Workflow
被“玉渊谭天”点名,英伟达再回应H20芯片后门

Core Viewpoint - The article discusses concerns regarding potential backdoors in NVIDIA's H20 chip, emphasizing the importance of cybersecurity and the company's repeated denials of such vulnerabilities [1][5]. Group 1: Company Response - NVIDIA has responded to allegations of backdoors in the H20 chip, asserting that cybersecurity is crucial and that the chip does not contain any backdoors that would allow remote access or control [1]. - Since the National Internet Information Office's inquiry into the H20 chip's security risks on July 31, 2025, NVIDIA has issued three similar statements, reinforcing its commitment to cybersecurity [1]. Group 2: Legislative Context - U.S. Congressman Bill Foster has proposed legislation requiring American chip companies to include backdoors in export-controlled chips, suggesting that cooperation with the government could lead to exemptions from export controls for "low-risk customers" in China [1]. - Foster's proposal aims to implement functionalities such as "tracking and locating" and "remote shutdown," which he believes are technically feasible [2]. Group 3: Technical Aspects of Backdoors - Backdoors can be categorized into hardware and software types, with hardware backdoors being physical devices integrated during the design or manufacturing process, while software backdoors involve malicious instructions embedded in software [2]. - The H20 chip could theoretically implement a "remote shutdown" feature through its power management module or by modifying its firmware boot program, which could restrict functionality based on specific conditions [3]. Group 4: Security Implications - If a backdoor were present, it could allow for targeted functionalities, such as remote shutdown, without collateral damage, particularly since the H20 chip is primarily supplied to China [3]. - The integration of software backdoors could be facilitated through updates to the CUDA ecosystem, potentially allowing for the activation of backdoor functionalities during software installation [3][4]. - The combination of hardware and software backdoors could lead to significant information security risks, including data leakage and unauthorized access to sensitive information [4].