Hi, 

I've heard those denials too, but experience tells us there's no smoke
without fire... not that I use supermicro anyway so my data only goers
to NSA, not the MSS :) 

cheers 

On 05/10/2018 10:20, Florian Valette wrote:

> HI, 
> 
> It seems to be a Fake News...? 
> 
> Supermicro refutes : 
> 
> https://www.supermicro.com/newsroom/pressreleases/2018/press181004_Bloomberg.cfm
>  [1] 
> 
> Apple denied too : 
> 
> _"Over the course of the past year, Bloomberg has contacted us multiple times 
> with claims, sometimes vague and sometimes elaborate, of an alleged security 
> incident at Apple. Each time, we have conducted rigorous internal 
> investigations based on their inquiries and each time we have found 
> absolutely no evidence to support any of them. We have repeatedly and 
> consistently offered factual responses, on the record, refuting virtually 
> every aspect of Bloomberg's story relating to Apple._ 
> 
> _On this we can be very clear: Apple has never found malicious chips, 
> "hardware manipulations" or vulnerabilities purposely planted in any server. 
> Apple never had any contact with the FBI or any other agency about such an 
> incident. We are not aware of any investigation by the FBI, nor are our 
> contacts in law enforcement._ 
> 
> _In response to Bloomberg's latest version of the narrative, we present the 
> following facts: Siri and Topsy never shared servers; Siri has never been 
> deployed on servers sold to us by Super Micro; and Topsy data was limited to 
> approximately 2,000 Super Micro servers, not 7,000. None of those servers has 
> ever been found to hold malicious chips._ 
> 
> _As a matter of practice, before servers are put into production at Apple 
> they are inspected for security vulnerabilities and we update all firmware 
> and software with the latest protections. We did not uncover any unusual 
> vulnerabilities in the servers we purchased from Super Micro when we updated 
> the firmware and software according to our standard procedures._ 
> 
> _We are deeply disappointed that in their dealings with us, Bloomberg's 
> reporters have not been open to the possibility that they or their sources 
> might be wrong or misinformed. Our best guess is that they are confusing 
> their story with a previously-reported 2016 incident in which we discovered 
> an infected driver on a single Super Micro server in one of our labs. That 
> one-time event was determined to be accidental and not a targeted attack 
> against Apple._ 
> 
> _While there has been no claim that customer data was involved, we take these 
> allegations seriously and we want users to know that we do everything 
> possible to safeguard the personal information they entrust to us. We also 
> want them to know that what Bloomberg is reporting about Apple is 
> inaccurate._ 
> 
> _Apple has always believed in being transparent about the ways we handle and 
> protect data. If there were ever such an event as Bloomberg News has claimed, 
> we would be forthcoming about it and we would work closely with law 
> enforcement. Apple engineers conduct regular and rigorous security screenings 
> to ensure that our systems are safe. We know that security is an endless race 
> and that's why we constantly fortify our systems against increasingly 
> sophisticated hackers and cybercriminals who want to steal our data. ยป_ 
> 
> AWS is saying this in untrue : 
> 
> https://urldefense.proofpoint.com/v2/url?u=https-3A__aws.amazon.com_blogs_security_setting-2Dthe-2Drecord-2Dstraight-2Don-2Dbloomberg-2Dbusinessweeks-2Derroneous-2Darticle_&d=DwIFAg&c=4DxX-JX0i28X6V65hK0ftwVK1xnmwcYC0vo7GVya1JY&r=NGLqjlg8Gqjal0G8jzVjweKfIgMnEHJdMIgB0mMqqt8&m=4umDOyc_2f8DSiCtG_AvPlliL0yuDZKcJDPX23xkdcI&s=IVl33wh7j2kT9A8phJg8TmcO8aG-siRF8sV9TAnT4nk&e
>  [2] 
> 
> Regards, 
> 
> ---------------------------------------------- 
> 
> Florian Valette 
> 
> _Innovation is freedom_ 
> 
> Email: florian.vale...@corp.ovh.com 
> 
> ---------------------------------------------- 
> 
> OVH Network "Chacha" Team
> AS 16276 http://peering.ovh.net/ [3] 
> 
> FROM: AusNOG <ausnog-boun...@lists.ausnog.net> on behalf of Noel Butler 
> <noel.but...@ausics.net>
> DATE: Friday, 5 October 2018 at 10:00 am
> TO: Ausnog <ausnog@lists.ausnog.net>
> SUBJECT: [AusNOG] supermicro stocks dive 
> 
> given when this broke a couple days ago 
> 
> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
>  
> 
> overnight nasdaq supermicro stocks  down 41%
> 
> seems cant trust much coming out of China these days. though, you cant trust 
> anything coming out of the USA either. 
> 
> -- 
> 
> Kind Regards, 
> 
> Noel Butler 
> 
> This Email, including any attachments, may contain legally privileged 
> information, therefore remains confidential and subject to copyright 
> protected under international law. You may not disseminate, discuss, or 
> reveal, any part, to anyone, without the authors express written authority to 
> do so. If you are not the intended recipient, please notify the sender then 
> delete all copies of this message including attachments, immediately. 
> Confidentiality, copyright, and legal privilege are not waived or lost by 
> reason of the mistaken delivery of this message. Only PDF [4] and ODF [5] 
> documents accepted, please do not send proprietary formatted documents

-- 
Kind Regards, 

Noel Butler 

                This Email, including any attachments, may contain legally 
privileged
information, therefore remains confidential and subject to copyright
protected under international law. You may not disseminate, discuss, or
reveal, any part, to anyone, without the authors express written
authority to do so. If you are not the intended recipient, please notify
the sender then delete all copies of this message including attachments,
immediately. Confidentiality, copyright, and legal privilege are not
waived or lost by reason of the mistaken delivery of this message. Only
PDF [4] and ODF [5] documents accepted, please do not send proprietary
formatted documents 

 

Links:
------
[1]
https://www.supermicro.com/newsroom/pressreleases/2018/press181004_Bloomberg.cfm
[2]
https://urldefense.proofpoint.com/v2/url?u=https-3A__aws.amazon.com_blogs_security_setting-2Dthe-2Drecord-2Dstraight-2Don-2Dbloomberg-2Dbusinessweeks-2Derroneous-2Darticle_&amp;d=DwIFAg&amp;c=4DxX-JX0i28X6V65hK0ftwVK1xnmwcYC0vo7GVya1JY&amp;r=NGLqjlg8Gqjal0G8jzVjweKfIgMnEHJdMIgB0mMqqt8&amp;m=4umDOyc_2f8DSiCtG_AvPlliL0yuDZKcJDPX23xkdcI&amp;s=IVl33wh7j2kT9A8phJg8TmcO8aG-siRF8sV9TAnT4nk&amp;e
[3] http://peering.ovh.net/
[4] http://www.adobe.com/
[5] http://en.wikipedia.org/wiki/OpenDocument
_______________________________________________
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog

Reply via email to