From Wikipedia, the free encyclopedia

Suggestions of new sections

New sections for the article: (Motivations), (Types of hardware backdoors), (Target devices of hardware backdoors), (Detection methods), (Prevention methods). Faltur ( talk) 12:15, 28 January 2017 (UTC) reply

Bad Examples

I've noticed two examples in the Examples section that should not appear on this page:

1. 2012: Chinese device manufacturer found to carry a backdoor

This is not a hardware backdoor; rather it is a software backdoor that was baked into software that was installed on a limited set of hardware.

2. October 2018: Bloomberg reported an Attack by Chinese spies that infiltrated 30 US companies

This has been proven to be false and should be removed. [1]

Madogstony101 ( talk) 03:17, 22 February 2019 (UTC) reply

References

  1. ^ Wemple, Erik. "Your move, Bloomberg". The Washington Post. Washington Post. Retrieved 22 February 2019.
From Wikipedia, the free encyclopedia

Suggestions of new sections

New sections for the article: (Motivations), (Types of hardware backdoors), (Target devices of hardware backdoors), (Detection methods), (Prevention methods). Faltur ( talk) 12:15, 28 January 2017 (UTC) reply

Bad Examples

I've noticed two examples in the Examples section that should not appear on this page:

1. 2012: Chinese device manufacturer found to carry a backdoor

This is not a hardware backdoor; rather it is a software backdoor that was baked into software that was installed on a limited set of hardware.

2. October 2018: Bloomberg reported an Attack by Chinese spies that infiltrated 30 US companies

This has been proven to be false and should be removed. [1]

Madogstony101 ( talk) 03:17, 22 February 2019 (UTC) reply

References

  1. ^ Wemple, Erik. "Your move, Bloomberg". The Washington Post. Washington Post. Retrieved 22 February 2019.

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook