Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China’s Insane Super Hack Infiltrated Apple, Amazon
China Uncensored ^ | 10-8-2018 | China Uncensored

Posted on 10/11/2018 10:31:31 AM PDT by fishtank

China engineers an ingenious hack of two of America's biggest tech companies.


TOPICS: Culture/Society; News/Current Events
KEYWORDS: apple; hack
Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 next last
To: mdmathis6

I know from another source in MS that their entire cybersecurity team is working to figure out what to do in the meantime.

They already have been through this with the CPU manufacturers, and now they are dealing with this on the router/cloud server front.

Azure is a core product, and they’ve known about this since 2014, so they’ve taken steps.

Google JUST DROPPED out of the running for government secure cloud services TODAY. Why would they? There are less than 4 scale competitors for that business, and they drop?


21 posted on 10/11/2018 1:18:07 PM PDT by RinaseaofDs
[ Post Reply | Private Reply | To 18 | View Replies]

To: RinaseaofDs

The DoD would have wrung Google’s software and tech thru the wringer in terms of verifying that they could be secure in their services and thus Google has dropped out, having too many secrets they want to keep. I think they are about to have their wings clipped and many in the markets know this.


22 posted on 10/11/2018 1:26:51 PM PDT by mdmathis6
[ Post Reply | Private Reply | To 21 | View Replies]

To: mdmathis6

Agree completely. Zuckerberg has been SILENT the last few weeks.

Here’s another thing. I work proximately to the auto industry. Their big push is in ADAS - Automated Driver Assistance Systems.

Most of the control and comms boards for these systems are manufacutured in CHINA.

Fortunately, we are in the early days of this tech. ADAS is ALL 4G/5G, Wifi, NFC, and bluetooth. Every one of these cars have booth audio and video feeds into the cabins of all these cars made after a certain year.

How much of that may be going to China? Nobody is talking about that yet, but if A = B and B = C, then you gotta do your homework on D.


23 posted on 10/11/2018 1:33:40 PM PDT by RinaseaofDs
[ Post Reply | Private Reply | To 22 | View Replies]

To: piytar

Thanks for the kind words. As you know, decent quality ethernet board connectors often come with emi/rfi filter chips, tiny bitty things either pre-installed on the connector daughter board, or inserted under it prior to its insertion. Apparantly china found a way to put in tiny microprocessors in there instead. Ruh-roh!

They could be programmed to wait awhile, sniff, report back...almost anything. Since they would be at the hardware layers (layers 1 and 2) of the 7 layer OSI model of ethernet, it would be extremely difficult to detect.

Physical inspection could get them, perhaps, but if they’re carefully disguised, good luck. Maybe a tiny height difference.

But done right, software wouldn’t detect them. Not even at the binary level, including firmware or anything.

Basically, it’s a built in, preprogrammed, “at will” sniffer. It could even add or change incoming packets. Or monitor every ISP the board connects to, save and rebroadcast in timed chunks to another ISP...etc.

It’s a computer in between. Perfect “man in the middle.”

And from what I’ve read, the CIA and NSA have things like that already.


24 posted on 10/11/2018 1:58:23 PM PDT by Basket_of_Deplorables (Q: Believing Is Seeing!)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Basket_of_Deplorables

Debunked. That guy in the video is a parrot of fake news, not a knowledgeable techie. The chip that is always shown in these fake news articles is a coupler. Not a super-duper do-everything spy chip. I’m surprised you are so easily fooled. Also, no infiltration of Apple. Apple cancels any build-order that doesn’t meet their standards and testing, and Apple did indeed cancel an order of server motherboards after testing a sample, before any were deployed.


25 posted on 10/11/2018 2:59:20 PM PDT by roadcat
[ Post Reply | Private Reply | To 17 | View Replies]

To: fishtank

Debunked. That guy in the video is a parrot of fake news, not a knowledgeable techie. The chip that is always shown in these fake news articles is a coupler. Not a super-duper do-everything spy chip. I’m surprised you are so easily fooled. Also, no infiltration of Apple. Apple cancels any build-order that doesn’t meet their standards and testing, and Apple did indeed cancel an order of server motherboards after testing a sample, before any were deployed.


26 posted on 10/11/2018 3:00:11 PM PDT by roadcat
[ Post Reply | Private Reply | To 20 | View Replies]

To: jimtorr
Widely debunked by Apple, Amazon, NSA and many others.

