From d8267993c1a7fc1e04f86fd1fb9015ddeebd7c4c Mon Sep 17 00:00:00 2001 From: Vijay Janapa Reddi Date: Fri, 14 Jun 2024 19:47:52 -0400 Subject: [PATCH] Fix case study header --- contents/privacy_security/privacy_security.qmd | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contents/privacy_security/privacy_security.qmd b/contents/privacy_security/privacy_security.qmd index adb12f6fd..ea11afe55 100644 --- a/contents/privacy_security/privacy_security.qmd +++ b/contents/privacy_security/privacy_security.qmd @@ -441,7 +441,7 @@ Strategies like supply chain audits, screening suppliers, validating component p Rigorous validation of hardware sources coupled with fault-tolerant system architectures offers the most robust defense against the pervasive risks of convoluted, opaque global supply chains. -#### Case Study +### Case Study In 2018, Bloomberg Businessweek published an alarming [story](https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies) that got much attention in the tech world. The article claimed that Supermicro had secretly planted tiny spy chips on server hardware. Reporters said Chinese state hackers working with Supermicro could sneak these tiny chips onto motherboards during manufacturing. The tiny chips allegedly gave the hackers backdoor access to servers used by over 30 major companies, including Apple and Amazon.