Not even burn, give it to the shareholders of the company.You'd burn a massive amount of your own money to spite... someone else?
That would really teach them![]()
Working at Apple is maybe not as cool as you think. Lots of micro controlling, lots of regulations, marketing department has all the power.I thought APPLE pays well to their employees. I'm surprized still ppl leaving the company.
Not what I wrote at all.. . . Interesting, I guess that a some point if someone’s job is fenced out (i.e. an engineer whose work is to do V8’s and can’t work anywhere because of patents, can’t design them, can’t talk them, can’t do anything basically) then that person should be compensated for the time being?
In the video game industry, contracts imply that you can’t work for another video game company until after a year has passed since the last day on a previous one, due to competition and the fact that experience goes straight into the new one.
But this is complete bollocks, “can’t work for a year” is too vague and punishing, so nobody complies and to my understanding it is non enforceable.
except this is a civil suit, until the feds get involved, no one getting prosecuted.The law covers both instances, foreign and domestic.
Does that mean then that the knowledge contained within the engineers head is the property of Apple and it can never be used without Apple's permission?Not what I wrote at all.
I am making the point that proprietary information is not limited to what is written down, and someone who works for a company and throughout that employment they become familiar with proprietary designs and other details of their employers work, will carry that information with them when they change jobs.
That does not mean that they cannot work in the same field, simply that they cannot use information that is proprietary to their previous company in their new job. Take a minute and look up the definition of 'proprietary', it means that such information is owned by their employer. It is not comprehensive to all aspects of work, only those specific details that are unique to the employer and therefore identified as proprietary.
Further, this is a separate point from non-compete clauses that may be present in employment contracts or separation agreements.
Whether or not individuals comply is beside the point. As is whether or not companies chose to enforce these obligations. They are enforceable, it is simply a matter of deciding if pursuing enforcement is worth the time and effort.
Perhaps employees need to stop stealing. there will always been employees who think the grass is greener somewhere else. That is just fine. What's not ok, is fertilizing that grass by stealing from your current/former employer.Perhaps Apple needs to work on retaining talent..
Doesn’t take away or minimize stealing trade secrets though.
Someone pointed out in the thread that someone who’s job title is senior CPU implementor is going to need to be able to program ROMs and FPGAs, so they have elevated privileges due to the nature of their work. Likewise, a lot of corporate PCs generally tightly control the granting of elevated privileges, but developers almost always need those privileges. Developers, engineers, and IT personnel pose some of the highest insider risk of any employees, certainly they’re the riskiest and most privileged employees outside of people with President or Chief in their job titles.The PCs of the engineering company I am working for don’t even allow you to use a USB drive so I’m kind of surprised Apple allows this.
Knowledge of another firm’s processes contained in an employee’s head can still be proprietary. If I, as a contractor, use knowledge of internal systems obtained from my current contract in a future contract with a different firm, that’s still considered an inappropriate use of internal information, especially if it allows the second firm to compete with the first or to competitively bid for the first’s business. It’s very similar to regulations concerning insider trading and the public/private sides of the information wall in trading systems.Does that mean then that the knowledge contained within the engineers head is the property of Apple and it can never be used without Apple's permission?
Those employees if proven are going to go to jail for a long time. Apple will make sure they end up in a Russian prison at this rate
Also Apple is being reasonable , they are not asking the company to be shut down , they are asking for royalties for using its tech
Hope the sons of bitches go to jail if they are guilty.
Apple has levied a lawsuit against RISC-V startup Rivos, a company that has hired several former high-ranking engineers from Apple. Rivos describes itself as a "startup in stealth mode," and according to Apple, Rivos not only poached Apple employees, but also stole chip trade secrets.
![]()
As noted by Reuters, the lawsuit that was filed last Friday accuses Rivos of hiring more than 40 former Apple employees over the course of the past year to work on system-on-chip (SoC) technology that competes with Apple's own A-series and M-series chips.
Apple claims that at least two former engineers (Bhasi Kaithamana and Wen Shih-Chieh, aka "Ricky") took "gigabytes of sensitive SoC specifications and design files" during their last few days working at Apple. Rivos is accused of launching a "coordinated campaign" to target employees with information about Apple's SoC designs.The employees who stole information allegedly used USB drives and AirDrop to offload sensitive Apple material to their own personal devices, as well as stealing presentations on unreleased SoCs and saving it to their cloud accounts. Apple believes that Rivos communicated with some employees through encrypted messaging apps, and the former Apple workers who participated in the theft of information attempted to wipe their Apple devices to try to cover their tracks.
In the lawsuit, Apple said that it had no choice but to sue because of the volume of information taken, the nature of the information stolen, and that the employees are "now performing the same duties for a competitor with ongoing access to some of Apple's most valuable trade secrets."
