Talk:Hardware backdoor
Appearance
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Suggestions of new sections
[edit]New sections for the article: (Motivations), (Types of hardware backdoors), (Target devices of hardware backdoors), (Detection methods), (Prevention methods). Faltur (talk) 12:15, 28 January 2017 (UTC)
Bad Examples
[edit]I've noticed two examples in the Examples section that should not appear on this page:
1. 2012: Chinese device manufacturer found to carry a backdoor
This is not a hardware backdoor; rather it is a software backdoor that was baked into software that was installed on a limited set of hardware.
2. October 2018: Bloomberg reported an Attack by Chinese spies that infiltrated 30 US companies
This has been proven to be false and should be removed.[1]
Madogstony101 (talk) 03:17, 22 February 2019 (UTC)
References
- ^ Wemple, Erik. "Your move, Bloomberg". The Washington Post. Washington Post. Retrieved 22 February 2019.
Categories:
- C-Class Computer Security articles
- Low-importance Computer Security articles
- C-Class Computer Security articles of Low-importance
- C-Class Computing articles
- Low-importance Computing articles
- All Computing articles
- All Computer Security articles
- C-Class Espionage articles
- Low-importance Espionage articles
- Start-Class military history articles
- Start-Class military science, technology, and theory articles
- Military science, technology, and theory task force articles