Показаны сообщения с ярлыком Amazon. Показать все сообщения
Показаны сообщения с ярлыком Amazon. Показать все сообщения

суббота, 2 октября 2021 г.

Samsung Galaxy Watch4: problems keep getting bigger





In our blog, we have repeatedly mentioned the problems that many users of the "revolutionary" Samsung Galaxy Watch4 have encountered after switching to Google's worst operating platform WearOS 3. In addition to the fact that due to poor optimization and "congenital traumas" this "updated" operating system has increased power consumption, requires more productive hardware and is incompatible with many mobile devices (iPhone, Huawei, Honor), recently there have been more complaints about disgusting work various applications. On forums and in social networks, users talk about many different bugs that they encountered during the operation of the latest Samsung wearable devices, without receiving a clear answer from the manufacturer about the causes of the problems and how to fix them. In particular, many Galaxy Watch4 owners point to the impossibility of normal use of sports applications that randomly "shut down" after launch, or show results that are very far from the true indicators. The interface and menu navigation features of the Galaxy Watch4 are less user-friendly than previous TIZEN-powered Gear S and the Galaxy Watch series. But most of the complaints from users are related to the very limited battery life of Watch4. This is a real failure for Samsung, as the old TIZEN-powered models showed record performance relative to their closest competitors. It is impossible to fix this, because, as mentioned above, WearOS 3 requires more powerful hardware and more memory due to poor optimization and low efficiency.
In addition, security experts warn that Android devices (Android Wear/WearOS/WearOS 3) are much more vulnerable to hacker attacks in order to steal personal data and access users' financial transactions.
Above, we provide some comments under one of the Galaxy Watch4 reviews on YouTube, where people, to put it mildly, express their dissatisfaction with the "harmonious collaboration" of Samsung and Google based on the absolutely discredited WearOS 3 platform. Amid growing outrage from users, Samsung and Google have stepped up their campaign to fool the public to deceive potential Galaxy Watch4/Watch4 Classic buyers. The South Korean tech giant continues to pay lavish advertising reviews on various online resources and social networks, while the search engine Google diligently hides negative reviews from independent experts. So, for example, in the Russian-language segment of Google Search, with the introduction of phrases such as "Galaxy Watch 4 проблемы" ("Galaxy Watch 4 problems") nothing but paid advertising reviews will appear. The situation is not much better if the request is entered in English. And only especially persistent Internet users can find something suitable by turning to other search engines or paid applications to find the required content.
Here we may well be talking about the formation of a cartel agreement between an equipment supplier and a software supplier, who fraudulently want to present their product in the best possible light.
All this once again raises the question of monopolizing the search engine market and manipulating public opinion. Google, Facebook, Apple and a number of other IT giants are increasingly accused of their policy of hushing up issues that are disadvantageous to their business. Moreover, recently, Google, Apple, Twitter, Facebook and Telegram have been heavily criticized for overt political censorship during the last US presidential elections and parliamentary elections in Russia. In addition, Apple was accused of gross invasion of privacy when the Cupertino-based corporation said it wanted to censor photos of iPhone users for "child pornography." This caused a flurry of indignation not only in the United States, but also in other regions of the world, since the automatic detection of ordinary family photographs with "naked" can lead many law-abiding citizens to the dock, or, at least, to many months of legal proceedings, exhausting nerves and devastating wallets of the accused. It seems that the public in different countries is starting to think more and more about the unsightly role of IT monopolies in our daily life. It is necessary to curb their appetites as soon as possible and introduce a ban on censorship in search queries, except in cases of clear violations of the legislation regarding violence against people and animals, as well as the propaganda of ideas of terrorism. 

Samsung Galaxy Watch4: проблем становится всё больше

В нашем блоге мы уже неоднократно упоминали о проблемах, с которыми столкнулись многие пользователи "революционных" смарт-часов Samsung Galaxy Watch4 после перехода на самую ужасную операционную платформу WearOS 3 от Google. Помимо того, что из-за плохой оптимизации и "родовых травм" эта "обновлённая" при помощи Samsung и Fitbit операционная система обладает повышенным энергопотреблением, требует более производительного "железа" и несовместима со многими мобильными устройствами (iPhone, Huawei, Honor), в последнее время всё чаще появляются жалобы на отвратительную работу различных приложений.
На форумах и в соцсетях пользователи говорят о множестве различных багов, с которыми столкнулись в ходе эксплуатации новейших носимых устройств Samsung, не получая от производителя внятного ответа о причинах неполадок и способах их устранения. В частности, многие владельцы Galaxy Watch4 указывают на невозможность нормального использования спортивных приложений, которые произвольно "захлопываются" после запуска, либо показывают результаты, весьма далёкие от истинных показателей. Интерфейс и возможности навигации по меню в Galaxy Watch4 стали менее удобными по сравнению с предыдущими сериями Gear S и Galaxy Watch на базе TIZEN OS. Но больше всего нареканий от пользователей связано с весьма ограниченным временем автономной работы Watch4. Это настоящий провал Samsung, поскольку старые TIZEN-модели демонстрировали рекордные показатели относительно ближайших конкурентов. Исправить это невозможно, поскольку, как было сказано выше, WearOS 3 требует более производительного оборудования и большего объёма памяти из-за плохой оптимизации и низкой эффективности. Кроме того, специалисты по безопасности предупреждают, что устройства на базе Android (Android Wear/WearOS/WearOS 3) гораздо более уязвимы в случае хакерских атак с целью кражи персональных данных и доступа к финансовым операциям пользователей.
Выше мы приводим некоторые комментарии под одним из очередных обзоров Galaxy Watch4 на YouTube, где люди, мягко говоря, выражают своё недовольство относительно "гармоничной коллаборации" Samsung и Google на базе абсолютно дискредитировавшей себя платформы WearOS 3.
На фоне растущего возмущения пользователей, Samsung и Google усилили кампанию по одурачиванию публики с целью введения в заблуждение потенциальных покупателей смарт-часов Galaxy Watch4/Watch4 Classic. Южнокорейский техногигант продолжает щедро оплачивать рекламные обзоры на различных интернет-ресурсах и в социальных сетях, в то время как поисковик Google старательно прячет негативные отзывы от независимых экспертов. Так, например, в русскоязычном сегменте Google Search, при введении таких фраз как "Galaxy Watch 4 проблемы" или "проблемы Galaxy Watch 4" ничего кроме проплаченных рекламных обзоров не появится.
Ненамного лучше дела обстоят и в случае введения запроса на английском языке типа "Galaxy Watch 4 problems". И лишь только особо настойчивые интернет-пользователи могут найти что-то подходящее благодаря обращению к другим поисковым системам или платным приложениям для обнаружения требуемого контента.
Здесь мы вполне можем говорить о формировании картельного сговора между поставщиком оборудования и поставщиком софта, которые обманным путём хотят представить свой продукт в наилучшем свете.  
Всё это в очередной раз поднимает вопрос о монополизации рынка поисковых систем и манипулировании общественным мнением. Google, Facebook, Apple и целый ряд других IT-гигантов всё чаще обвиняются в политике замалчивания невыгодных для их бизнеса вопросов. Более того, в последнее время Google, Apple, Twitter, Facebook и Telegram были жёстко раскритикованы за неприкрытую политическую цензуру в ходе последних президентских выборов в США и парламентских выборов в России. Кроме того, Apple обвинили в грубом вторжении в частную жизнь, когда корпорация из Купертино заявила о желании цензурировать фотографии пользователей iPhone на предмет "наличия детской порнографии". Это вызвало шквал возмущения не только в США, но и в других регионах мира, поскольку автоматическое выявление обычных семейных фотографий с "голышами" может привести многих законопослушных граждан на скамью подсудимых, или, как минимум, к многомесячным судебным разбирательствам, изматывающих нервы и опустошающих кошельки обвиняемых.
Похоже, что общественность в разных странах начинает всё больше задумываться о неприглядной роли IT-монополий в нашей повседневной жизни. Необходимо как можно быстрее обуздать их аппетиты и ввести запрет на какую-либо ценуру при поисковых запросах, кроме случаев явного нарушения законодательства, касающихся насилия над людьми и животными, а также пропаганды идей терроризма.

