back to article Chinese Super Micro 'spy chip' story gets even more strange as everyone doubles down

The veracity of a bombshell yarn claiming Chinese agents managed to sneak spy chips into Super Micro servers used by Amazon, Apple and the US government is still being fiercely argued over five days after publication. On Tuesday, the media outlet behind the claims, Bloomberg, responded to growing criticism of its report by …

        1. Anonymous Coward
          Anonymous Coward

          Re: Ha HA!

          > The whole article is about China stealing information. Sending Ethernet frames only to the local network won't quite achieve that, will it? At some point, they'll have to get out, which means they'll get routed.

          I know that. And it is well documented that China was able to exfiltrate F-35 data from Lockheed-Martin. My point is that successful exfiltration does not rely on "blind hope," instead it relies on careful planning. People still talking about "blind hope" are grossly underestimating the Chinese.

  1. WatAWorld

    Why are ICs always in large packages, how is this dot powered?

    It is easy to create an IC smaller than the point of a pencil.

    1. Problem #1 is that you need to connect it to power and ground and data buses -- which is why ICs are put into large packages, and why there are circuit board traces leading to them.

    2. The dot had neither a windmill nor a solar panel nor a connection to a powerbus, so how is it supposedly powered? Itsy bitsy tiny little nuclear reactor?

    And how does it connect to data paths? Psychokinetics?

    Simple physics proves that the story has huge errors in its vague technical descriptions and photos.

    And with the technical details like power and data connections left out, Bloomberg's story has less than zero credibility.

    +++ That said, I do not doubt for a minute that the USA, UK, China, and probably Russia ALL engage in this sort of hardware hacking on a regular basis against key non-governmental targets. +++

    (Doubtlessly this sort of spying occurs between governments, but with government targets it is expected. Hopefully no educated person is so arrogant, imperialistic and immoral* that they think their government should be exempted from other governments doing to it what it does to others.

    * Accepting others doing to you what you do to others is part of the Lord's Prayer -- the "trespassing part". People living in countries that are truly and sincerely Christian do not claim exceptionalism.

    To claim exceptionalism while claiming to be Christian is to lie to yourself and your god.)

    1. MrDamage Silver badge

      Re: Why are ICs always in large packages, how is this dot powered?

      It could be theoretically possible. Physically possible, not sure.

      An inbuilt thermocoupler could potentially provide enough power for such a small chip to do its work, depending on what exactly the "work" is.

      El Reg has detailed before how its possible to snoop on CPU proceeses using the innate sounds the CPU makes, especially when dealing with RSA keys. El Reg have also detailed other hacking methods based on sound from other input devices as well.

      So this chip could potentially be listening in for those sounds in order to get a hold of those keys to help facilitate hacking from an external source based on the RSA keys it "heard" .

      The exfiltration of those keys is where it starts to get tricky, especially if it has no tracks to any comm ports of any style.

      Could the chip then also use sound to broadcast those keys at a specific, seperate frequency that could be picked up by a mic placed somewhere in the data centre by a spy/bought agent, or even just a mobile phone connected to a powr source and secreted under a floor tile or roof panel? Maybe.

      Theoretically, its possible, based on existing technology and methods, it's just whether all this stuffed into a ridiculously small package is technically possible at this stage of micro-electronics is the question.

      After all, what better way to completely throw off suspicion than to include such a chip, but not have it connected to anything?

      1. EveryTime

        Re: Why are ICs always in large packages, how is this dot powered?

        > "An inbuilt thermocoupler could potentially provide enough power for such a small chip to do its work, depending on what exactly the "work" is."

        A thermocouple will not work. It will generate under a millivolt and trivial power. You need a significant temperature difference for a usable voltage, and significant heat flow for usable power.

        And a small chip isn't likely to have enough cleverness to analyze a system, let alone extract keys. A realistic scenario would be to rely on direction from an external system.

        And even if it could extract the keys, how would it transmit with a near-zero-length antenna?

        1. doublelayer Silver badge

          Re: Why are ICs always in large packages, how is this dot powered?

