Workflow
芯片后门
icon
Search documents
警惕!芯片安装“后门”,招数不少
Huan Qiu Shi Bao· 2025-08-11 22:38
Group 1 - The core issue revolves around the security risks associated with the H20 computing chip from NVIDIA, with concerns about potential backdoors that could be exploited by U.S. government agencies [1][2] - U.S. lawmakers have proposed the "Chip Security Act," which mandates that all high-end AI GPUs and chips must implement location tracking technology within 180 days to prevent them from reaching specific countries, particularly mainland China [2][3] - Experts suggest that while NVIDIA denies the existence of tracking and remote shutdown capabilities in the H20 chip, the chip's design details remain highly confidential, complicating the detection of any potential backdoors [2][3] Group 2 - Hardware backdoors are malicious circuits or codes intentionally embedded in devices, allowing unauthorized access by attackers, and the feasibility of adding such backdoors is high from both hardware and software perspectives [3][4] - Historical examples include the Clipper chip, which was intended to secure communications but was found to have significant flaws, and Intel's Management Engine, which allegedly contained a hidden switch that could disable its functions at the request of U.S. intelligence [4][5] - Software backdoors can be more easily implemented without hardware modifications, with complex GPU drivers providing opportunities for hidden backdoor codes that can track device locations and operational times [5][6] Group 3 - There are concerns that even if U.S. hardware manufacturers do not cooperate, intelligence agencies may independently implant backdoors in products, as evidenced by a case where a U.S. intelligence agency infiltrated a hard drive company to embed problematic code in their firmware [6]
央媒“玉渊谭天”起底H20芯片可能存在的后门,英伟达再回应
Xin Lang Cai Jing· 2025-08-11 15:22
Core Viewpoint - The article discusses concerns regarding potential "backdoors" in NVIDIA's H20 chip, highlighting U.S. government strategies to implement tracking and control features in AI chips, which could affect export regulations to China [1][6][9]. Group 1: U.S. Government's Strategy - Experts indicate that features such as "tracking" and "remote shutdown" can technically be implemented in chips [1]. - The U.S. government has considered a systematic approach to embedding "backdoors" in AI chips, suggesting that companies cooperating with the government could be exempt from export controls [1][6]. - The allowance for NVIDIA to export H20 chips to China raises concerns about the implications of these backdoor strategies [1]. Group 2: Features of the H20 Chip - The potential features designed by the U.S. include: 1. License Locking: Immediate cessation of new license issuance if violations are detected, rendering the chip inoperable [5]. 2. Tracking and Positioning: The chip can interact with multiple landmark servers to determine its approximate location [5]. 3. Usage Monitoring: Built-in hardware can record key information about chip usage, ensuring compliance with U.S. regulations [5]. 4. Usage Restrictions: Governance mechanisms limit the chip's use in sensitive computing environments [5]. Group 3: NVIDIA's Response - NVIDIA has repeatedly stated that network security is crucial and that its chips do not contain "backdoors" [6][9]. - The company has made similar statements three times since being questioned by the National Internet Information Office regarding the H20 chip's security risks [9]. - The National Internet Information Office has requested NVIDIA to provide further proof regarding the absence of backdoors in their chips [9].
被“玉渊谭天”点名,英伟达再回应H20芯片后门
Guan Cha Zhe Wang· 2025-08-11 02:56
Core Viewpoint - The article discusses concerns regarding potential backdoors in NVIDIA's H20 chip, emphasizing the importance of cybersecurity and the company's repeated denials of such vulnerabilities [1][5]. Group 1: Company Response - NVIDIA has responded to allegations of backdoors in the H20 chip, asserting that cybersecurity is crucial and that the chip does not contain any backdoors that would allow remote access or control [1]. - Since the National Internet Information Office's inquiry into the H20 chip's security risks on July 31, 2025, NVIDIA has issued three similar statements, reinforcing its commitment to cybersecurity [1]. Group 2: Legislative Context - U.S. Congressman Bill Foster has proposed legislation requiring American chip companies to include backdoors in export-controlled chips, suggesting that cooperation with the government could lead to exemptions from export controls for "low-risk customers" in China [1]. - Foster's proposal aims to implement functionalities such as "tracking and locating" and "remote shutdown," which he believes are technically feasible [2]. Group 3: Technical Aspects of Backdoors - Backdoors can be categorized into hardware and software types, with hardware backdoors being physical devices integrated during the design or manufacturing process, while software backdoors involve malicious instructions embedded in software [2]. - The H20 chip could theoretically implement a "remote shutdown" feature through its power management module or by modifying its firmware boot program, which could restrict functionality based on specific conditions [3]. Group 4: Security Implications - If a backdoor were present, it could allow for targeted functionalities, such as remote shutdown, without collateral damage, particularly since the H20 chip is primarily supplied to China [3]. - The integration of software backdoors could be facilitated through updates to the CUDA ecosystem, potentially allowing for the activation of backdoor functionalities during software installation [3][4]. - The combination of hardware and software backdoors could lead to significant information security risks, including data leakage and unauthorized access to sensitive information [4].