понедельник, 16 марта 2020 г.

Android-рабство: новые жертвы



Google угрожает отзывом лицензии на Android, если производители телевизоров также будут сотрудничать с Amazon

Холдинг Alphabet/Google может отзывать лицензии на программное обеспечение у производителей Android TV, если они также производят устройства, работающие под управлением определённых ответвлений от её ОС, включая популярный Amazon Fire TV. Таким образом, лицензионные условия Google для Android предусматривают, что эти производители телевизоров больше не смогут запускать Play Store и приложения Google на всех своих устройствах, включая смартфоны и планшеты.
Политики соглашения Android Compatibility Commitment указывают, что на устройствах, которые предусматривают доступ к Play Store, должна быть установлена ​​версия Android, совместимая с одобренной Google версией Android. Это означает, что если производители телевизоров хотят иметь Play Store на своих устройствах, они не могут делать телевизоры с другими операционными системами, такими как, например, конкурирующее Amazon Fire TV. Таким образом, эти требования в соглашении позволили Google запретить некоторым своим партнёрам работать с Amazon, являющейся конкурентом в сфере умного дома.
Нарушение строгих условий лицензирования Google может иметь катастрофические последствия для производителей телевизоров, которые также выпускают смартфоны на базе Android. Это связано с тем, что условия Android Compatibility Commitment также предусматривают, что, если производитель телевизоров решит использовать Fire TV на своих устройствах, он не сможет установить Play Store или приложения Google на смартфоны. Это, вероятно, сделает такие смартфоны значительно менее популярными среди пользователей.
Google прямо не ответила на вопрос журналистов о том, действительно ли её политики запрещают производителям телевизоров предлагать продукты на базе Android TV и Amazon Fire TV. Компания заявила, что осуществляет проверку безопасности и тестирование на совместимость устройств на базе Android TV, которые предлагают сервисы Google и доступ к Play Store. Это якобы делается для защиты конфиденциальности и безопасности пользовательских данных.
Google также утверждает, что пытается обеспечить согласованное и безопасное использование программного обеспечения с проверенными версиями Android, и что приложения могут работать не так, как ожидают пользователи на устройстве Android, которое ещё не проходило процесс тестирования совместимости компании.
К счастью, такие производители как Samsung и LG используют в своих телевизорах собственные операционные системы (TIZEN и WebOS соответственно), что поможет им защититься от атаки со стороны Google. Правда, тот факт, что оба вендора производят смартфоны и планшеты на базе Android, может косвенным образом задеть даже эти брэнды, так как Google в какой-то момент надумает запретить им доступ к сервисам от Amazon посредством блокировки своего магазина приложений. В то же время, такие производители как Sony и многочисленные  "китайцы" (включая ныне принадлежащие компаниям из КНР брэнды Philips и Sharp) целиком полагаются на Android OS, что в дальнейшем может обернуться для них катастрофическими последствиями из-за наложенных ограничений.
Всё происходящее в очередной раз доказывает правоту позиции эксперта информационного блога Samsung World Николая Изнова, неоднократно призывавшего Samsung полностью отказаться от использования Android как от морально устаревшей и весьма ненадёжной платформы, тормозящей прогресс в мире смарт-девайсов.
Каждый уважающий себя крупный производитель должен иметь собственную операционную платформу с собственными сервисами, которые не зависят от прихотей Google или кого-либо ещё.

Android slaves: new victims

Google blocks its Android TV partners from also using Amazon’s Fire TV

Amazon has sold millions of Fire TV streaming devices in recent years, but its efforts to expand the Fire TV platform to smart TVs and cable set-top boxes have been slow-going. That's not by accident, according to industry insiders: They say Google has long prevented consumer electronics manufacturers from doing business with Amazon.
Any company that licenses Google's Android TV operating system for some of its smart TVs or even uses Android as a mobile operating system has to agree to terms that prevent it from also building devices using forked versions of Android like Amazon's Fire TV operating system, according to multiple sources. If a company were to break those terms, it could lose access to the Play Store and Google's apps for all of its devices. "They cannot do Android TV and Fire TV simultaneously," said a senior employee of a major TV manufacturer, who spoke with Protocol on the condition of anonymity because he wasn't authorized by his employer to discuss the subject.
With these terms, Google has effectively built a huge firewall against competition in the living room: The search giant announced last year that it had struck deals with six out of 10 smart TV manufacturers and 140 cable TV operators across the globe. "It basically blocked Amazon," the senior employee said.
Regulators in multiple markets have in the past taken issue with Google using these kinds of deal terms to protect its mobile Android business, but their application in the smart TV space hasn't been previously reported. Google declined to comment on the subject. Amazon's Fire TV VP and GM Marc Whitten declined to talk about Google's policies during a recent interview, but went on to lay out Amazon's own approach toward engaging with manufacturing partners.
"We don't expect them to only use our services or our software," he said. "We think that partners should be able to pick the solutions that work for them, which may actually vary between lines of TVs, or different categories of devices and territories. I think that diversity of options is a really good thing."

Anti-fragmentation policies locking out competitors

At the center of Google's efforts to block Amazon's smart TV ambitions is the Android Compatibility Commitment — a confidential set of policies formerly known as the Anti-Fragmentation Agreement — that manufacturers of Android devices have to agree to in order to get access to Google's Play Store. Google has been developing Android as an open-source operating system, while at the same time keeping much tighter control of what device manufacturers can do if they want access to the Play Store as well as the company's suite of apps. For Android TV, Google's apps include a highly customized launcher, or home screen, optimized for big-screen environments, as well as a TV version of its Play Store.
Google policies are meant to set a baseline for compatible Android devices and guarantee that apps developed for one Android device also work on another. The company also gives developers some latitude, allowing them to build their own versions of Android based on the operating system's open source code, as long as they follow Google's compatibility requirements.
However, the Android Compatibility Commitment blocks manufacturers from building devices based on forked versions of Android, such as Fire TV OS, that are not compatible with the Google-sanctioned version of Android. This even applies across device categories, according to two sources: Manufacturers that have signed on to the Android Compatibility Commitment for their mobile phone business are effectively not allowed to build Fire TV devices.
"You cannot manufacture any of those noncompliant devices," the senior employee told Protocol. This type of contract was unlike any other partnership agreements in the industry, he said. "It's completely unique."

TV manufacturers lose an option

Google's use of the Android Compatibility Commitment in the smart TV space has been an open secret in the consumer electronics industry for some time, according to the senior employee of a TV manufacturer. "In this field, everybody knows that," he said.
But even with that knowledge, manufacturers have to deal with a number of uncertainties. Two sources suggested that Google may have in the past, in limited instances, granted certain exceptions to the Android Compatibility Commitment. Third-party manufacturers have for instance been able to build devices running both operating systems, as long as the brands those devices are sold under aren't owned by the same company.
This gets further complicated by the realities of the consumer electronics industry, in which manufacturers often license brands for a subset of territories or device categories. If you buy a TV from a certain brand in Europe, it may be made by a different manufacturer and run a different operating system than a TV from the same brand bought in North America, for instance.
What's more, manufacturers often build devices under multiple brands, including those used by major retailers. And while a consumer electronics company may use Android TV, Fire TV OS or Roku's platform for its U.S. customers, it may decide to use a different operating system in Europe or Latin America. Limiting those choices makes it a lot harder for manufacturers to compete with giants like Samsung or LG, which have developed their own smart TV operating systems. Said the senior employee: "We lose an option."