          I'm not saying it happened--in fact, it seems likely that it didn't happen, but the chip in practice does not need all of the things you say it does. If the original description is correct, it merely sits between a flash chip and a processor, replacing serial traffic. It could use the data traffic from the flash as enough power to inject another signal. After that, the new code could be run just fine by the processor running the servers' firmware, which can do all of the actual stealing, embedding of information into something hard to detect, and exfiltration over the internet. I don't think this happened, but your reasons wouldn't explain why not.

          1. bombastic bob Silver badge
            Devil

            Re: Why are ICs always in large packages, how is this dot powered?

            it has a name: 'parasitic power'. If you rely on open-drain logic circuits for the signals, you can get away with ONLY data (and ground) lines. DS18B20 is one such device [1-wire interface] that can use parasitic power.

        2. aks

          Re: Why are ICs always in large packages, how is this dot powered?

          You pose an interesting challenge. There is a huge amount of energy of all sorts sloshing around inside a computer. Vibration/noise, electromangnetic hum, etc. The antenna could be the motherboard itself, the chassis, the earth lead.

          Then again, there are easier ways to do this.

          I prefer the story that it's a what-if that's been converted to a this-happened. Maybe the real motive is to reduce the trust and thereby the usage of Chinese computer equipment.

    2. Anonymous Coward
      Anonymous Coward

      Re: Why are ICs always in large packages, how is this dot powered?

      It is about 20 years since I worked in electronics and chip packaging though the pitch has become finer the basic principles remain the same. So...

      >It is easy to create an IC smaller than the point of a pencil.

      Yes. You just saw the wafer to size.

      >1. Problem #1 is that you need to connect it to power and ground and data buses -- which is why ICs are put into large packages, and why there are circuit board traces leading to them.

      Wrong. Chip packaging allows for easy handling including testing. The alternative you forget is flip chip technology.

      >2. The dot had neither a windmill nor a solar panel nor a connection to a powerbus, so how is it supposedly powered? Itsy bitsy tiny little nuclear reactor?

      It is attached to pads. These can be disguised as test pads during design and board production.

      >And how does it connect to data paths? Psychokinetics?

      See above. This is well known technology, has been for over 20 years.

      >Simple physics proves that the story has huge errors in its vague technical descriptions and photos.

      Physics is a branch of science and in science you do not prove facts but you disprove a hypothesis. None of what you write is anywhere near disproving the story.

      >And with the technical details like power and data connections left out, Bloomberg's story has less than zero credibility.

      The story, had you read it, stated that the chips were disguised as signal conditioners. It follows that these had to be connected to tracks carrying signals to be conditioned. The opposite would have immediately raised suspicion. Also, how do you attach a chip to anything other than a pad?

      >+++ That said, I do not doubt for a minute that the USA, UK, China, and probably Russia ALL engage in this sort of hardware hacking on a regular basis against key non-governmental targets. +++

      That does not make any sense. OK, or they do it except from that China does not do it here?

      >(Doubtlessly this sort of spying occurs between governments, but with government targets it is expected. Hopefully no educated person is so arrogant, imperialistic and immoral* that they think their government should be exempted from other governments doing to it what it does to others.

      See above. Claiming others do it but China does not is bizarre. Please at least attempt to clarify.

      >* Accepting others doing to you what you do to others is part of the Lord's Prayer -- the "trespassing part". People living in countries that are truly and sincerely Christian do not claim exceptionalism.

      What does this has to do with anything?

      >To claim exceptionalism while claiming to be Christian is to lie to yourself and your god.)

      And who claimed exceptionalism? From what I can see you were the first to bring it up.

  2. Jay Lenovo

    A Matter of Trust

    You either believe the Bigfoot testimony or you don't.

    Proof apparently is under non-disclosure.

    1. WatAWorld

      Re: A Matter of Trust

      So you're saying it is a matter of belief and religion.

      Do we believe in Bloomberger Infallibility? Are we of the Bloomberg faith?