Is any of these three actors incapable of lying, especially if given the okay by the government?

I'm not saying the original expose is 100% accurate, I am only saying that a better rebuttal would have to come from disinterested parties, if possible.
27 posted on 10/11/2018 3:19:46 PM PDT by Dr. Sivana (There is no salvation in politics.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: roadcat

You don’t like the guy in the vid. OK, got that. They didn’t show the actual chip. OK, got that, too.

Now tell me why it is not possible.


28 posted on 10/11/2018 3:35:22 PM PDT by Basket_of_Deplorables (Q: Believing Is Seeing!)
[ Post Reply | Private Reply | To 25 | View Replies]

To: roadcat

I’ve actually read this from several fairly good sources.

And this rings true:

“Three security experts who have analyzed foreign hardware implants for the U.S. Department of Defense confirmed that the way Sepio’s software detected the implant is sound. One of the few ways to identify suspicious hardware is by looking at the lowest levels of network traffic. Those include not only normal network transmissions, but also analog signals — such as power consumption — that can indicate the presence of a covert piece of hardware.

In the case of the telecommunications company, Sepio’s technology detected that the tampered Supermicro server actually appeared on the network as two devices in one. The legitimate server was communicating one way, and the implant another, but all the traffic appeared to be coming from the same trusted server, which allowed it to pass through security filters.

Appleboum said one key sign of the implant is that the manipulated Ethernet connector has metal sides instead of the usual plastic ones. The metal is necessary to diffuse heat from the chip hidden inside, which acts like a mini computer. “The module looks really innocent, high quality and ‘original’ but it was added as part of a supply chain attack,” he said.”


29 posted on 10/11/2018 3:41:03 PM PDT by Lazamataz (On future maps, I suggest we remove the word "California" and substitute "Open-Air Asylum".)
[ Post Reply | Private Reply | To 26 | View Replies]

To: Basket_of_Deplorables
Now tell me why it is not possible.

No, you tell me why it is true in regards to Apple and Amazon, which is the core statement in the article. Where is your proof? (None, whatsoever.)

30 posted on 10/11/2018 3:59:39 PM PDT by roadcat
[ Post Reply | Private Reply | To 28 | View Replies]

To: Lazamataz
I've got a lot of respect for you Laz, especially for hitting any port regardless of whether there is a storm or not.

But my core beef about this article is that even if chip implants can be done, it has been debunked in regards to Apple and to a lesser extent with Amazon. If a chip implant has infiltrated Apple, where is the proof? All graphics are misleading, some articles show minor electronics components such as off-the-shelf couplers, or CGI diagrams - no actual pictures.

31 posted on 10/11/2018 4:06:06 PM PDT by roadcat
[ Post Reply | Private Reply | To 29 | View Replies]

To: roadcat
The concept is sound; pictures are likely if this is genuine.

And with the Chinese, I'd be shocked if they DIDN'T try.

Sure, maybe Apple and Amazon are fine, but maybe not. More will be revealed.

32 posted on 10/11/2018 4:48:10 PM PDT by Lazamataz (On future maps, I suggest we remove the word "California" and substitute "Open-Air Asylum".)
[ Post Reply | Private Reply | To 31 | View Replies]

To: roadcat

“No, you tell me why it is true in regards to Apple and Amazon, which is the core statement in the article. Where is your proof? (None, whatsoever.) “

No, you are the one saying it’s “debunked,” and telling other freepers to stop posting about it.

I’m the one, an actual Electrical Engineer, who said it’s not debunked to me, and that it sure as heck is possible.

So, Mr. expert, tell me why it’s debunked. Other than you don’t like someone, or that Apple denies. That’s less proof, or reasonable explanation, than Ford provided in her accusations about Kavenaugh. She had feelings so strong, people were supposed to take her story as fact.

So we’re all waiting on your knowledgeable technical explanation about why it is debunked. When people say something is “debunked,” without a reasonable alternate explanation, it’s called “blowing smoke.”

Are you stating a feeling so strong that we should just take it as fact?


