D
Deleted member 13312
Guest
Now you are just attempting to move to goalposts of this argument, by adding more and more points to the original argument until it is derail.How does it go about attach itself to the motherboard?
How the spy chip knows about each wire or signal trace of motherboard is for?
After pointing out this obvious attempt at a fallacy of yours there is 2 possible explanation to what you raise, even though they are clearly out context.
1) In a HYPOTHETICAL (note that I am quoting it in capital letters to make it clear to you that I am not asuating what bloomberg says to be true). The chip could be inserted into the motherboard by a subcontractor in the system. In many cases as a cost saving measure, governments often sublease projects to civilian contractors who in turn not always prescribe to the exacting levels of scrutiny or security.
2) In the modern area, programming software are often similar if not downright copied from one hardware to another. In this instance, a chip dealing in terms of software programs and not wires and signal traces as you claimed can identify software that are used to control communications and in turn utilize them. Heck we got civilian hacking software capable of remotely accessing a computer drive to download it's data. And that is without a chip, just a malicious software.
But while hardware hack is a very advantageous tactic for China to employ seeing as it is the foremost assembler of electronics. It has one major Achilles heel, it leaves a trace. So the agency behind this supposed hack must be either very confident or very naive.
A safer way would be to intercept the package during transit to implant the malware to ensure plausible denial, but that can be done by any third party with the right resources.
Last edited by a moderator: