终止开关

Search documents
英伟达深夜发声明:NVIDIA 芯片不存在后门、终止开关和监控软件
Xi Niu Cai Jing· 2025-08-11 05:51
Group 1 - The core issue revolves around serious security concerns related to NVIDIA's H20 computing chip, prompting the National Internet Information Office to request explanations and proof from NVIDIA regarding the security risks associated with backdoor vulnerabilities [1] - NVIDIA officially responded on August 6, stating that their chips do not contain backdoors, kill switches, or monitoring software, emphasizing the importance of user consent and awareness in hardware design [4] - The company referenced the historical Clipper chip incident to highlight the dangers of built-in backdoors, which were found to have fundamental flaws that could be exploited, undermining user trust in system security [4] Group 2 - Experts and policymakers have suggested the need for "kill switches" in hardware to mitigate misuse risks, but NVIDIA firmly opposes the implementation of such features, arguing they violate basic cybersecurity principles [4] - The existence of government backdoors is seen as detrimental to user confidence in system security, as it creates single points of failure [4] - NVIDIA's statement aims to reassure stakeholders about the integrity of their products and the company's commitment to cybersecurity [4]
“我们芯片不存在后门”,英伟达回应被约谈
Xin Lang Cai Jing· 2025-08-06 13:35
Core Viewpoint - The discussion surrounding the potential backdoor risks of NVIDIA's H20 chip has raised significant concerns about its security, particularly regarding the existence of a "kill switch" or monitoring software. In response, the company has issued a statement asserting that its chips do not contain any form of backdoor, kill switch, or monitoring software [1][19]. Group 1: Company Response - NVIDIA emphasizes that the suggestion of implementing a "kill switch" or built-in controls in hardware to prevent remote disabling without user consent poses significant risks and is unnecessary. The company maintains that such hardware backdoors should not be established and adheres to principles of openness and transparency [3][11]. - The company draws a comparison to smartphone features like "Find My Phone" or "remote wipe," stating that these functions are entirely user-controlled and do not equate to hardware backdoors. A "kill switch" would represent a permanent control that users cannot revoke, potentially leading to severe consequences [3][16]. Group 2: Historical Context and Security Principles - NVIDIA cites historical lessons from the 1990s Clipper chip project, which aimed to provide strong encryption while allowing government backdoor access. This approach was deemed flawed as it introduced fundamental vulnerabilities that could be exploited by malicious actors, ultimately undermining user trust in system security [13][14]. - The company asserts that hard-coded single-point controls are fundamentally undesirable and violate basic cybersecurity principles. It advocates for robust security measures through rigorous internal testing and independent validation, adhering to global cybersecurity standards [11][14]. Group 3: Industry Implications - NVIDIA warns that intentionally weakening critical hardware infrastructure could have detrimental effects on the global economy and national security interests. The company believes that such practices should be firmly avoided [5][19]. - The recent concerns have also attracted the attention of the Chinese government, which has requested explanations from NVIDIA regarding potential security vulnerabilities and backdoor issues related to the H20 chip [19].