A supply chain attack is a cryptographic attack where a product, typically a device that performs encryption or secure transactions, is tampered with during manufacture or while it is still in the supply chain by persons with physical access. The tampering may, for example, install a rootkit or hardware-based spying components.
Read more about Supply Chain Attack: Description
Famous quotes containing the words supply, chain and/or attack:
“Local television shows do not, in general, supply make-up artists. The exception to this is Los Angeles, an unusually generous city in this regard, since they also provide this service for radio appearances.”
—Fran Lebowitz (b. 1950)
“How have I been able to live so long outside Nature without identifying myself with it? Everything lives, moves, everything corresponds; the magnetic rays, emanating either from myself or from others, cross the limitless chain of created things unimpeded; it is a transparent network that covers the world, and its slender threads communicate themselves by degrees to the planets and stars. Captive now upon earth, I commune with the chorus of the stars who share in my joys and sorrows.”
—Gérard De Nerval (18081855)
“I make this direct statement to the American people that there is far less chance of the United States getting into war, if we do all we can now to support the nations defending themselves against attack by the Axis than if we acquiesce in their defeat, submit tamely to an Axis victory, and wait our turn to be the object of attack in another war later on.”
—Franklin D. Roosevelt (18821945)