美国如何给芯片安“后门”
是说芯语· 2025-08-10 07:00
Core Viewpoint - The article discusses the security risks associated with the H20 chip from Nvidia, particularly focusing on the potential for backdoors and the implications of U.S. government policies regarding chip exports to China [3][4][24]. Group 1: Security Risks and Backdoors - The National Internet Information Office of China recently addressed Nvidia regarding security risks related to the H20 chip, suggesting concerns over potential backdoors [3]. - Nvidia's response emphasized that the chip does not contain backdoors, referencing the historical "Clipper chip" incident as a cautionary tale [4][6]. - A recent U.S. legislative proposal led by Congressman Bill Foster aims to mandate U.S. chip companies to incorporate backdoors in export-controlled chips, indicating a shift in policy towards more overt government control [8][10]. Group 2: Technical Aspects of Backdoors - Backdoors can be categorized into hardware and software types, with hardware backdoors being physical circuits left during design or manufacturing, while software backdoors involve implanted instructions in software [11][12]. - The H20 chip's power management module could theoretically implement a remote shutdown feature by embedding a circuit that triggers under specific conditions, such as usage time or environmental factors [14][15]. - The potential for software-based backdoors exists through updates to the CUDA ecosystem, which could allow for tracking and data collection functionalities [16][17]. Group 3: U.S. Government Control Mechanisms - The U.S. government has proposed a "chip governance mechanism" to coordinate chip design and production, ensuring compliance with national security requirements [19][20]. - This mechanism includes features such as license locking, tracking, usage monitoring, and usage restrictions, which could effectively control the deployment of chips like the H20 [20][23]. - Reports indicate that Nvidia's AI chips already possess many of the functionalities required for this governance mechanism, raising concerns about their safety and reliability for foreign markets [21][23]. Group 4: Performance and Environmental Concerns - The H20 chip is deemed not only unsafe but also technologically inferior, with only about 20% of the performance of its standard counterpart, the H100, and a 41% reduction in GPU core count [27]. - Environmental efficiency is also a concern, as the H20's energy efficiency ratio is approximately 0.37 TFLOPS/W, failing to meet the required 0.5 TFLOPS/W for energy-efficient GPUs [28]. - Given its lack of safety, technological advancement, and environmental compliance, the H20 chip is not considered a viable option for consumers [29][30].
玉渊谭天独家观察:美国如何给芯片安“后门”
Xin Lang Cai Jing· 2025-08-10 04:26
Core Viewpoint - Nvidia has stated that its chips do not contain "backdoors," specifically referencing the "Clipper chip" incident from the past [1][3]. Group 1: Historical Context - In 1992, AT&T introduced a hardware device for secure voice transmission, which led to government dissatisfaction and the introduction of the "Clipper chip" containing a "cryptographic backdoor" for government access [3]. - The "Clipper chip" faced widespread resistance and was terminated within three years, leading the U.S. government to adopt a more discreet approach regarding "backdoors" in technology [3]. Group 2: Current Legislative Actions - In May 2023, U.S. Congressman Bill Foster proposed legislation requiring U.S. chip companies to include "backdoors" in export-controlled chips, asserting that the technology is mature and feasible [4][6]. Group 3: Technical Feasibility of Backdoors - There are two types of backdoors: hardware and software. Hardware backdoors involve physical modifications during chip design, while software backdoors involve embedded instructions in software [6]. - The Nvidia H20 chip can theoretically implement a "remote shutdown" feature through its power management module, which could be triggered under specific conditions [6][8]. - Another method for a hardware backdoor involves modifying the H20 chip's firmware to restrict functionality based on certain conditions, such as geographic location [8]. Group 4: Software Ecosystem and Backdoors - The CUDA ecosystem, used by over 4 million developers, could potentially facilitate the activation of backdoors through software updates, allowing for tracking and data collection [9][11]. - The U.S. aims to maintain AI dominance through both hardware and software ecosystems, necessitating other countries to develop independent alternatives [11]. Group 5: On-Chip Governance Mechanism - The U.S. government has proposed an "on-chip governance mechanism" to coordinate chip design and production, which includes features like license locking, tracking, usage monitoring, and usage restrictions [12][14]. - Many leading chip manufacturers, including Nvidia, already possess the necessary functionalities for this governance mechanism, although some may not yet be activated [14]. Group 6: Concerns Regarding Nvidia's H20 Chip - The H20 chip is considered unsafe for China, as it lacks advanced features and has only about 20% of the performance of its standard counterpart, the H100 [17][20]. - The H20 chip's energy efficiency is approximately 0.37 TFLOPS/W, failing to meet the 0.5 TFLOPS/W standard set by China's green development initiatives [18][19]. - Given its lack of safety, advancement, and environmental compliance, the H20 chip is deemed a poor choice for consumers [20][21].