An EU fine and a probe in India

Google's use of its Anti-Fragmentation Agreement first made headlines in 2016, when the European Union zeroed in on the policy as part of its antitrust investigation of Google's Android operating system. Back then, European regulators alleged that the company was "preventing manufacturers from selling smart mobile devices running on competing operating systems based on the Android open source code."
That investigation resulted in a €4.34 billion (around $4.9 billion) fine against the company. Google has appealed that fine, along with two other antitrust rulings, but it did make some significant concessions as a result. "Going forward, Android partners wishing to distribute Google apps may also build noncompatible, or forked, smartphones and tablets for the European Economic Area," wrote Google Android SVP Hiroshi Lockheimer at the time.
It's worth noting that Lockheimer specifically didn't mention smart TV devices, as the European Union's investigation solely focused on phones. Furthermore, any changes were limited to the European Union, with some doubting their effectiveness altogether. "Google has dragged its feet in complying with the Commission decisions," said European antitrust expert Damien Geradin, who co-authored a Harvard Business School report on Google's use of anti-fragmentation agreements in 2016. "Compliance is not in their DNA, and they are trying to buy time."
More recently, Google's Android licensing requirements have also attracted scrutiny in India, where Android controls 80% of the mobile market. The country's Competition Commission noted last April that by requiring device manufacturers to sign these requirements, "Google has reduced the ability and incentive of device manufacturers to develop and sell devices operating on alternative versions of Android."
"They hate forks officially due to the risk of fragmentation, but in reality because it creates competition outside their walled garden," Geradin said. "If they can make the life of companies that intend to produce forks very difficult, they will do so." Regulators should be "much harder with Google when it comes to remedies," he argued.

Amazon and Google's contentious history

Amazon and Google have long competed with each other in the living room, and executives have been fairly open about the rivalry. "What keeps us awake at night is Amazon," said Shalini Govil-Pai, who leads Google's Android TV efforts, when asked about the company's biggest rival during an interview last fall.
Amazon's Whitten gave a more diplomatic answer during an interview at CES but also admitted, "The most places where we're directly competing is probably Google." A source who had been briefed on Amazon's Fire TV efforts last year was more explicit: "Their view was that Google was their only competition."
That competition boiled over in 2015 when Amazon stopped selling Google's Chromecast streaming adapter, which was followed by Google blocking Amazon from accessing YouTube on its Echo Show and Fire TV devices in late 2017. The two companies ultimately ended that dispute last year.
However, it may be shortsighted to only cast Google's use of the Android Compatibility Commitment as a way to keep Amazon at bay. The policy also has the potential of blocking others, including TV manufacturers looking for ways to develop their own operating systems, from building devices based on forked versions of Android. And ultimately, it touches on issues of competition, or lack thereof, in the TV space that have a ripple effect across the ecosystem.
Among app developers, there is a general sense of unease about having less competition among smart TV platforms. Most developers have business relationships with both Google and Amazon, making it harder for them to speak out publicly. In a conversation with Protocol, a developer of a popular streaming app suggested that healthy competition in the space was essential to negotiate fair business terms with smart TV platform operators.
"What's important for us is seeing that there is competition in the market," that developer said. "If there are monopolies in this space, then the interests of users and the interests of content providers are at risk."
Everything that happens once again proves the correctness of the position of the expert of the Samsung World information blog Nikolay Iznov, who repeatedly called on Samsung to completely abandon the use of Android as a morally obsolete and very unreliable platform that slows down the progress in the world of smart devices.
Every self-respecting large manufacturer should have its own operating platform with its own services that are not dependent on the whims of Google or anyone else.

четверг, 12 сентября 2019 г.

Samsung рапортует о сотрудничестве с Google, Amazon, Facebook, Microsoft, Spotify, Twitter и другими Android-разработчиками для развития экосистемы Galaxy Fold






Сотни приложений, доступных в Google Play Store и Galaxy Store, обновили для обеспечения работы на устройствах с изменяющимся размером экрана

