to defend against."
Presumably, BlackBerry must be confident of their processes to allow a Chinese factory to interact with their servers. It is also interesting that the offending motherboards were tested in Ontario, Canada.
Actually, BlackBerry and its partners are depending heavily on the root of trust technology. If there is a breach , BlackBerry's world will collapse. Seems like a good time to buy a BlackBerry phone.10-05-18 09:43 PMLike 0 - I assume that would depend on the component, there are RAM mods for the Priv that don't seem to trip the OS for example. The story also says that the chips were inserted during the manufacturing process, I'm not sure how easy it would be to flag something like that.10-06-18 10:13 AMLike 0
- on the handset level, if it is OEM/CM (contract MFG) relationship,it is harder to insert chip unless it is by design (such as Blu case). the board is too dense to insert a chip without mess around design of intended RF response or singal integrity. Apple design is fully controlled inhouse (as labelled such - designed by apple in California)... so I wouldn't worry too much about their handsets level. Server is different story (that use super-micro mother board?). Old BB, similar to Apple, is fully in house control design, not farmed out. holding my z30 closer...10-06-18 10:30 AMLike 0
- The very notion that you could just deposit a tiny chip, with a few snipets of code, into a device that can talk to everything through encryption and then relay all the information back to the mothership is absurd imo.
"Whether a chip, as described, can do what's being described and whether or not the group being described could produce such a chip are among the debate topics."
"About the only thing everyone agrees on is that there's no evidence any customer data — any of our data — has been compromised."
Posted via CB10Last edited by Leyra B10; 10-06-18 at 11:36 AM.
10-06-18 10:44 AMLike 0 - it's not that hard for PhD engineers, and it's the best kind of advanced persistent threats because no amount of patching or scanning will mitigate it. The only difficult thing is to 1) gain physical access to the factory and 2) devote the time and resources to take advantage of tens of thousands of servers in data centers. By focusing on the boards used to encode and decode video, the agents were guaranteed to gain access to almost all major data centers. This is exactly what stage intelligence agencies do.
Posted with my trusty Z10ppeters914 likes this.10-06-18 10:47 AMLike 1
- Forum
- BlackBerry 10 Phones & OS
- BlackBerry 10 OS
Just shut up and trust the Chinese?
Similar Threads
-
Android 9 Pie - Is it possible the KEY2 might receive it early?
By bobmoley in forum BlackBerry KEY2Replies: 720Last Post: 08-07-19, 03:41 PM -
After Oreo update the phone has lags
By Corsari in forum BlackBerry KEYoneReplies: 1Last Post: 10-04-18, 01:12 PM -
BlackBerry KEY2 LE arrives at Bell, Rogers, TELUS, and Koodo on October 5
By CrackBerry News in forum CrackBerry.com News Discussion & ContestsReplies: 0Last Post: 10-04-18, 08:40 AM -
BlackBerry KEY2 Dual-SIM now available from Clove and Unlocked-Mobiles UK
By CrackBerry News in forum CrackBerry.com News Discussion & ContestsReplies: 0Last Post: 10-04-18, 07:30 AM -
speed key for turning on and off NFC?
By bcbbanga4l in forum BlackBerry KEY2Replies: 1Last Post: 10-04-18, 05:53 AM
LINK TO POST COPIED TO CLIPBOARD