      Pretty much the only electrical engineers and physicists who believe the story are going to be doing so in the face of facts they know. So yeah, I totally agree, it would be a religious belief for them.

      To most professional programmers, the thermodynamic, electrical and quantum mechanical stuff going on inside a computer is magic that they just accept. (It would be useless details that get in the way of coding.) So out of ignorance, and not realizing the limitations of their expertise, they might sincerely believe Bloomberg.

    2. JohnFen

      Re: A Matter of Trust

      "You either believe the Bigfoot testimony or you don't."

      I disagree -- I take a third option, which is "I don't know". I try not to believe or disbelieve claims in the absence of evidence (although I often have a sense of whether or not a claim is likely to be true, that isn't the same as believing or disbelieving).

      Instead, I try to merely note that the claim was made.

      1. Sam Liddicott

        Re: A Matter of Trust

        True dat!

        Too many people feel the need to come to a premature conclusion, and get very choppy with Occam's razor to help them do it.

        They consider that extraordinary claims require extraordinary evidence and then chop away, not thinking of the extraordinary value that they might be chopping away for want of a little patience.

        1. Doctor Syntax Silver badge

          Re: A Matter of Trust

          They consider that extraordinary claims require extraordinary evidence

          FTFY

      2. Mark 85

        Re: A Matter of Trust & False Flags

        I too am taking the long view of "I don't know" and "I'm not sure who to trust" in this. The story could be a plant to discredit the Chinese or it could be a cover up of something else... a distraction. Bloomberg does have a reputation for accuracy but in this case...is it real or is BS? If it's BS, it's of the highest order but then there's "agencies" that are well funded and have some very creative people involved.

        Best bet is to not to jump to a conclusion that someone wants us to believe, but wait and see how this plays out. Sherlock Holmes comes to mind: "The game is afoot!".

      3. Charles 9

        Re: A Matter of Trust

        Most people won't accept a third option: adopting a strict for/against mindset, assuming vacillation equals dissent.

        1. JohnFen

          Re: A Matter of Trust

          Yeah, it's the old "if you're not with us, you're against us" bullshit. Too many people have internalized that.

  3. MX9000

    Market Moving Bonus - Incentives and how they Fail.

    Bloomberg has a Market Moving Bonus incentive.

    Mic Drop.

    1. Anonymous Coward
      Holmes

      Re: Market Moving Bonus - Incentives and how they Fail.

      Probably the most plausible conspiracy theory this time is that it was someone wanting to manipulate market prices for tech stocks. So come on journos, do some digging and tell us who's been buying? Or indeed shorting!

      Or would that itself lead to a false trail ... perhaps to someone who's being framed for corruption?

      Or just someone being tainted? If this is outed as nonsense, it could cast a shadow over a man who ruled himself out as presidential candidate because he thought his standing would improve Trump's chances of winning. Especially if there's a dark hint those untraceable Cayman Island accounts might be linked to him.

  4. EveryTime

    A small die-bonded chip on a motherboard is feasible. When attached to the BMC, either on the SMBus or SPI-connected program flash, it could modify just enough to accept very simple remote commands. It would be fragile and take lots of network traffic, but it could work.

    Saying that such an attack is technically feasible is far different than saying that it occurred, or occurred that way. It's a complicated approach that would involve subverting the board fabrication company at multiple points. It would be far simpler to just modify the BMC firmware directly.

    I think that someone was spinning a yarn, and the reporters fell for it.

    1. Charles 9

      So how would you approach it if you can't be sure the firmware will stay the same due to custom flashes or security updates?

      1. Anonymous Coward
        Anonymous Coward

        Pictures or it didn't happen

        Readers may have seen:

        * pictures of Supermicro-class motherboards where the SROM (or SPI Flash or whatever) chip can go in a choice of two clearly labelled adjacent locations, depending on what's readily available in the stores on the day, and what they need to do with them.Not big difference, but...

        * well-verified articles where firmware upgrades, downgrades, and 'fixes' provide a trivial mechanism for changing the behaviour of a system without any need to add 'malicious chips', especially when the firmware update mechanism doesn't have much built in security.