Samsung Electronics с запуском своего первого мобильного устройства c гибким экраном Galaxy Fold объявляет о готовности нового интерфейса для гнущихся экранов, который был создан вместе с партнёрами и сообществом Android-разработчиков по всему миру. Разработка ПО для Galaxy Fold на уровне инфраструктуры началась в апреле 2018 года. В рамках этого процесса Samsung представил обновлённый интерфейс и тесно сотрудничал с Google, чтобы обеспечить интегрированную поддержку ОС Android на устройстве. Сотни приложений были оптимизированы для Galaxy Fold, включая такие сервисы от ключевых партнёров как Amazon Prime Video, App in the Air, Facebook, iHeartMedia, Microsoft, Spotify, Twitter, VSCO и многие другие.
«Мы не просто разработали новое аппаратное обеспечение, но также сотрудничали с крупными партнёрами, чтобы представить оптимальный мобильный интерфейс и создать экосистему с доступом к лучшим приложениям и сервисам, – отметил Ый-Сок Чхон (E.S. Chung), исполнительный вице-президент и глава направления ПО и искусственного интеллекта подразделения мобильных коммуникаций Samsung Electronics. – Это программная инновация, которая включает как иммерсивный интерфейс, так и новый взгляд на опыт использования для обеспечения непрерывного взаимодействия с устройством».
После премьеры дисплея Infinity Flex на конференции SDC 2018 Samsung и Google открыли тестовые лаборатории в городах по всему миру, от Сеула до Маунтин-Вью и Пекина, где партнёры и производители софта могут тестировать работу своих приложений и сервисов, оптимизированных для Galaxy Fold и экосистемы Android. Наряду с этим Google внесла изменения в Android 10, включая улучшенную работу системы при изменяющемся размере экрана, расширенную функциональность и обновлённый эмулятор Android. Это способствует плавному переключению между несколькими дисплеями и открывает дверь для оптимизации работы складных устройств в будущем. Ряд известных и любимых пользователями Android-приложений также был обновлён, чтобы обеспечить яркие впечатления от работы с ними на складном Galaxy Fold.
«Вместе с нашими партнёрами по экосистеме, такими как Samsung, мы можем предоставить потребителям совершенно новый способ использования смартфонов. Нам было приятно сотрудничать с командой Samsung и сообществом Android-разработчиков, чтобы владельцы Galaxy Fold получили наилучшие впечатления от работы со своими любимыми приложениями и сервисами», – прокомментировал Сагар Камдар, директор по управлению продуктами Android в Google.
«Мы очень воодушевлены работой с Samsung, чтобы подписчики Prime могли наслаждаться любимыми телешоу, фильмами и живыми спортивными трансляциями на Galaxy Fold, – прокомментировал Ба Винстон (BA Winston), глава международных подразделений Digital Video Playback и Technology в Amazon Prime Video. – Оптимизировав приложение Prime Video для Galaxy Fold мы дарим нашим абонентам новый опыт использования контента Amazon Originals, например, сериалов “Джек Райан” или “Удивительная миссис Мейзел”, с функциями Multi Window и Multi Resume».
«Приложение App in the Air делает процесс организации путешествия простым и эффективным, и благодаря партнёрству с Samsung Galaxy Fold мы демонстрируем нашу приверженность к расширению этой технологии через современные платформы, взаимодействуя с нашей общей аудиторией инноваторов, криэйтеров и предпринимателей, – поделился впечатлениями о сотрудничестве Байрам Аннаков (Bayram Annakov), генеральный директор App in the Air. – Наша коллаборация c Samsung позволяет выстраивать расширенную экосистему сервисов для наших преданных пользователей, и мы с нетерпением хотим начать партнёрство с таким уважаемым брэндом».
«Мы рады расширению нашего давнего сотрудничества с Samsung, поддерживая их работу по развитию инновационного опыта для потребителей, – сказал Марк Шедроф (Marc Shedroff), вице-президент департамента по развитию в Facebook. – Galaxy Fold имеет потенциал стать родоначальником новой эры дизайна, и будет очень интересно наблюдать за тем, какие сценарии использования складного устройства откроются для людей».
«Как последний пример нашей неизменной приверженности совместным инновациям с Samsung, мы рады быть партнёром по запуску Galaxy Fold, – сказал Мишель Лавен (Michele Laven), президент группы по стратегическому партнёрству в iHeartMedia. – С функцией поддержки нескольких окон пользователи iHeartRadio могут свободно перемещаться между несколькими открытыми приложениями. Это также согласуется с нашей целью обеспечить бесшовное воспроизведение со смартфона ваших любимых радиостанций в прямом эфире, подкастов и музыку по запросу Artist Radio».
«Сервис Office 365 создан, чтобы помочь людям максимально продуктивно использовать своё время независимо от того, где они находятся и какое устройство используют, – прокомментировал Джон Тинтер, корпоративный вице-президент по развитию бизнеса, Microsoft. – Мы рады расширить возможности Office для Samsung Galaxy Fold и помочь людям повысить свою личную производительность».
«Мы гордимся тем, что будем продолжать наше сотрудничество с Samsung, благодаря новому Galaxy Fold, – сказал Стэн Гармарк, вице-президент по продукту Spotify. – Galaxy Fold выводит производительность мобильных устройств на новый уровень и предлагает более удобный способ использования Spotify. Просто откройте предварительно загруженное приложение для подключения и прослушивания через экосистему Samsung. Найти любимые плейлисты Spotify, такие как Discover Weekly, или подкасты, например, Unbothered от Джемеле Хилл, стало ещё проще!»
«Мы рады продолжить сотрудничество с Samsung и расширить возможности Twitter для Samsung Galaxy Fold. С интересом будем наблюдать за тем, как пользователи Twitter взаимодействуют с этим складным устройством, а также за его дальнейшим развитием», – поделился впечатлениями о сотрудничестве Брэнт Хоровиц (Brent Horowitz), вице-президент по глобальному продуктовому партнёрству в Twitter.
«Миссия VSCO состоит в том, чтобы помочь каждому поверить в свой творческий потенциал, а также в создании новых инструментов и пространств для достижения этой цели. Мы рады работать вместе с Samsung и предоставлять более широкие возможности для творческих людей во всем мире», – сказал Брайан Мэйсон, директор по бизнесу VSCO.
Благодаря таким приложениям, как App Continuity и Multi-Active Window, вы можете просматривать страницы в интернете, смотреть видео, общаться и выполнять задачи, легко переключаясь с внешнего экрана на основной 7,3-дюймовый дисплей и запуская несколько приложений одновременно, что полностью изменит ваш способ работать и развлекаться в дороге.
Все приложения и сервисы, перечисленные выше, а также многие другие теперь доступны в экосистеме Android для Galaxy Fold в Google Play Store и Galaxy Store.

Samsung Works with Google, App Partners and Android Developers to Provide a Seamless Foldable Experience on Galaxy Fold

Hundreds of apps available through the Google Play Store and Galaxy Store have been updated to deliver a seamless, foldable experience

Samsung Electronics is unfolding the future with a first-of-its-kind mobile device: the Galaxy Fold. It marks the beginning of a new era in mobile technology, and we’ve been working alongside our partners and the Android developer community to design a new and complete foldable user experience.
Efforts to design this software experience for the Galaxy Fold began at the framework level in April 2018. As part of this process, Samsung developed a whole new UX and collaborated closely with Google to provide integrated OS support from Android.
“We didn’t just build new category-defining hardware, we worked with major partners to design and deliver a brand-new mobile experience and foster an ecosystem that gives users access to the best applications and services,” said ES Chung, EVP and Head of Software and AI, Mobile Communications Business at Samsung Electronics. “This is software innovation that incorporates both an immersive UX and a new UI perspective to provide a seamless experience.”
Since the introduction of the Infinity Flex Display at SDC 2018, Samsung and Google set up test labs in cities across the globe – from Seoul to Mountain View to Beijing – to work with and encourage partners and developers to test and verify that their apps and services are optimized for the Galaxy Fold and the Android ecosystem. Alongside this effort, Google introduced changes in Android 10 to offer improved resizable activity, multi-resume functionality and an updated Android Emulator to help support multiple-display type switching – opening the door to future foldable device optimization. Now, select applications that Android users know and love have been updated to deliver an immersive, foldable experience on the Galaxy Fold.
“Together with ecosystem partners like Samsung, we have the opportunity to deliver an entirely new user experience that could transform the way we use our smartphones. We enjoyed working closely with the Samsung team and the Android developer community to ensure the users of the Galaxy Fold have the best experiences with their favorite apps and services,” said Sagar Kamdar, Director of Product Management for Android at Google.
Hundreds of apps have been optimized for the Galaxy Fold, including services from leading partners like Amazon Prime Video, App in the Air, Facebook, iHeartMedia, Microsoft, Spotify, Twitter, VSCO and more.
“We are excited to work with Samsung to bring Prime members their favorite shows, movies and live sports on the Galaxy Fold,” said BA Winston, Global Head of Digital Video Playback and Technology at Amazon Prime Video. “Bringing the Prime Video app to the Galaxy Fold will give customers a new way to experience Amazon Originals like Tom Clancy’s Jack Ryan and The Marvelous Mrs. Maisel with Multi Window and Multi Resume.”
“App in the Air makes the travel process seamless and efficient, and by partnering with the Samsung Galaxy Fold we are demonstrating our commitment to expanding this technology through cutting-edge mediums, reaching our shared audiences of innovators, creators, and entrepreneurs,” said Bayram Annakov, CEO, App in the Air. “Our collaboration with Samsung is helping to build a more expansive ecosystem of services for our dedicated users – and we’re thrilled to begin this partnership with such an esteemed brand.”
“We’re excited to expand our long-standing partnership with Samsung by supporting their work to develop innovative experiences for consumers,” said Marc Shedroff, Vice President, Business Development, Facebook. “The new Samsung Galaxy Fold has the potential to usher in a new era of design, and it will be exciting to see what new use cases a foldable experience will unlock for users.”
“As the latest example of our continued commitment to joint-innovation with Samsung, we are excited to be a Galaxy Fold launch partner,” said Michele Laven, President of Strategic Partnerships Group for iHeartMedia. “With the multi-active window feature, iHeartRadio users will now be able to seamlessly navigate through their listening experience without having to ever switch between apps. This also aligns with our goal of providing a frictionless audio playback experience for your favorite live radio stations, podcasts and custom Artist Radio stations.”
“Office 365 is built to help people maximize their time while creating their best work – no matter where they are or which device they’re using,” said Jon Tinter, CVP of Business Development, Microsoft. “We’re excited to extend the Office experience to the Samsung Galaxy Fold, and help people transform their personal productivity.”
“We are proud to continue our Samsung partnership with the new Galaxy Fold,” said Sten Garmark, VP of Consumer Products, Spotify. “The Fold will take mobile productivity to new heights and enable a more seamless Spotify listening experience for our users. Simply open the preloaded Spotify app to connect and listen across the Samsung ecosystem. Finding your favorite Spotify playlist favorites like Discover Weekly, or Podcasts such as Jemele Hill’s Unbothered, just got even easier!”
“We are excited to continue our partnership with Samsung and expand the Twitter experience to the Samsung Galaxy Fold. We are looking forward to seeing how people on Twitter engage with this foldable experience and its evolution over time,” said Brent Horowitz, Vice President, Global Product Partnerships at Twitter.
“Our mission at VSCO is to help everyone fall in love with their own creativity, and to build tools and spaces to help achieve this. We’re excited to continue our collaboration with Samsung to build deeper, more expansive experiences for creators everywhere,” said Bryan Mason, Chief Business Officer at VSCO.
With features like seamless App Continuity and Multi-Active Window, you can browse, watch, connect and multitask like never before. With Galaxy Fold, you can switch seamlessly from the cover display to the main display and you can run multiple apps simultaneously, on the Galaxy Fold’s 7.3-inch main display, revolutionizing the way you work and play on the go.
These top applications and services and many more are now available in the Android ecosystem for the Galaxy Fold in the Google Play Store and Galaxy Store.