33 posted on 10/11/2018 5:23:51 PM PDT by Basket_of_Deplorables (Q: Believing Is Seeing!)
[ Post Reply | Private Reply | To 30 | View Replies]

To: Basket_of_Deplorables

You are Ford, I am Kavanaugh, in regards to these false claims in this thread. The title says China infiltrated Apple & Amazon, without any proof. Yet you call it credible, simply because you are an “actual” Electrical Engineer. Just like Ford, who is Dr. Ford so she is deemed credible, without a evidence trail. Guilty until proven Guilty, is your motto. Without any evidence. So Apple and Amazon are left accused of being hacked, without a shred of proof because people hear from idiots on the Internet so it must be so. You show me proof, not the other way around. Sheesh, think.


34 posted on 10/11/2018 7:41:18 PM PDT by roadcat
[ Post Reply | Private Reply | To 33 | View Replies]

To: roadcat

LOL!
Don’t believe *anything^ public about this. Not the claims nor the denials.
Those who know don’t tell.


35 posted on 10/11/2018 7:53:08 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 34 | View Replies]

To: RinaseaofDs

*cloud caliber

-snicker-


36 posted on 10/11/2018 7:55:39 PM PDT by afterhoursarmory
[ Post Reply | Private Reply | To 13 | View Replies]

To: RinaseaofDs

Google dropped out over lefty politics internally.
Just like they refuse to work with DoD on AI projects; because of the leftists that infest that company. Get a grip


37 posted on 10/11/2018 7:58:21 PM PDT by afterhoursarmory
[ Post Reply | Private Reply | To 21 | View Replies]

To: mrsmith
Don’t believe *anything^ public about this. Not the claims nor the denials.

Best answer yet. Take everything with more than a grain of salt, as far as what is published nowadays. Aldous Huxley's Brave New World is upon us. Here is what one writeup on Huxley stated :

"He is seeking to warn us against scientific utopianism. He succeeds all too well. Although we tend to see other people, not least the notional brave new worlders, as the hapless victims of propaganda and disinformation, we may find it is we ourselves who have been the manipulated dupes."

38 posted on 10/11/2018 8:31:42 PM PDT by roadcat
[ Post Reply | Private Reply | To 35 | View Replies]

To: roadcat

He is right and you are just farting in the wind, maybe you are an employee of these 2 “fine” organizations and know better or are just cognitively dissonant to what is going on. Yes, indeed, the Endeavor servers are compromised and anyone who uses them are as well.
Maybe you missed the headlines in trade papers and even MSM about the Google hack that they said was “only” 50 Million users but word around town is that it is closer to 100 Million. Do you even understand what Google and apple are playing with, what their design considerations are and how their database is constructed? And it is not just these devices that are compromised, so are major other elements of their architecture that is born out by them being hacked and Apple and Google ties to China including the Search Engine specifically designed for the Chinese market project. Google just walked away from a $10 billion dollar deal with the Gov, I feel it is because they would fail a security audit.

All of this will become clear soon and in my opinion BoD is correct. I have worked directly with deep level hardware and software engineers and have my own views of what is going on and my info does not come from newsprint or media reports, but from people who deal with this stuff daily. Google is going down as is Facebook (also hacked) and Twitter and even with all the money they have spent they are infiltrated.

So Einstein, with all that they have spent and built how do YOU think these events happened?

Inquiring minds want to know, and please share your point of view and profession to validate your position and insights.

Looking forward to it

Also look up Swordmaker here on FR, he shares the same views as posited by BoD

Batter up!


39 posted on 10/11/2018 10:16:44 PM PDT by 100American (Knowledge is knowing how, Wisdom is knowing when)
[ Post Reply | Private Reply | To 34 | View Replies]

To: 100American

Thanks for your input. Actual techies—people who have designed and built boards with ethernet connectors, know it’s not just possible, but probable. I’m in partial admiration of the brilliance and audacity involved. Partial. China IS our main enemy. People need to keep in mind that their average IQ’s are higher than ours, and they are quiet, latient, and have unlimited resources for these endeavors.

Nobody’s going to come out and say, yup, we got hardware hacked. But boards worldwide are being pulled. And routers examined. And phones. USB daughter boards, anyone?

Power consumption is a giveaway. But the implants will likely be in low power mode until transmit burts activated. And some will be very quiet until poisoning incoming packet time. Maybe implant trojan, then go back to quiescent. Or even self destructing its firmware after job is done. Bricking itself after mission accomplished.

Massive deep scans are running. New virus scans being written. Boards being pulled and shipped. Service disruotions will be giveaway. No choice, gotta shut em down


40 posted on 10/12/2018 3:53:53 AM PDT by Basket_of_Deplorables (Q: Believing Is Seeing!)
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson