Supermicro confirms that there are no "malicious" chips in Apple and Amazon

Apple China

A few weeks have passed since a report came to light in which a hack on motherboards was put on the table that caused users to be directly affected without realizing it. All of it came to light in an extensive report by the well-known medium Bloomberg And of course, the uproar that arose was spectacular, so much so that even Tim Cook himself stepped out in a later interview denying this alleged hacking outright.

Now after an external investigation it appears that there is no such security flaw and Super Micro Computers, which is known as Supermicro, would be blameless in this possible attack from China. The company is in charge of manufacturing products for Apple and Amazon among other companies and was in the eye of the hurricane.

Workers at Foxconn

An external investigation confirms that there is no evidence of the hack

And it is that obviously the security problem required a deep investigation to verify if it was true or not that there was such malicious hardware in the products leaving China. All this denying what was written by Bloomberg from the beginning, so the parties involved were confirming that this was not true but having no evidence (as now) it seemed that no one believed it.

In any case, the results of the investigation conclude that everything was false and although it is true that the damage is already caused after the publication without evidence, Cook himself already stated that they should retract their words in this well-known medium. In reality, this whole story is not very credible in general, but of course, when it is a media as reputable as Bloomberg that publishes it it is more difficult to say that it is not true ...


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.