воскресенье, 12 мая 2019 г.

На TIZEN-устройствах Samsung можно будет запускать голосовой помощник от Google








Известно, что Samsung начал разработку собственного интеллектуального помощника Bixby гораздо позже, чем главные конкуренты в лице Google, Amazon  и Apple. А поскольку чудес не бывает, то вряд ли стоило ожидать, что Bixby удастся сравняться с Google Assistant и Alexa в кратчайший период. Именно поэтому на смарт-акустику производства HARMAN (дочернее подразделение Samsung Electronics) устанавливаются, в первую очередь, американские решения. Кроме того, Samsung допускает запуск голосового ассистента Google на своих Android-смартфонах наряду с Bixby.
Очевидно, что конечной целью южнокорейского техногиганта остаётся доведение собственного интеллектуального помощника до совершенства, чтобы он мог свободно общаться с людьми на разных языках, без запинки отвечать на поставленные вопросы и выполнять команды, связанные с управлением "умным домом". Но поскольку Bixby ещё не говорит на всех распространённых языках мира, в Samsung идут на компромисс с главными конкурентами, инсталлируя их решения в свои девайсы.
Так, например, задержка выхода высококлассной смарт-колонки Galaxy Home, по мнению экспертов, связана с тем, что в корпорации решили не повторять провальный старт акустической системы HomePod от Apple, где камнем преткновения стала "туповатая" Siri. Мало кому захотелось раскошелиться на довольно значительную сумму в несколько сотен долларов лишь ради того, чтобы прослушивать музыку. На рынке достаточно аналогичных предложений за гораздо меньшие деньги. Даже фанаты Apple не нашли в Siri никаких особенностей, которые могли бы выделить её на фоне продуктов Google и Amazon, решив воздержаться от покупки.
Samsung, который выходит на рынок с подобным продуктом позже основных соперников, желает избежать фальстарта. Эксперты полагают, что в настоящее время там работают либо над радикальным улучшением Bixby, либо решают вопрос о возможности инсталляции продукта от Google. Но поскольку почти вся техника Samsung работает на собственной операционной платформе TIZEN, требуется некоторое время, чтобы "пересадить" Google Assistant на эту ОС.
Одновременно поступили сведения, что смарт-часы последних поколений, где также используется TIZEN, в скором времени получат приложение GAssist, которое будет запускать Google Assistant, если кого-то вдруг не устроят возможности Bixby. Бэта-тестирование приложения GAssist уже началось.
А что касается выхода смарт-колонки Galaxy Home, которая должна была появиться в апреле, то в Samsung обещают её появление "в скором времени". 

Samsung's TIZEN devices will be able to launch Google's voice assistant

Samsung’s Galaxy Home smart speaker has missed its April launch date. The company, however, says that the device will still ship in the first half of the year but hasn’t offered any explanation for the delay.
First announced way back in August during the launch of the Samsung Galaxy Note 9, the Samsung Galaxy Home was supposed to ship in April. However, we are now nearly into the middle of May and the device is mysteriously nowhere to be seen. Speaking to The Verge, the Korean giant didn’t offer any reason for the delay but said that it would still ship in the first half of 2019.
The Galaxy Home is targeted at Apple’s high-end HomePod and is styled accordingly. It also has its audio tuned by Samsung acquisitions AKG and Harmon, so it should offer excellent sound. The weak point, however, as with Apple’ Siri-powered HomePod will undoubtedly be its Bixby voice recognition. It is probable that this will be the main reason for the hold up as Samsung knows that this will be one of the first things reviewers will be targeting in their reviews.
Samsung, could, however compensate for Bixby’s obvious weaknesses by giving users the option to use Google’s Assistant. It wouldn’t surprise to see the Galaxy Home launch with Google Assistant as this would undoubtedly boost its utility and negate potential criticism for the device. That said, Google Assistant would need to be tailored to run on Samsung’s homegrown TIZEN OS, which powers the Galaxy Home, not Android.
At the same time, information was received that the latest generation of smart watches, which also uses TIZEN, may soon receive the GAssist application, which will also launch Google Assistant if the device owner is not satisfied with Bixby's capabilities. GAssist beta testing has already begun.

суббота, 6 октября 2018 г.

Как весь мир оказался под шпионским колпаком Китая





А Балда ему с укоризной: "Не гонялся бы ты, поп, за дешевизной!"
(Финальная строка "Сказки о попе и его работнике Балде")

Авторитетное издание Bloomberg опубликовало отчёт, согласно которому Китай шпионил примерно за 30 американскими компаниями, включая Apple, Amazon, и несколькими государственными агентствами. Журналисты ссылаются на данные 17 анонимных источников из разных организаций. Слежка велась с помощью миниатюрных чипов, установленных на платы для серверов.
Как сообщается, аппаратная "закладка" была разработана инженерами Китайской народно-освободительной армии. Это микрочипы, по размерам соизмеримые с острым кончиком карандаша. Некоторые микросхемы были выполнены таким образом, чтобы они выглядели как сигнальные контакты. Образцы включали память, возможность передачи данных и достаточную вычислительную мощность для взлома. Чипы тайно устанавливались на продукцию компании Supermicro, которая контролируется этническими китайцами. Supermicro, расположенная в районе калифорнийского города Сан-Хосе, является одним из крупнейших в мире поставщиков серверных материнских плат. Последние использовались для создания серверов многих американских компаний.
Как только сервер устанавливали и включали, микрочип вносил изменения в ядро операционной системы, чтобы та не обнаружила шпионское оборудование. При необходимости хакеры могли посылать на чипы различные команды, чтобы считывать проходящую информацию или манипулировать ею.
В ответ на публикацию Apple и Amazon поспешили заявить, что в их оборудовании якобы не было выявлено никаких шпионских чипов, хотя источники Bloomberg утверждают обратное. Ещё в 2015-м году обе компании "задним числом" обнаружили наличие китайской аппаратной закладки, но предпочли не предавать это дело огласке, а просто по-тихому растрогли контракты с Supermicro и сообщили о "находке" соответствующим ведомствам.
Ввиду щекотливости ситуации американским властям также было невыгодно раздувать скандал, иначе акции ведущих мэйджоров могли бы катастрофически обвалиться. Тем не менее проблема никуда не исчезла, и как говорят специалисты, Китай продолжает совершенствовать шпионское оборудование, пользуясь своим монопольным положением единственного производителя многих электронных девайсов, которые продаются по всему миру.
Приглашённый эксперт блога Samsung World Николай Изнов уже давно предупреждал об опасности фактической передачи на откуп Китаю мировой электронной промышленности, однако жадность тех же американских корпораций типа Apple не знает пределов. В погоне за сверхприбылями они готовы заключить сделку с дьяволом, лишь бы "стричь купоны" со своих поделий сомнительного качества.
Что уж говорить о России, которая с готовностью отдалась Китаю в добровольное технологическое рабство. Практически все мобильные операторы связи в РФ используют китайское оборудование и планируют закупку техники следующего поколения 5G. Надо быть полнейшими безумцами, чтобы не понимать, какие катастрофические последствия может иметь нынешняя кремлёвская политика "братской дружбы" с Пекином.
"Поймите, что в случае даже частичного проникновения китайской электроники в военную сферу, ваши оборонительные системы (в том числе ядерные) могут быть просто-напросто парализованы. Судя по тому, какими эпическими провалами "отметились" в последнее время товарищи-кибершпионы из бывшей ГРУ, пойманные с поличным в Голландии и ряде других стран, надеяться на присутствие в военном ведомстве адекватных людей уже не приходится. Они там больше всего озабочены "духовными скрепами" и строительством гигантских храмов вместо построения конкурентной электронной промышленности.", - отметил эксперт.     
В связи с вышесказанным становится очевидно, что лишь такие производители как Samsung, чья "прописка" не относится к странам, претендующим на глобальное доминирование, могут быть по-настоящему заинтересованы в производстве "чистой" электроники, без каких-либо закладок. Это надо помнить всем, кто зарится на дешёвые китайские посулы.