美国如何给芯片安“后门”
Hu Xiu· 2025-08-10 04:15
Core Viewpoint - Nvidia has stated that its chips do not contain "backdoors," specifically addressing the "Clipper chip" incident from the past [1][2]. Group 1: Historical Context of Backdoors - In 1992, AT&T launched a hardware device for secure voice transmission, which led to government dissatisfaction and the introduction of the "Clipper chip" containing a "backdoor" for government access [3][4][5]. - The "Clipper chip" faced significant resistance and was terminated within three years, leading the government to adopt a more discreet approach regarding "backdoors" [6]. Group 2: Current Legislative Developments - In May of this year, U.S. Congressman Bill Foster proposed legislation requiring U.S. chip companies to include "backdoors" in export-controlled chips [8]. - Foster, with a background in chip design, asserted that the technology to implement such features is mature and feasible [9]. Group 3: Technical Feasibility of Backdoors - There are two main types of "backdoors": hardware and software [12][20]. - Using Nvidia's H20 chip as an example, a hardware "backdoor" could be implemented through the power management module to enable remote shutdown capabilities [13][14]. - Software "backdoors" can be activated through updates to the CUDA ecosystem, which is widely used by developers globally [16][18]. Group 4: Implications of Backdoor Mechanisms - The "backdoor" mechanisms can facilitate tracking and remote disabling of chips, raising concerns about information security [19][23]. - The U.S. has developed a "chip governance mechanism" to coordinate chip design and production, ensuring control over AI chips [24][29]. Group 5: Concerns Regarding Nvidia's H20 Chip - The H20 chip, which is being exported to China, is considered unsafe due to its limited performance compared to the H100, with only about 20% of the overall computing power and a 41% reduction in GPU core count [33]. - The H20 chip's energy efficiency is also subpar, with a measured efficiency of 0.37 TFLOPS/W, failing to meet the required standards [37]. - Given its lack of advancement, environmental sustainability, and safety, the H20 chip is not seen as a viable option for consumers [40].
玉渊谭天:美国给芯片安“后门”,H20既不环保、也不先进、更不安全
Ge Long Hui A P P· 2025-08-10 03:33
Core Viewpoint - A bill proposed by U.S. Congressman Bill Foster aims to require U.S. chip companies to incorporate "backdoors" in export-controlled chips, enabling tracking and remote shutdown capabilities [1] Group 1: Legislative Context - The bill is led by Bill Foster, who has a background in physics and chip design, asserting that the technology for implementing these backdoors is mature and feasible [1] - The proposed functionalities include "tracking" and "remote shutdown," which can be achieved through hardware and software backdoors [1] Group 2: Technical Implementation - Using NVIDIA's H20 chip as an example, a hardware backdoor can be implemented by embedding a "remote shutdown" circuit in the power management module, allowing the chip to be disabled under specific conditions [2] - The H20 chip can be programmed to shut down after a set usage time, rendering it unusable and resulting in wasted investment for buyers [2] - Another method for a hardware backdoor involves modifying the firmware bootloader to check specific conditions at startup, potentially preventing the chip from functioning if conditions are not met [2] Group 3: Product Evaluation - The H20 chip is deemed unsafe and not advanced, with only about 20% of the overall computing power compared to its standard version, the H100, and a 41% reduction in GPU core count [3] - The performance drop of 28% in the H20 chip makes it inadequate for training large-scale models, and it is also characterized as neither environmentally friendly nor advanced [3] - Consumers are presented with the option to avoid purchasing the H20 chip due to its lack of safety, advancement, and environmental considerations [3]
芯片后门,是什么?