        * writeups of high volume low cost LAN connectors being replaced with visually identical connectors with different innards. What kind of thing can go inside a typical LAN connector without anybody noticing, till the unwelcome and unintended traffic gets on a LAN and somebody happens to see it?

        Now make it a combined LAN/USB connector as seen on many motherboards. Plenty of power and connectivity to play with there, if you want to hide something inside it in plain view.

        * instances where an allegedly secure site wouldn't let unauthorised/unauthenticated kit onto its LANs, but did nothing to stop laptops that had been on the LAN (slurping data they shouldn't be slurping, from the chip hidden on some other box's motherboard?) being taken offsite and then dumping their slurped data into someone else's systems ready for the next round.

        There's not enough hard information in the Bloomberg story to be able to make an informed technical comment. But the underlying capabilities are probably real enough.

      2. DropBear

        @Charles 9 so pray tell, exactly when was the last time you updated your BMC firmware...?

        1. Spazturtle Silver badge

          At which point we get to the stage were we ask: If the hack relies on the firmware not being changed then why not just flash a hacked firmware to the boards instead of using a chip?

  5. mhkool

    we need real hard proof, not opinions

    ok, the spy-chip is plausible, but does it exist?

    I no longer want to see a good photo + details about what the chip actually does, no there is too much pushing from all sides, that only hard evidence can convince a techie.

    Show us the motherboards! 30 companies and the US government has these spy-chips, so show at least 3 motherboards and make them available for an independent party to verify the claims about the spy-chip.

    1. DropBear

      Re: we need real hard proof, not opinions

      That could be problematic considering those in possession of the kit insist there is nothing to show and those insisting there is have no access to the PCBs. Seizing stuff wouldn't really prove anything at all either at this point since if the claims are real, moving the evidence out of the way would have likely been the first thing that was done...

    2. Anonymous Coward
      Holmes

      Re: we need real hard proof, not opinions

      make them available for an independent party

      Now there's an interesting dilemma. To squash conspiracy theories, it has to be a party the would-be conspiracy-theorists trust. And not subject to intimidation from a government that might be implicated. Is there any such?

      Hmmm. Maybe Kaspersky? A strong track record, and someone whose government (for a change) isn't a suspect?

  6. WatAWorld

    Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...

    "Faced with such uncertainty, some are reaching for a unifying explanation: that Bloomberg was misled by some in the intelligence community that wish, for their own reasons, to raise the specter of Chinese interference in the global electronics supply chain. Bloomberg could be accurately reporting an intelligence misinformation campaign."

    Yes, obviously it is easier for Five Eyes intelligence agencies to thoroughly hack and backdoor stuff totally designed and built within either Five Eyes nations or vassal states. And that is important because you can't infiltrate something by gluing a tiny piece of silicon on it.

    Here in Canada we've constantly got the USA trying to tell us to exclude Huawaii from government and private company contracts.

    But shouldn't Bloomberg have asked someone at MIT, Stanford, Intel or AMD whether this could function? That a piece of silicon glued to the surface of a circuit board and not connected to conductors could do anything useful?

    Bloomberg might well have been duped by the US government, US government's (like probably all national governments) has a long history* of dubbing their press, but an outfit like Bloomberg should have caught it.

    * And in the case of the USA, a long officially admitted history. Other countries, especially those on the "other side" don't usually admit things 30 years later.

    1. Anonymous Coward
      Anonymous Coward

      Re: Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...

      >That a piece of silicon glued to the surface of a circuit board and not connected to conductors could do anything useful?

      Got a source for that premise?

      1. DropBear

        Re: Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...

        This is devolving into "I swear the story I read said those motherboards come with embedded Youkai who steal your soul when you power it up". It's thoroughly amazing how initially objective information completely turns into whatever agrees best with what was already in the reader's head upon consumption and how fiercely most people insist that absolutely no such thing is happening...

      2. StargateSg7

        Re: Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...

