• stupidcasey@lemmy.world
    link
    fedilink
    English
    arrow-up
    35
    arrow-down
    1
    ·
    8 hours ago

    Oh, no! Someone is going to get what was world leading technology if it was 8 years ago this might be a problem.

    • Alphane Moon@lemmy.worldOPM
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      2
      ·
      edit-2
      7 hours ago

      Not sure what you are refering to.

      According to The Mercury News, Jinfeng Luo, who started at Intel in 2014, received a termination notice last July 7th, ending his service with the company at the same month.

      • arcterus@piefed.blahaj.zone
        link
        fedilink
        English
        arrow-up
        42
        arrow-down
        1
        ·
        7 hours ago

        They’re saying Intel’s chips suck compared to the competition now, so the data stolen is for technology that is worse than other chips available already (or soon to be available, depending on what was stolen).

  • arcterus@piefed.blahaj.zone
    link
    fedilink
    English
    arrow-up
    18
    ·
    8 hours ago

    Kind of seems like the files aren’t that valuable if they’re only trying to get $250k. Like that’s a large amount of money for most people, but for a big company suing for its IP, that doesn’t sound like that much tbh.

  • Leon@pawb.social
    link
    fedilink
    English
    arrow-up
    63
    ·
    10 hours ago

    Good for them! I hope they won’t get caught.

    More people should rebel and hurt the companies like this. They’re laying people off not because there isn’t work, but because they don’t want to pay. All of the companies doing layoffs are also hiring, only they’ve created a market of desperation so they know they can give workers shitty deals.

    Intel and all the other big corpos deserve this.

    • atmorous@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      7 hours ago

      Everybody laid off needs to make new companies together as well. Good ones not on stock market that are unionized

      • Cavemanfreak@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 hour ago

        In cases like this it’s reaaaally hard to just start up a new competitor from nothing (assets wise). Building up production is not cheap.

      • survirtual@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 hours ago

        They already thought of that possibility and have taken over the legal system to mitigate. Corporate patents & NDAs will have some complaints.

    • Alphane Moon@lemmy.worldOPM
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      edit-2
      1 hour ago

      There can be reverse situations (e.g. opportunistic individual delivering hard earned data from an honest company to American criminal groups) so its not black and white.

      That being said “reap what you sow” can be a fair and just characterisation.

      • Krono@lemmy.today
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 hours ago

        honest company

        You have better odds finding Sasquatch and a unicorn than you do finding an honest publically traded company.

      • spicy pancake@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        34 minutes ago

        my geography’s trash cuz I’m an American moron but I thought China had at least a few tropical beaches

        • Alphane Moon@lemmy.worldOPM
          link
          fedilink
          English
          arrow-up
          11
          ·
          10 hours ago

          Cuba may not have an extradition treaty with the US, but I somehow doubt you can just arrive there, as a relatively well known person of interest and stay there without giving the local thugs a cut.

          I would speculate he is working with the CCP.

          • 𞋴𝛂𝛋𝛆@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            27 minutes ago

            Oh yeah, I’m sure. Cuba just came to mind as a common vacation destination for the Soviet block back in the day. I’m sure there are other places that are both tropical and within the CCP’s influence, though I do not know these offhand.

            That is not how semiconductors work in general, as far as I understand it. All the stories I have heard are of people that love to work for the purpose it brings to their life and are willing and want to work 24/7. Someone like this that takes a bunch of stuff is likely actually taking their own work with them after some corporate shit crushed their life’s work they have spent ages on and raped such a dedicated purpose. They are likely one of a handful of people that actually created all the value in the company but the corporate fuckwit is too stupid to comb through the details to understand the company.

        • Treczoks@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          10 hours ago

          It might be nice, but they don’t have much of a semiconductor industry to sell the files to.

  • Valmond@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    2
    ·
    10 hours ago

    How ho you detect someone stole files nowadays? Did they have them printed out on a bookshelf?

    • fonix232@fedia.io
      link
      fedilink
      arrow-up
      13
      ·
      8 hours ago

      Every single access is logged on such systems, regardless what kind of file hosting you use.

      An employee suddenly accessing tons of files, potentially in indexing order (meaning they’re either clicking through every link, every folder, every file, or are using an automated tool that does exactly the same), now that’s suspicious.

      Combine that with logs from their terminal, which would usually contain things like downloads, file operations, as well as external storage connection/disconnection events, and you can basically get a near perfect map of what they stole and how.

      • Valmond@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        9
        ·
        9 hours ago

        Who logs who reads files? And even if, who checks those logs? Gotta be a wild system.

        • teft@piefed.social
          link
          fedilink
          English
          arrow-up
          6
          ·
          7 hours ago

          Lots of companies maintain access logs. Anything with high security you want to be able to audit who accessed what and when.

            • teft@piefed.social
              link
              fedilink
              English
              arrow-up
              2
              ·
              6 hours ago

              Normally you just have the systems admin or an automated system look into it. It depends on your security setup.

              • Valmond@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                6 hours ago

                Yeah I guess that’s the only sane way to do it. A tiny bit crazy the whole system exists, an automatic verification lights up, but only after the dude left.

                Why did he have access to all that for starters, why wasn’t the alarms ringing when he did it etc. seems like security at Intel is kind of wonky. 🤷🏻‍♀️

                • teft@piefed.social
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  6 hours ago

                  It might just come down to they never experienced the exact type of espionage so didn’t have strong guardrails to prevent this. Hopefully some security engineers learned a lesson from this and will change their processes.

        • a4ng3l@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 hours ago

          Siems and such systems are designed for that. Could be part of SOC or CSIRT. Generally all large companies have that. It’s also getting more accessible to smaller structures in the form of « as a service ». A data leak is a data leak whatever the vector so shit needs to be detected & acted upon. It’s all fun & fair games when about Intel secrets it seems but what when a dickhead steals medical data or other perso stuff ?

        • Cypher@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          6 hours ago

          I check those logs, not for Intel though.

          The systems that support this range from simple to unnecessarily complex.

            • Cypher@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              ·
              5 hours ago

              Yes that’s a small part of my job.

              I setup monitoring systems, ingest logs and create rules to detect unusual or malicious behaviour.

              Then I perform investigations which sometimes turn into forensic investigations, which sometimes results in legal action.

    • Alphane Moon@lemmy.worldOPM
      link
      fedilink
      English
      arrow-up
      2
      ·
      9 hours ago

      Someone downloading full datasets that would rarely happen in the regular course of work (unless there was special projec tor some sort).