• snipingsnipe@piefed.social
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 hours ago

    Full leaks of IME architectures would definitely a 1 on the scoreboard against us and… uh, whoever in the late-2000s/early-2010s believed it to be priority to implement this great technology for everyone! AMD PSP next please.

  • stupidcasey@lemmy.world
    link
    fedilink
    English
    arrow-up
    60
    arrow-down
    1
    ·
    1 day ago

    Oh, no! Someone is going to get what was world leading technology if it was 8 years ago this might be a problem.

    • Alphane Moon@lemmy.worldOPM
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      2
      ·
      edit-2
      1 day ago

      Not sure what you are refering to.

      According to The Mercury News, Jinfeng Luo, who started at Intel in 2014, received a termination notice last July 7th, ending his service with the company at the same month.

      • arcterus@piefed.blahaj.zone
        link
        fedilink
        English
        arrow-up
        68
        arrow-down
        1
        ·
        edit-2
        1 day ago

        They’re saying Intel’s chips suck compared to the competition now, so the data stolen is for technology that is worse than other chips available already (or soon to be available, depending on what was stolen).

        • papertowels@mander.xyz
          link
          fedilink
          English
          arrow-up
          2
          ·
          6 hours ago

          My money is on chinas domestic CPU production. They’ve been pursuing that for a while now, but have always been years behind even Intel. They’re the only ones I can think of that would be able to leverage this info to significantly improve.

  • Leon@pawb.social
    link
    fedilink
    English
    arrow-up
    83
    ·
    1 day ago

    Good for them! I hope they won’t get caught.

    More people should rebel and hurt the companies like this. They’re laying people off not because there isn’t work, but because they don’t want to pay. All of the companies doing layoffs are also hiring, only they’ve created a market of desperation so they know they can give workers shitty deals.

    Intel and all the other big corpos deserve this.

        • Prove_your_argument@piefed.social
          link
          fedilink
          English
          arrow-up
          4
          ·
          17 hours ago

          Well, we don’t actually know what was taken.

          Depending on the information this could be anything from basic technical information to all the state sponsored backdoor tooling they’ve implemented across their stack.

          The former might “hurt” them on some level if chinese companies steal their designs and sell them as counterfeit, but the latter has security implications for anybody with intel gear from the poorest individuals to the wealthiest companies.

          Just saying, you never know how this could impact things down the road.

          • Cethin@lemmy.zip
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            13 hours ago

            Nah, I think the latter would be great. Sure, short term it could cause issues, though not really for the average person. China will use it to influence politics for those people maybe, but they don’t have any large use for it. The US government has far more use for it in regard to them, so that’s actually a threat. It would be a risk for the government and western companies.

            The benefit of this being lost to China is they’d have to fix what backdoors they can, and maybe reconsider creating new ones. This is a huge benefit to American consumers. It only hurts those who asked for the backdoors in the first place, which is presumably the US government.

            I don’t live in China, so I’m not really worried about China’s government. I live in the US, so I’m worried about the US government.

    • atmorous@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      1 day ago

      Everybody laid off needs to make new companies together as well. Good ones not on stock market that are unionized

      • Cavemanfreak@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        9
        ·
        21 hours ago

        In cases like this it’s reaaaally hard to just start up a new competitor from nothing (assets wise). Building up production is not cheap.

        • krooklochurm@lemmy.ca
          link
          fedilink
          English
          arrow-up
          5
          ·
          18 hours ago

          Dude i made a microprocessor out of some scrap wood and copper wire I found behind a dumpster.

          It has a bad habit of catching fire but im pretty sure with a few billion dollars of investment ill be able to create the greatest computer chip ever made

      • survirtual@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        22 hours ago

        They already thought of that possibility and have taken over the legal system to mitigate. Corporate patents & NDAs will have some complaints.

    • Alphane Moon@lemmy.worldOPM
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      3
      ·
      edit-2
      21 hours ago

      There can be reverse situations (e.g. opportunistic individual delivering hard earned data from an honest company to American criminal groups) so its not black and white.