        You don't even have to modify the CPU or GPU chip itself!

        I could put an entire chip in the ceramic or metal cap that COVERS any given CPU/GPU which can be powered parasitically via induction, direct connect to leads, etc. This chip-under-the-cap can even include a Fractal Antennae design or a very narrow band antennae to send data over low-bandwidth but long-range/penetrating wavelengths. The emitted signals would likely be seen as extraneous noise but modern DSP (Digital Signal Processing) could recover actual compressed/encrypted data over long periods of time. Even a Faraday cage won't necessarily help because any TEMPEST (look it up!) signals screening would be specific to certain wavelengths usually in the 1.5 to 6 GHz bands that cell phones and wifi use. Goto Terahertz or lower than 1.5 GHz or even acoustic communications bands and then even the typical mesh-screen or punched metal Faraday cage will be compromised. Only a FULLY ENCASED SOLID SHEET Tungsten, Copper And Polymer Faraday Cage will block those signals!

        In some cases the signal may need to travel only a few inches/cm or a few feet/metres since the destination storage medium may be embedded into clothing, jackets, buttons, shoes, or disguised as common personal gear, etc. A person who works in a sensitive location MAY NOT even be aware they are the external data transmission medium since THEIR personal clothing/goods may be intercepted and modified by external spy agencies. Once the targeted employee walks out at the end of the day, an external system can intercept and download the latest data using non-physical extraction (i.e. wireless comms)

        The typical front door security/user entry system and even a physical body search would NOT detect these PASSIVE data storage devices which can be as thin as a postage stamp or as small as a pencil head! (or they might actually BE embedded into pens/pencils/erasers/sheets of blank paper!) Even teh X-ray system wouldn't detect the passive device since the typical security guard would NOT know what they are looking at on-screen and just "Let It Go Through!"

      3. StargateSg7

        Re: Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...

        AND FOR THE KICKER.....Modern Spyworks have gotten sooooo SOPHISTICATED that I can embed a whole signals intercept, storage and communications chip within those fake shiny red woman's fingernails that many women get for cosmetic looks!

        Modern chips can be parasitically powered from local EMF, from the human body itself and they can be made so small I can put one on or under a woman's (or man's) finger nails or toenails and cover it up with nail polish. No one will be the wiser and almost NO security guard will have the ability or skill to find such hidden devices. I could compromise the local nail esthetician to implant or paint-on the device off-site at the local nail parlour which the targeted wearer would be UNAWARE OF !!!

        THIS SHOWS YOU JUST HOW FAR the USA, RUSSIA, CHINA, UK, ISRAEL, FRANCE, GERMANY, etc DO GO in their daily spyworks activities!

        1. Charles 9

          Re: Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...

          "AND FOR THE KICKER.....Modern Spyworks have gotten sooooo SOPHISTICATED that I can embed a whole signals intercept, storage and communications chip within those fake shiny red woman's fingernails that many women get for cosmetic looks!"

          PROVE IT. Where's the example?

  7. Anonymous Coward
    Anonymous Coward

    Denials

    So far AT&T, Verizon, Sprint and TMobile have denied being the "major telecommunications company" in question. Who does that leave, Centurylink?

    1. Munchausen's proxy
      Pint

      Re: Denials

      "So far AT&T, Verizon, Sprint and TMobile have denied being the "major telecommunications company" in question. Who does that leave, Centurylink?"

      Comcast. But it couldn't be them -- if it were they would have charged the customers for it.

    2. JohnFen

      Re: Denials

      "Who does that leave, Centurylink?"

      I think it leaves AT&T, Verizon, Sprint and TMobile. Absent actual information, there's no reason to believe that those companies are being honest in their denials.

      1. Anonymous Coward
        Anonymous Coward

        Re: Denials

        "Absent actual information, there's no reason to believe that those companies are being honest in their denials."

        Sure there is. fiduciary duty, as last I checked, they're all publicly traded, and lying in public can affect their values, meaning the SEC can step in. That's also a reason why we have to assume Bloomberg did at least some homework, or they'll have to answer to higher authorities due to their journalistic obligations.