半导体芯闻· 2025-08-08 10:54
Core Viewpoint - The article discusses the recent challenges faced by Nvidia in the Chinese market following the U.S. lifting the ban on its H20 AI chip sales to China, highlighting concerns over potential security risks associated with backdoor systems in chips [1][12]. Group 1: Nvidia and H20 Chip - Nvidia's H20 chip, designed for the Chinese market, is now facing scrutiny from China's National Cyberspace Administration due to concerns about security vulnerabilities and potential backdoors [1][12]. - The H20 chip's performance is estimated to be about 70% of Nvidia's H100 chip, making it the most powerful AI chip Nvidia is allowed to sell in China [12]. - Despite receiving 300,000 orders, the scrutiny from the Chinese government poses significant challenges for Nvidia's sales strategy in the region [12][14]. Group 2: Backdoor Systems and Security Risks - Backdoor systems in chips can allow unauthorized access, posing severe security threats, especially in critical applications like military and finance [2][4]. - The definition of "backdoor" is contentious, with some features being misidentified as malicious due to their potential misuse [4][5]. - Experts emphasize that distinguishing between design flaws and intentional backdoors requires precise technical analysis [5][6]. Group 3: Geopolitical Context - The scrutiny of Nvidia's H20 chip reflects broader geopolitical tensions between the U.S. and China, particularly in the tech sector [12][15]. - China's emphasis on technological self-sufficiency and reducing reliance on Western technology is becoming increasingly pronounced [12][15]. - The incident illustrates the disconnect between technological trust and geopolitical trust, amplifying concerns over security in international tech collaborations [15].
“我们芯片不存在后门”,英伟达回应被约谈
Xin Lang Cai Jing· 2025-08-06 13:35
Core Viewpoint - The discussion surrounding the potential backdoor risks of NVIDIA's H20 chip has raised significant concerns about its security, particularly regarding the existence of a "kill switch" or monitoring software. In response, the company has issued a statement asserting that its chips do not contain any form of backdoor, kill switch, or monitoring software [1][19]. Group 1: Company Response - NVIDIA emphasizes that the suggestion of implementing a "kill switch" or built-in controls in hardware to prevent remote disabling without user consent poses significant risks and is unnecessary. The company maintains that such hardware backdoors should not be established and adheres to principles of openness and transparency [3][11]. - The company draws a comparison to smartphone features like "Find My Phone" or "remote wipe," stating that these functions are entirely user-controlled and do not equate to hardware backdoors. A "kill switch" would represent a permanent control that users cannot revoke, potentially leading to severe consequences [3][16]. Group 2: Historical Context and Security Principles - NVIDIA cites historical lessons from the 1990s Clipper chip project, which aimed to provide strong encryption while allowing government backdoor access. This approach was deemed flawed as it introduced fundamental vulnerabilities that could be exploited by malicious actors, ultimately undermining user trust in system security [13][14]. - The company asserts that hard-coded single-point controls are fundamentally undesirable and violate basic cybersecurity principles. It advocates for robust security measures through rigorous internal testing and independent validation, adhering to global cybersecurity standards [11][14]. Group 3: Industry Implications - NVIDIA warns that intentionally weakening critical hardware infrastructure could have detrimental effects on the global economy and national security interests. The company believes that such practices should be firmly avoided [5][19]. - The recent concerns have also attracted the attention of the Chinese government, which has requested explanations from NVIDIA regarding potential security vulnerabilities and backdoor issues related to the H20 chip [19].
英伟达发长文:重申芯片无后门
半导体芯闻· 2025-08-06 11:22
Core Viewpoint - Nvidia emphasizes that its chips do not contain backdoors, kill switches, or monitoring software, asserting that these features are not a way to build trustworthy systems and will never be implemented [2][3]. Group 1: Nvidia's Position on Chip Security - Nvidia's statement addresses concerns raised by experts and policymakers about the need for kill switches or built-in controls in hardware to prevent misuse, asserting that such measures could provide opportunities for hackers and hostile entities [2][3]. - The company cites the Clipper chip incident from the 1990s as a cautionary tale, highlighting that government backdoors can undermine user trust and create centralized vulnerabilities [3]. - Nvidia argues that the existence of government backdoors damages the confidence users have in system security, and that intentional weakening of critical infrastructure should not be a strategy for protection [3]. Group 2: Regulatory Context - On July 31, the Chinese National Cyberspace Administration interviewed Nvidia regarding security risks associated with the H20 computing chip sold to China, requesting explanations and relevant proof of data [4].