p.s. В США и Европе прокитайское лобби уже начало активную кампанию по "отбеливанию" уличённых в шпионаже производителей типа Huawei, ZTE и т.д.
С помощью проплаченных youtube-блогеров и просто дураков-добровольцев, помешанных на всём китайском, выводы специалистов подвергаются сомнению или вообще отбрасываются напрочь. Что ж, это лишь означает, что кому-то действительно очень сильно надавили на больную мозоль...  

Ниже мы приводим полный оригинальный текст статьи в Bloomberg, которую желающие могут прочитать с помощью Google-переводчика (если не владеют английским). 

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies (Bloomberg)

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA.
To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.
Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.
During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China.
This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.

“Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow”

There are two ways for spies to alter the guts of computer equipment. One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.
One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs. Still, to actually accomplish a seeding attack would mean developing a deep understanding of a product’s design, manipulating components at the factory, and ensuring that the doctored devices made it through the global logistics chain to the desired location—a feat akin to throwing a stick in the Yangtze River upstream from Shanghai and ensuring that it washes ashore in Seattle. “Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a hardware hacker and the founder of Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s almost treated like black magic.”
But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies.
One official says investigators found that it eventually affected almost 30 companies, including a major bank, government contractors, and the world’s most valuable company, Apple Inc. Apple was an important Supermicro customer and had planned to order more than 30,000 of its servers in two years for a new global network of data centers. Three senior insiders at Apple say that in the summer of 2015, it, too, found malicious chips on Supermicro motherboards. Apple severed ties with Supermicro the following year, for what it described as unrelated reasons.
In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting. “It’s untrue that AWS knew about a supply chain compromise, an issue with malicious chips, or hardware modifications when acquiring Elemental,” Amazon wrote. “On this we can be very clear: Apple has never found malicious chips, ‘hardware manipulations’ or vulnerabilities purposely planted in any server,” Apple wrote. “We remain unaware of any such investigation,” wrote a spokesman for Supermicro, Perry Hayes. The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.
The companies’ denials are countered by six current and former senior national security officials, who—in conversations that began during the Obama administration and continued under the Trump administration—detailed the discovery of the chips and the government’s investigation. One of those officials and two people inside AWS provided extensive information on how the attack played out at Elemental and Amazon; the official and one of the insiders also described Amazon’s cooperation with the government investigation. In addition to the three Apple insiders, four of the six U.S. officials confirmed that Apple was a victim. In all, 17 people confirmed the manipulation of Supermicro’s hardware and other elements of the attacks. The sources were granted anonymity because of the sensitive, and in some cases classified, nature of the information.
One government official says China’s goal was long-term access to high-value corporate secrets and sensitive government networks. No consumer data is known to have been stolen.
The ramifications of the attack continue to play out. The Trump administration has made computer and networking hardware, including motherboards, a focus of its latest round of trade sanctions against China, and White House officials have made it clear they think companies will begin shifting their supply chains to other countries as a result. Such a shift might assuage officials who have been warning for years about the security of the supply chain—even though they’ve never disclosed a major reason for their concerns.

How the Hack Worked, According to U.S. Officials

① A Chinese military unit designed and manufactured microchips as small as
a sharpened pencil tip. Some of the chips were built to look like signal conditioning couplers, and they incorporated memory, networking capability, and sufficient processing power for an attack.
② The microchips were inserted at Chinese factories that supplied Supermicro, one of the world’s biggest sellers of server motherboards.
③ The compromised motherboards were built into servers assembled by Supermicro.
④ The sabotaged servers made their way inside data centers operated by dozens of companies.
⑤ When a server was installed and switched on, the microchip altered the operating system’s core so it could accept modifications. The chip could also contact computers controlled by the attackers in search of further instructions and code.

Back in 2006, three engineers in Oregon had a clever idea. Demand for mobile video was about to explode, and they predicted that broadcasters would be desperate to transform programs designed to fit TV screens into the various formats needed for viewing on smartphones, laptops, and other devices. To meet the anticipated demand, the engineers started Elemental Technologies, assembling what one former adviser to the company calls a genius team to write code that would adapt the superfast graphics chips being produced for high-end video-gaming machines. The resulting software dramatically reduced the time it took to process large video files. Elemental then loaded the software onto custom-built servers emblazoned with its leprechaun-green logos.
Elemental servers sold for as much as $100,000 each, at profit margins of as high as 70 percent, according to a former adviser to the company. Two of Elemental’s biggest early clients were the Mormon church, which used the technology to beam sermons to congregations around the world, and the adult film industry, which did not.
Elemental also started working with American spy agencies. In 2009 the company announced a development partnership with In-Q-Tel Inc., the CIA’s investment arm, a deal that paved the way for Elemental servers to be used in national security missions across the U.S. government. Public documents, including the company’s own promotional materials, show that the servers have been used inside Department of Defense data centers to process drone and surveillance-camera footage, on Navy warships to transmit feeds of airborne missions, and inside government buildings to enable secure videoconferencing. NASA, both houses of Congress, and the Department of Homeland Security have also been customers. This portfolio made Elemental a target for foreign adversaries.
Supermicro had been an obvious choice to build Elemental’s servers. Headquartered north of San Jose’s airport, up a smoggy stretch of Interstate 880, the company was founded by Charles Liang, a Taiwanese engineer who attended graduate school in Texas and then moved west to start Supermicro with his wife in 1993. Silicon Valley was then embracing outsourcing, forging a pathway from Taiwanese, and later Chinese, factories to American consumers, and Liang added a comforting advantage: Supermicro’s motherboards would be engineered mostly in San Jose, close to the company’s biggest clients, even if the products were manufactured overseas.
Today, Supermicro sells more server motherboards than almost anyone else. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems. Its motherboards can be found in made-to-order server setups at banks, hedge funds, cloud computing providers, and web-hosting services, among other places. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China.
The company’s pitch to customers hinges on unmatched customization, made possible by hundreds of full-time engineers and a catalog encompassing more than 600 designs. The majority of its workforce in San Jose is Taiwanese or Chinese, and Mandarin is the preferred language, with hanzi filling the whiteboards, according to six former employees. Chinese pastries are delivered every week, and many routine calls are done twice, once for English-only workers and again in Mandarin. The latter are more productive, according to people who’ve been on both. These overseas ties, especially the widespread use of Mandarin, would have made it easier for China to gain an understanding of Supermicro’s operations and potentially to infiltrate the company. (A U.S. official says the government’s probe is still examining whether spies were planted inside Supermicro or other American companies to aid the attack.)
With more than 900 customers in 100 countries by 2015, Supermicro offered inroads to a bountiful collection of sensitive targets. “Think of Supermicro as the Microsoft of the hardware world,” says a former U.S. intelligence official who’s studied Supermicro and its business model. “Attacking Supermicro motherboards is like attacking Windows. It’s like attacking the whole world.”