        1. JohnFen

          Re: Denials

          "Sure there is. fiduciary duty, as last I checked, they're all publicly traded, and lying in public can affect their values, meaning the SEC can step in"

          That doesn't mean that they can be believed in the absence of evidence. History shows us that "fiduciary duty" isn't enough to prevent lying, particularly if the fines that the SEC might saddle them with (if they get caught) are less than the losses they may incur if they tell the truth.

  8. Anonymous Coward
    Anonymous Coward

    NSM is on record

    Perhaps the journalists could contact NSM who is on record of having stated they knew Supermicro was compromised?

    Site: https://nsm.stat.no/english/

  9. gerritv

    It could just as easily have been a grain of rice from someone's lunch that glued itself to a board.

    Remember when quite a few senior govt types in the US were concerned that the different colour centre in Canadian 2 dollar coins were microphones being used to spy on their secret meetings? http://rabble.ca/babble/national-news/your-pocket-change-spying-you

  10. Anonymous Coward
    Anonymous Coward

    China, Russia, Iran and North Korea are bad. It's not that hard to figure out. I should also add that the dual pentium boards from Supermicro (P3TDEi) were such a sack of shit I sometimes wish China had hacked them. Then at least I would have had an excuse for the failure rate.

  11. tip pc Silver badge

    Tom Clancy covered this in Threat Vector

    https://en.m.wikipedia.org/wiki/Threat_Vector

    It’s a while since I read it but the book describes how careful some buyers are in procuring kit, shipping to false addresses in the hope that kit won’t be adulterated etc.

    I do agree there are easier ways of infiltrating systems by doctoring firmware instead of commissioning chips to be embeddd in a place that can be xrayed.

    If it’s possible to determine the presence of the doctored systems by network traffic analysis then Bloomberg should tell us what to look for so we can check our systems and see if we have any.

    I suspect it’s yet another case of check/blame the network as so few people understand how networks work. Put another better next gen firewall in perhaps? That’ll stop those Chinese hackers!!! <—- Sarcasm as without knowing what to look for we don’t know what to block.

  12. Christoph

    Of course there's hidden spyware in electronics

    It's well known that some electronic kit has hidden spyware included. As Snowden revealed, it is put there by the NSA.

  13. Nate Amsden

    I believe bloomberg myself

    Though I am obviously biased I suppose as I have had a small fear about this exact kind of thing since Lenovo bought IBM's Thinkpad line.

    Fortunately I don't have anything of value that the Chinese would want. After being a die hard Thinkpad fan for many years when Lenovo bought them I swore off of them for 11 years - I used Toshiba in between. I am on Thinkpad again after I guess I accepted whatever could happen to Lenovo Thinkpad is just as likely to happen to Toshiba (that and Toshiba didn't have the hardware I was looking for at the time).

    I've read conflicting comments on whether or not this kind of thing is possible, and to me based on history of other sorts of surveillance activities from other countries I absolutely have to be on the side of the fact that is probable this happened given the resources of a country like China. I'm just as likely to believe something similar could happen in the U.S. as well with NSA/CIA whomever. I also totally believe that the intelligence community is pissed off at the report for revealing that they knew what China was doing. They'd rather keep that secret so they can continue monitoring and quietly contain it.

    I'm just hoping some day to see another Snowden-style leak of internal documents that say yes this did in fact happen, and those paranoid folks were right all along. Sort of reminds me of the early days of the reveals about the taps that the NSA had at AT&T facilities. As a AT&T data center customer at the time I joked with their staff about it, but really didn't surprise me, I continued as their customer until I moved to another job.

    Some folks say why didn't more places encounter this well the answer seems obvious they targeted the attacks to lessen the likelihood of it being detected, like any good APT.

    Certainly sucks for Supermicro right now though I'd suspect the vast vast majority(99.99%) of their customers have nothing to worry about(as they are not juicy targets). I run (1) supermicro server myself in a colocation in the bay area. I was thinking about getting a new one as that one is 7 years old. This report does nothing to sway my opinion either way.

