Nvidia recently found itself in a tricky situation as it faced inquiries from China’s Cyberspace Administration after being allowed to resume sales of its H20 chips to China. The issue arose when U.S. Congress proposed installing tracking functions in advanced chips, raising concerns over national security for China.
A spokesperson for Nvidia firmly stated that their chips don’t have hidden access points, saying, “Nvidia does not have ‘backdoors’ in our chips that would give anyone a remote way to access or control them.”
In a recent blog post titled “No Backdoors, No Kill Switches, No Spyware,” Nvidia argued that adding such controls could actually be a boon for hackers and malicious actors, introducing vulnerabilities and posing risks to U.S. economic and national security. The post creatively likened the proposal to buying a car with a dealership-controlled parking brake, suggesting it was unnecessary and potentially harmful.
Nvidia also highlighted the lessons learned from the failed Clipper Chip initiative in the 1990s, which aimed for government access to hardware but instead compromised security and user trust.
The company rejected comparisons to smartphone features like “remote wipe,” emphasizing that these are user-controlled software options, not inherent hardware vulnerabilities. Nvidia concluded by asserting a strong stance against weakening critical infrastructure, stating unequivocally, “There are no back doors in Nvidia chips. No kill switches. No spyware.”
This situation highlights the ongoing tension between technological advancements, national security, and privacy concerns in the global arena.