      That being said “reap what you sow” can be a fair and just characterisation.

      • Krono@lemmy.today
        link
        fedilink
        English
        arrow-up
        5
        ·
        22 hours ago

        honest company

        You have better odds finding Sasquatch and a unicorn than you do finding an honest publically traded company.

  • arcterus@piefed.blahaj.zone
    link
    fedilink
    English
    arrow-up
    23
    ·
    1 day ago

    Kind of seems like the files aren’t that valuable if they’re only trying to get $250k. Like that’s a large amount of money for most people, but for a big company suing for its IP, that doesn’t sound like that much tbh.

  • Valmond@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    2
    ·
    1 day ago

    How ho you detect someone stole files nowadays? Did they have them printed out on a bookshelf?

    • fonix232@fedia.io
      link
      fedilink
      arrow-up
      21
      ·
      1 day ago

      Every single access is logged on such systems, regardless what kind of file hosting you use.

      An employee suddenly accessing tons of files, potentially in indexing order (meaning they’re either clicking through every link, every folder, every file, or are using an automated tool that does exactly the same), now that’s suspicious.

      Combine that with logs from their terminal, which would usually contain things like downloads, file operations, as well as external storage connection/disconnection events, and you can basically get a near perfect map of what they stole and how.

      • Cethin@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        13 hours ago

        They knew what they stored it on, so presumably they did it in a company computer, and that computer had logging software that the company got access to (whether it automatically sends it to them or just stores it locally until needed).

      • Valmond@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        12
        ·
        1 day ago

        Who logs who reads files? And even if, who checks those logs? Gotta be a wild system.

        • teft@piefed.social
          link
          fedilink
          English
          arrow-up
          12
          ·
          1 day ago

          Lots of companies maintain access logs. Anything with high security you want to be able to audit who accessed what and when.

            • teft@piefed.social
              link
              fedilink
              English
              arrow-up
              8
              ·
              1 day ago

              Normally you just have the systems admin or an automated system look into it. It depends on your security setup.

              • Valmond@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                1 day ago

                Yeah I guess that’s the only sane way to do it. A tiny bit crazy the whole system exists, an automatic verification lights up, but only after the dude left.

                Why did he have access to all that for starters, why wasn’t the alarms ringing when he did it etc. seems like security at Intel is kind of wonky. 🤷🏻‍♀️

                • teft@piefed.social
                  link
                  fedilink
                  English
                  arrow-up
                  4
                  arrow-down
                  1
                  ·
                  1 day ago

                  It might just come down to they never experienced the exact type of espionage so didn’t have strong guardrails to prevent this. Hopefully some security engineers learned a lesson from this and will change their processes.

        • a4ng3l@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          24 hours ago

          Siems and such systems are designed for that. Could be part of SOC or CSIRT. Generally all large companies have that. It’s also getting more accessible to smaller structures in the form of « as a service ». A data leak is a data leak whatever the vector so shit needs to be detected & acted upon. It’s all fun & fair games when about Intel secrets it seems but what when a dickhead steals medical data or other perso stuff ?

        • Cypher@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 day ago

          I check those logs, not for Intel though.

          The systems that support this range from simple to unnecessarily complex.

            • Cypher@lemmy.world
              link
              fedilink
              English
              arrow-up
              6
              ·
              1 day ago

              Yes that’s a small part of my job.

              I setup monitoring systems, ingest logs and create rules to detect unusual or malicious behaviour.

              Then I perform investigations which sometimes turn into forensic investigations, which sometimes results in legal action.

        • plyth@feddit.org
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          1 day ago

          It would be stupid not to do so. Bigger question is, why could he download the files and leave campus?

    • Alphane Moon@lemmy.worldOPM
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 day ago

      Someone downloading full datasets that would rarely happen in the regular course of work (unless there was special projec tor some sort).