    However I wouldn't be caught dead running supermicro in mission critical production (again, this report has absolutely nothing to do with that either, just based off of ~18 years off and on of using their hardware). I do realize of course some 3rd party appliances I have may very well have supermicro hardware on the inside, but at least those are managed by the vendor as in I don't have to worry about diagnosing strange hardware faults or asking fortune tellers what changes are in the latest firmware, and don't have to worry about resetting all configurations to defaults when flashing said firmware(and the obvious negative implications from doing so from a remote location -- my critical servers are 2,400 miles away from my home)

    To me at the end of the day this is hopefully a good thing in that it would raise awareness. I think it's totally possible for similar things to happen to other manufacturers as well even the big guys like HP and Dell. The trend of racing towards the bottom on pricing really puts pressure on the abilities for companies to be willing to be extra vigilant.

  14. FuzzyTheBear
    Black Helicopters

    After all .. NSA ?

    Say that the board really has a chip and that the board is going to the USA in places the American services don't have access to ( Apple for example ) what better way to hide their doings than by having fingers pointing the Chinese as the evil country's wrongdoings ?

    Really .. Denials by any US government agency or anyone else involved for that matter seems rather suspect that the true perpetrator is the US secret services and agencies.

    Yeah .. i don't trust the US. For good reasons. And neither should anyone with a critical mind go pointing fingers to China when we know darn well the US can't be trusted just as the Chinese can't.

    1. Anonymous Coward
      Black Helicopters

      Re: After all .. NSA ?

      ... If there is indeed a device in there, but it's the NSA that's responsible.

      That's the obvious reason why US and UK governments would be keen to deny there's anything to see. Let's talk about something else.

      But is that reason just too obvious? Oh dear, conspiracy theory eats its own tail[1]. So it's a decoy for [???].

      Whatever the underlying motivation, Why Bloomberg? Left-field for something like this, but a source that lends credence to an otherwise-implausible story. An insight into that might offer a clue as to who. Is Bloomberg one of the media organisations Trump brands Fake News? That might put it off his radar as a vehicle for a story, but that of course doesn't apply to many others in the US and around the world.

      Chinese conspiracy: plant a decoy story? That needn't be a decoy for anything they're doing, it could just be aimed at countering baseless allegations. Or it could be designed to be outed as a Chinese decoy conspiracy. Oh dear, another self-consuming conspiracy[1]. Dammit, it's nearly 3 a.m. and I really shouldn't be reading stories like this.

      [1] Not that I'm saying it is a conspiracy theory: I keep an open mind on such things.

      1. DropBear

        Re: After all .. NSA ?

        There's also the possibility that nobody actually did any of this yet, but someone form either side is intending to, knowing full well that the next time this becomes news absolutely nobody would believe it even if there were photos of the stuff this time - in fact it would probably never get published at all for that exact reason. A creative bit of prior restraint perhaps...?

  15. This post has been deleted by its author

  16. Unbelievable!
    Boffin

    Sooo.. to 'PARSE' this story to real terms..

    ..is that the news outlets are untrustworthy.

    We knew this. We go fact checking, against...uh...other news media. no wait.!!!

    It amounts to 'Yes you may have your freedom to report truths, however, by that very rule, we cannot control the sea of contradictory reports which will whitewash and drown your less popular and more damaging report, so that it will be only known by few.'

  17. Big Al 23

    It seems to me that...

    ...if these compromised machines are so prevalent then Bloomberg's sources should be able to at least display one of them or show a photo taken at the time of discovery to substantiate the claims of added chips. There should also be some data logs to show unauthorized outbound data traffic.

    1. Unbelievable!

      Re: It seems to me that...

      i agree. the onus is upon the accuser.

      I'm not questioning them (accuser). we all know that there's a lot of high level secrecy in any business. And if they can consolidate ... well... how would we know.

      Todays news, tomorrows "chip wrapper" (you can have that tag line The Register. ;) )

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like