Kaithamana, one of the specific employees accused of data theft, allegedly copied thousands of Apple documents containing "proprietary and trade secret information" over the course of a week in August 2021. He copied the files on his work computer before transferring them to a USB drive, and Apple's lawsuit goes into detail about the specific data that he collected.
Wen, a second employee that allegedly stole info, transferred 390 gigabytes of data from his Apple-issued computer to a personal hard drive just before departing the company. Apple says that he stole information on both current and unreleased SoCs, accessing proprietary data just before the file transfer.
Other Apple employees not specifically named in the lawsuit also connected external hard drives to their Apple-issued computers shortly after being hired by Rivos, and at the same time, were accessing Apple trade secret information about SoC designs.
Apple is asking for an injunction against the employees who joined Rivos to prevent them from continuing to leak sensitive data, compensation for the loss caused by trade secret misappropriation, and additional damages for "unjust enrichment" Rivos gained from Apple's data. In lieu of damages, Apple is asking for "a reasonable royalty rate" from Rivos. Apple has requested a jury trial, so we are likely to hear more from the Apple v. Rivos dispute going forward.
For those interested, the full lawsuit can be read over on Scribd.
Article Link: Apple Sues SoC Startup Rivos for Poaching Employees and Stealing Trade Secrets
Well, it’s not really specious if the firm solicited its targets to exfiltrate data on Apple chip designs. And it’s not exactly useless info just because one is ARM and the other RISC-V. Apple has some of the most performant (especially per watt, but per gigahertz, as well) general purpose compute cores. Some of that technology would be ARM exclusive, sure, but some of it could no-doubt to applied to RISC-V. (And it’s more likely to be applicable to another RISC architecture like RISC-V than it would be to a CISC architecture like x86*.)
* Well yeah, x86 is moving away from a pure CISC design to a RISC design running a CISC instruction set in microcode, but that’s still far more CISC-y than RISC-V is.
A simulation environment for ARM would be useless for RISC-V.My guess is that Apple have extremely sophisticated simulations of their SoCs. They seem to do an extremely good job of knowing how to size various structures, and being able to rapidly test new micro-architectural ideas. And the simulations seem to cover the entire SoC, given that it's not just the CPU but the whole kit and kaboodle (ISP, VPU, NPU, GPU, memory controller, etc) that all advance in lock-step every year.
These sorts of simulators are
(a) worth their weight in gold
(b) basically impossible to find, rent, buy. You have to build them from scratch. Of course there are academic simulators, but they are limited in scope and performance.
Of course there's much else that could have been taken. But simulators are the best in that you could use them to design better chips without obviously raising any flags about either copyright or patent infringement, as would be the case it you used more obvious IP like the actual SoC designs.
I'm not, because I read the article. Many of the things they describe knowing about would be impossible by design of many of services used, regardless of enterprise environment.You are confusing company-issued products and service environments with privately acquired & operated products and services.
For some aspects of the device, yes. Not when they are using personal Apple services, which they did. Read the article.These are Apple managed devices, at least in terms of the ones used for work. There’s no expectation of privacy on a corporate owned and managed device. (Firms will have specific policies that detail how data is gathered and what it is used for, I just had to do training on my employer’s last week. But generally, if you do something on a work computer, your employer probably will be able to tell.)
I did read the article. It says something about “personal cloud accounts”, but “personal cloud accounts” doesn’t necessarily mean iCloud. It could mean Dropbox, OneDrive, Box, etc. Besides, while iMessage is end to end encrypted, I don’t believe iCloud storage is. (Relevant link to an Apple knowledge base article:For some aspects of the device, yes. Not when they are using personal Apple services, which they did. Read the article.
Re: implementation, it kinda looks like the data gathering was a bit scattershot, the former employees grabbed a lot of different information of different sorts. There may have well been details of future architectural ideas in the stolen information. Furthermore, from a corporate perspective, the differences in architecture are immaterial. If it were Intel apparently soliciting information about Apple’s upcoming roadmap (or proprietary information about its chips), it would still be a competitor receiving a wealth of proprietary information about Apple’s custom processors. (Additionally, Apple’s Mx and Ax series chips include far more than just ARM compute cores. GPU, media acceleration, neural network acceleration, the Secure Enclave, details of its approach to asymmetrical processors. Some of that information would no doubt be applicable or at least transferable to non-ARM architectures.)A simulation environment for ARM would be useless for RISC-V.
Also if it's a performance simulator it's going to be very ARM specific.
If It's simulating the actual architecture then the simulator is going to be off the shelf Synopsys, Cadence, etc. The environment and testbench code would not be portable and neither would the tests or instrumentation.
RISC-V is so different than ARM both at an architectural level and system level implementation.
If they did steal all the information claimed, most of it would be useless. Architectural ideas would be more valuable. More of have you thought about this implementation vs that?