Skip to content

Commit

Permalink
Fix case study header
Browse files Browse the repository at this point in the history
  • Loading branch information
profvjreddi committed Jun 14, 2024
1 parent 2bcccd3 commit d826799
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion contents/privacy_security/privacy_security.qmd
Original file line number Diff line number Diff line change
Expand Up @@ -441,7 +441,7 @@ Strategies like supply chain audits, screening suppliers, validating component p

Rigorous validation of hardware sources coupled with fault-tolerant system architectures offers the most robust defense against the pervasive risks of convoluted, opaque global supply chains.

#### Case Study
### Case Study

In 2018, Bloomberg Businessweek published an alarming [story](https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies) that got much attention in the tech world. The article claimed that Supermicro had secretly planted tiny spy chips on server hardware. Reporters said Chinese state hackers working with Supermicro could sneak these tiny chips onto motherboards during manufacturing. The tiny chips allegedly gave the hackers backdoor access to servers used by over 30 major companies, including Apple and Amazon.

Expand Down

0 comments on commit d826799

Please sign in to comment.