The security of the global technology supply chain had been compromised, even if consumers and most companies didn’t know it yet

Well before evidence of the attack surfaced inside the networks of U.S. companies, American intelligence sources were reporting that China’s spies had plans to introduce malicious microchips into the supply chain. The sources weren’t specific, according to a person familiar with the information they provided, and millions of motherboards are shipped into the U.S. annually. But in the first half of 2014, a different person briefed on high-level discussions says, intelligence officials went to the White House with something more concrete: China’s military was preparing to insert the chips into Supermicro motherboards bound for U.S. companies.
The specificity of the information was remarkable, but so were the challenges it posed. Issuing a broad warning to Supermicro’s customers could have crippled the company, a major American hardware maker, and it wasn’t clear from the intelligence whom the operation was targeting or what its ultimate aims were. Plus, without confirmation that anyone had been attacked, the FBI was limited in how it could respond. The White House requested periodic updates as information came in, the person familiar with the discussions says.
Apple made its discovery of suspicious chips inside Supermicro servers around May 2015, after detecting odd network activity and firmware problems, according to a person familiar with the timeline. Two of the senior Apple insiders say the company reported the incident to the FBI but kept details about what it had detected tightly held, even internally. Government investigators were still chasing clues on their own when Amazon made its discovery and gave them access to sabotaged hardware, according to one U.S. official. This created an invaluable opportunity for intelligence agencies and the FBI—by then running a full investigation led by its cyber- and counterintelligence teams—to see what the chips looked like and how they worked.
The chips on Elemental servers were designed to be as inconspicuous as possible, according to one person who saw a detailed report prepared for Amazon by its third-party security contractor, as well as a second person who saw digital photos and X-ray images of the chips incorporated into a later report prepared by Amazon’s security team. Gray or off-white in color, they looked more like signal conditioning couplers, another common motherboard component, than microchips, and so they were unlikely to be detectable without specialized equipment. Depending on the board model, the chips varied slightly in size, suggesting that the attackers had supplied different factories with different batches.
Officials familiar with the investigation say the primary role of implants such as these is to open doors that other attackers can go through. “Hardware attacks are about access,” as one former senior official puts it. In simplified terms, the implants on Supermicro hardware manipulated the core operating instructions that tell the server what to do as data move across a motherboard, two people familiar with the chips’ operation say. This happened at a crucial moment, as small bits of the operating system were being stored in the board’s temporary memory en route to the server’s central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.
Since the implants were small, the amount of code they contained was small as well. But they were capable of doing two very important things: telling the device to communicate with one of several anonymous computers elsewhere on the internet that were loaded with more complex code; and preparing the device’s operating system to accept this new code. The illicit chips could do all this because they were connected to the baseboard management controller, a kind of superchip that administrators use to remotely log in to problematic servers, giving them access to the most sensitive code even on machines that have crashed or are turned off.
This system could let the attackers alter how the device functioned, line by line, however they wanted, leaving no one the wiser. To understand the power that would give them, take this hypothetical example: Somewhere in the Linux operating system, which runs in many servers, is code that authorizes a user by verifying a typed password against a stored encrypted one. An implanted chip can alter part of that code so the server won’t check for a password—and presto! A secure machine is open to any and all users. A chip can also steal encryption keys for secure communications, block security updates that would neutralize the attack, and open up new pathways to the internet. Should some anomaly be noticed, it would likely be cast as an unexplained oddity. “The hardware opens whatever door it wants,” says Joe FitzPatrick, founder of Hardware Security Resources LLC, a company that trains cybersecurity professionals in hardware hacking techniques.
U.S. officials had caught China experimenting with hardware tampering before, but they’d never seen anything of this scale and ambition. The security of the global technology supply chain had been compromised, even if consumers and most companies didn’t know it yet. What remained for investigators to learn was how the attackers had so thoroughly infiltrated Supermicro’s production process—and how many doors they’d opened into American targets.
Unlike software-based hacks, hardware manipulation creates a real-world trail. Components leave a wake of shipping manifests and invoices. Boards have serial numbers that trace to specific factories. To track the corrupted chips to their source, U.S. intelligence agencies began following Supermicro’s serpentine supply chain in reverse, a person briefed on evidence gathered during the probe says.
As recently as 2016, according to DigiTimes, a news site specializing in supply chain research, Supermicro had three primary manufacturers constructing its motherboards, two headquartered in Taiwan and one in Shanghai. When such suppliers are choked with big orders, they sometimes parcel out work to subcontractors. In order to get further down the trail, U.S. spy agencies drew on the prodigious tools at their disposal. They sifted through communications intercepts, tapped informants in Taiwan and China, even tracked key individuals through their phones, according to the person briefed on evidence gathered during the probe. Eventually, that person says, they traced the malicious chips to four subcontracting factories that had been building Supermicro motherboards for at least two years.
As the agents monitored interactions among Chinese officials, motherboard manufacturers, and middlemen, they glimpsed how the seeding process worked. In some cases, plant managers were approached by people who claimed to represent Supermicro or who held positions suggesting a connection to the government. The middlemen would request changes to the motherboards’ original designs, initially offering bribes in conjunction with their unusual requests. If that didn’t work, they threatened factory managers with inspections that could shut down their plants. Once arrangements were in place, the middlemen would organize delivery of the chips to the factories.
The investigators concluded that this intricate scheme was the work of a People’s Liberation Army unit specializing in hardware attacks, according to two people briefed on its activities. The existence of this group has never been revealed before, but one official says, “We’ve been tracking these guys for longer than we’d like to admit.” The unit is believed to focus on high-priority targets, including advanced commercial technology and the computers of rival militaries. In past attacks, it targeted the designs for high-performance computer chips and computing systems of large U.S. internet providers.
Provided details of Businessweek’s reporting, China’s Ministry of Foreign Affairs sent a statement that said “China is a resolute defender of cybersecurity.” The ministry added that in 2011, China proposed international guarantees on hardware security along with other members of the Shanghai Cooperation Organization, a regional security body. The statement concluded, “We hope parties make less gratuitous accusations and suspicions but conduct more constructive talk and collaboration so that we can work together in building a peaceful, safe, open, cooperative and orderly cyberspace.”
The Supermicro attack was on another order entirely from earlier episodes attributed to the PLA. It threatened to have reached a dizzying array of end users, with some vital ones in the mix. Apple, for its part, has used Supermicro hardware in its data centers sporadically for years, but the relationship intensified after 2013, when Apple acquired a startup called Topsy Labs, which created superfast technology for indexing and searching vast troves of internet content. By 2014, the startup was put to work building small data centers in or near major global cities. This project, known internally as Ledbelly, was designed to make the search function for Apple’s voice assistant, Siri, faster, according to the three senior Apple insiders.
Documents seen by Businessweek show that in 2014, Apple planned to order more than 6,000 Supermicro servers for installation in 17 locations, including Amsterdam, Chicago, Hong Kong, Los Angeles, New York, San Jose, Singapore, and Tokyo, plus 4,000 servers for its existing North Carolina and Oregon data centers. Those orders were supposed to double, to 20,000, by 2015. Ledbelly made Apple an important Supermicro customer at the exact same time the PLA was found to be manipulating the vendor’s hardware.
