Posted on Jan 5, 2018
Intel CEO sold all the stock he could after Intel learned of security bug
1.48K
6
8
3
3
0
Posted 7 y ago
Responses: 4
All very interesting, but if the following part of the report is accurate, then it would appear to be completely on the up and up.
"While an Intel spokesman told CBS Marketwatch reporter Jeremey Owens that the trades were "unrelated" to the security revelations, and Intel financial filings showed that the stock sales were previously scheduled, Krzanich scheduled those sales on October 30. That's a full five months after researchers informed Intel of the vulnerabilities. And Intel has offered no further explanation of why Krzanich abruptly sold off all the stock he was permitted to."
The problem with the assumption that appears to be made within the article and story is that it may appear to be insider trading; the problem with that is that the information 5 months previously came from outside the company and not internally. And it is no coincidence, other people not just Mr. Krzanich had the opportunity to sell also, and for the same reason. It is a pretty bold move by the ars TECHNICA writer to make that claim when in another directly related article in ars TECHNICA, it plainly states the following: "The flaws have been named Meltdown and Spectre. Meltdown was independently discovered by three groups - researchers from the Technical University of Graz in Austria, German security firm Cerberus Security, and Google's Project Zero. Spectre was discovered independently by Project Zero and independent researcher Paul Kocher."
It is also interesting to note that a partial fix has been released in the form of security patches for Windows, Linux and macOS. "This is more than a little notable; it has been clear that Microsoft and the Linux kernel developers have been informed of some non-public security issue and have been rushing to fix it."
AND it is apparently not only Intel with the problem. It appears that ARM processors may also have an issue surrounding the Meltdown flaw.
"While an Intel spokesman told CBS Marketwatch reporter Jeremey Owens that the trades were "unrelated" to the security revelations, and Intel financial filings showed that the stock sales were previously scheduled, Krzanich scheduled those sales on October 30. That's a full five months after researchers informed Intel of the vulnerabilities. And Intel has offered no further explanation of why Krzanich abruptly sold off all the stock he was permitted to."
The problem with the assumption that appears to be made within the article and story is that it may appear to be insider trading; the problem with that is that the information 5 months previously came from outside the company and not internally. And it is no coincidence, other people not just Mr. Krzanich had the opportunity to sell also, and for the same reason. It is a pretty bold move by the ars TECHNICA writer to make that claim when in another directly related article in ars TECHNICA, it plainly states the following: "The flaws have been named Meltdown and Spectre. Meltdown was independently discovered by three groups - researchers from the Technical University of Graz in Austria, German security firm Cerberus Security, and Google's Project Zero. Spectre was discovered independently by Project Zero and independent researcher Paul Kocher."
It is also interesting to note that a partial fix has been released in the form of security patches for Windows, Linux and macOS. "This is more than a little notable; it has been clear that Microsoft and the Linux kernel developers have been informed of some non-public security issue and have been rushing to fix it."
AND it is apparently not only Intel with the problem. It appears that ARM processors may also have an issue surrounding the Meltdown flaw.
(0)
(0)
SPC Kevin Ford
SSG Robert Webster The salient point is that while the information came from outside of Intel, it wasn't made public until about a week ago. That means that Intel's CEO likely knew about the information, scheduled his stock sell off and then sold potentially based on non-public knowledge. A very few people had any knowledge of this to sell their stock before it became public and the price was "adjusted" by the market.
"The stock sale came after Google had informed Intel of a significant vulnerability in its chips — a flaw that became public only this week.
Intel says the stock sale was unrelated to the vulnerability and came as part of a planned divestiture program. But Krzanich put that stock-sale plan in place in October — several months after Intel was informed of the vulnerability."
http://www.businessinsider.com/intel-ceo-krzanich-sold-shares-after-company-was-informed-of-chip-flaw-2018-1
"The stock sale came after Google had informed Intel of a significant vulnerability in its chips — a flaw that became public only this week.
Intel says the stock sale was unrelated to the vulnerability and came as part of a planned divestiture program. But Krzanich put that stock-sale plan in place in October — several months after Intel was informed of the vulnerability."
http://www.businessinsider.com/intel-ceo-krzanich-sold-shares-after-company-was-informed-of-chip-flaw-2018-1
Intel was aware of the chip vulnerability when its CEO sold off $24 million in company stock
Intel CEO Brian Krzanich sold off a major stake in the company in November, months after the chipmaker learned of a significant security flaw in its chips.
(0)
(0)
SSG Robert Webster
SPC Kevin Ford - Interesting, but I believe that the following public blog post predates the stock action. It is even referenced in the Project Zero blog spot posting this January (Jan. 2018). (https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html) What is most interesting in this is that one of the teams that found it to begin with referenced and used someone else's description since it appears to be better than theirs.
I am pretty sure that the date on this is July 28, 2017 (hmmmm - not publicly disclosed until January 2018???). And yes this is separate from the initial reports to Intel in May 2017. This just happens to be the article that was used by the Graz team to create their exploit from according to an article in WIRED magazine. (https://www.wired.com/story/meltdown-spectre-bug-collision-intel-chip-flaw-discovery/)
https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/
I am pretty sure that the date on this is July 28, 2017 (hmmmm - not publicly disclosed until January 2018???). And yes this is separate from the initial reports to Intel in May 2017. This just happens to be the article that was used by the Graz team to create their exploit from according to an article in WIRED magazine. (https://www.wired.com/story/meltdown-spectre-bug-collision-intel-chip-flaw-discovery/)
https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/
News and updates from the Project Zero team at Google
(1)
(0)
Didn't Martha Stewart go to jail for insider trading? A tip from the inside of the company she had stock in or something like that?
(0)
(0)
SSgt Christopher Brose
No, I think Comey got her on lying to the FBI. (And if that doesn't give you deja ju...)
(0)
(0)
Read This Next