Project delays and early performance problems meant that around 7,000 Supermicro servers were humming in Apple’s network by the time the company’s security team found the added chips. Because Apple didn’t, according to a U.S. official, provide government investigators with access to its facilities or the tampered hardware, the extent of the attack there remained outside their view.
American investigators eventually figured out who else had been hit. Since the implanted chips were designed to ping anonymous computers on the internet for further instructions, operatives could hack those computers to identify others who’d been affected. Although the investigators couldn’t be sure they’d found every victim, a person familiar with the U.S. probe says they ultimately concluded that the number was almost 30 companies.
That left the question of whom to notify and how. U.S. officials had been warning for years that hardware made by two Chinese telecommunications giants, Huawei Corp. and ZTE Corp., was subject to Chinese government manipulation. (Both Huawei and ZTE have said no such tampering has occurred.) But a similar public alert regarding a U.S. company was out of the question. Instead, officials reached out to a small number of important Supermicro customers. One executive of a large web-hosting company says the message he took away from the exchange was clear: Supermicro’s hardware couldn’t be trusted. “That’s been the nudge to everyone—get that crap out,” the person says.
Amazon, for its part, began acquisition talks with an Elemental competitor, but according to one person familiar with Amazon’s deliberations, it reversed course in the summer of 2015 after learning that Elemental’s board was nearing a deal with another buyer. Amazon announced its acquisition of Elemental in September 2015, in a transaction whose value one person familiar with the deal places at $350 million. Multiple sources say that Amazon intended to move Elemental’s software to AWS’s cloud, whose chips, motherboards, and servers are typically designed in-house and built by factories that Amazon contracts from directly.
A notable exception was AWS’s data centers inside China, which were filled with Supermicro-built servers, according to two people with knowledge of AWS’s operations there. Mindful of the Elemental findings, Amazon’s security team conducted its own investigation into AWS’s Beijing facilities and found altered motherboards there as well, including more sophisticated designs than they’d previously encountered. In one case, the malicious chips were thin enough that they’d been embedded between the layers of fiberglass onto which the other components were attached, according to one person who saw pictures of the chips. That generation of chips was smaller than a sharpened pencil tip, the person says. (Amazon denies that AWS knew of servers found in China containing malicious chips.)
China has long been known to monitor banks, manufacturers, and ordinary citizens on its own soil, and the main customers of AWS’s China cloud were domestic companies or foreign entities with operations there. Still, the fact that the country appeared to be conducting those operations inside Amazon’s cloud presented the company with a Gordian knot. Its security team determined that it would be difficult to quietly remove the equipment and that, even if they could devise a way, doing so would alert the attackers that the chips had been found, according to a person familiar with the company’s probe. Instead, the team developed a method of monitoring the chips. In the ensuing months, they detected brief check-in communications between the attackers and the sabotaged servers but didn’t see any attempts to remove data. That likely meant either that the attackers were saving the chips for a later operation or that they’d infiltrated other parts of the network before the monitoring began. Neither possibility was reassuring.
When in 2016 the Chinese government was about to pass a new cybersecurity law—seen by many outside the country as a pretext to give authorities wider access to sensitive data—Amazon decided to act, the person familiar with the company’s probe says. In August it transferred operational control of its Beijing data center to its local partner, Beijing Sinnet, a move the companies said was needed to comply with the incoming law. The following November, Amazon sold the entire infrastructure to Beijing Sinnet for about $300 million. The person familiar with Amazon’s probe casts the sale as a choice to “hack off the diseased limb.”
As for Apple, one of the three senior insiders says that in the summer of 2015, a few weeks after it identified the malicious chips, the company started removing all Supermicro servers from its data centers, a process Apple referred to internally as “going to zero.” Every Supermicro server, all 7,000 or so, was replaced in a matter of weeks, the senior insider says. (Apple denies that any servers were removed.) In 2016, Apple informed Supermicro that it was severing their relationship entirely—a decision a spokesman for Apple ascribed in response to Businessweek’s questions to an unrelated and relatively minor security incident.
That August, Supermicro’s CEO, Liang, revealed that the company had lost two major customers. Although he didn’t name them, one was later identified in news reports as Apple. He blamed competition, but his explanation was vague. “When customers asked for lower price, our people did not respond quickly enough,” he said on a conference call with analysts. Hayes, the Supermicro spokesman, says the company has never been notified of the existence of malicious chips on its motherboards by either customers or U.S. law enforcement.
Concurrent with the illicit chips’ discovery in 2015 and the unfolding investigation, Supermicro has been plagued by an accounting problem, which the company characterizes as an issue related to the timing of certain revenue recognition. After missing two deadlines to file quarterly and annual reports required by regulators, Supermicro was delisted from the Nasdaq on Aug. 23 of this year. It marked an extraordinary stumble for a company whose annual revenue had risen sharply in the previous four years, from a reported $1.5 billion in 2014 to a projected $3.2 billion this year.
One Friday in late September 2015, President Barack Obama and Chinese President Xi Jinping appeared together at the White House for an hourlong press conference headlined by a landmark deal on cybersecurity. After months of negotiations, the U.S. had extracted from China a grand promise: It would no longer support the theft by hackers of U.S. intellectual property to benefit Chinese companies. Left out of those pronouncements, according to a person familiar with discussions among senior officials across the U.S. government, was the White House’s deep concern that China was willing to offer this concession because it was already developing far more advanced and surreptitious forms of hacking founded on its near monopoly of the technology supply chain.
In the weeks after the agreement was announced, the U.S. government quietly raised the alarm with several dozen tech executives and investors at a small, invite-only meeting in McLean, Va., organized by the Pentagon. According to someone who was present, Defense Department officials briefed the technologists on a recent attack and asked them to think about creating commercial products that could detect hardware implants. Attendees weren’t told the name of the hardware maker involved, but it was clear to at least some in the room that it was Supermicro, the person says.
The problem under discussion wasn’t just technological. It spoke to decisions made decades ago to send advanced production work to Southeast Asia. In the intervening years, low-cost Chinese manufacturing had come to underpin the business models of many of America’s largest technology companies. Early on, Apple, for instance, made many of its most sophisticated electronics domestically. Then in 1992, it closed a state-of-the-art plant for motherboard and computer assembly in Fremont, Calif., and sent much of that work overseas.
Over the decades, the security of the supply chain became an article of faith despite repeated warnings by Western officials. A belief formed that China was unlikely to jeopardize its position as workshop to the world by letting its spies meddle in its factories. That left the decision about where to build commercial systems resting largely on where capacity was greatest and cheapest. “You end up with a classic Satan’s bargain,” one former U.S. official says. “You can have less supply than you want and guarantee it’s secure, or you can have the supply you need, but there will be risk. Every organization has accepted the second proposition.”
In the three years since the briefing in McLean, no commercially viable way to detect attacks like the one on Supermicro’s motherboards has emerged—or has looked likely to emerge. Few companies have the resources of Apple and Amazon, and it took some luck even for them to spot the problem. “This stuff is at the cutting edge of the cutting edge, and there is no easy technological solution,” one of the people present in McLean says. “You have to invest in things that the world wants. You cannot invest in things that the world is not ready to accept yet.”