I'm Guessing Ian did do more than, Just a background skim. It wasn't until David hit Ido Li On with the last question they realized the game was up.
The silence from CTS-Labs has been deafening ever since, even the requests from Ian with extra questions has resulted in no answer.
DK: I think the biggest question that I still have is that ultimately who originated this request for analysis – who was the customer that kicked this all off?
ILO: I definitely am not going to comment on our customers.
DK: What about the flavor of customer: is it a semiconductor company, is it someone in the industry, or is it someone outside the industry? I don’t expect you to disclose the name but the genre seems quite reasonable.
ILO: Guys I’m sorry we’re really going to need to jump off this call but feel free to follow up with any more questions.
[End of Call]
This call took place at 1:30pm ET on 3/14. After the call, we sent a series of 15 questions to CTS-Labs at 6:52pm ET on the same day. As of 7:10pm ET on 3/15, we have not had a response. These questions included elements related to
- The use of a PR firm which is non-standard practice for this (and the PR firm were not involved in any way in our call, which is also odd),
- Viceroy Research, a company known for shorting stock, and their 25-page blowout report published only three hours after the initial announcement,
- And the 2018 SEC listing of the CFO as the President of NineWells Capital, a hedge fund based in New York, that has interests in equity, corporate debt investments, and emphasis on special situations.
There really is nothing more to see here Rroff and humbug. This is a non story and was designed as a scam from start to finish. CTS-Labs has not replied to Ian's questions...........................they can't because the whole thing was designed as a scam from start to finish. That also explains AMD's silence as well, because they know it's a scam as well.
It is more complicated than this.
They are still only skimming the surface - though its more than most sites seem to have dug into it. Considering all the facts I don't think this was a scam from start to finish even though undeniably it has at the very least been appropriated as such at least by Viceroy, at the moment there isn't enough information to connect the CFO other than circumstantially.
CTS Labs had been trying to project a visage of being a successful company that line of questioning was also dangerously close to piercing that and revealing that they might not even have a customer let alone customers as they were trying to make it appear - what that actually means though I could only guess at and that is assuming someone hasn't put them up to it which is still a possibility though if it is the case IMO its been hijacked after the fact to that end rather than designed from the start that way.
You've got a bunch of what appear to be misfits - all with a fairly common past:
-Claimed and at least to some level demonstrated background in computer security.
-Most of them claim to have co-founded a company
-Dig a bit deeper and they claim to have founded company X with person Y or held a senior position at company X but this is where it gets weird as the trail for that stops around 1-2 years ago - person Y seems to be real and one of the original founders but hit up older cached data or filter out newer results and most of these companies appear to have been co-founded by person Y and person Z where person Z is different to the person at CTS Labs and doesn't seem to exist prior or after the company founding and at best if there is any connection to the person at CTS Labs it is as a more junior position.
-The legitimate co-founder Y of these companies has in most cases an active social media presence going back years and in some cases has retweeted or shared the recent news about this but made no attempt to correct the record as to the status of the person from CTS Labs supposedly connected to them - maybe friends or family?
-Vastly inflated previously employment record but some of it checks out at a more junior level - some of it doesn't check out at all.
Then you have this guy connected to NineWells Capital of which there is little real detail - the site has some backend stuff going on though that appears to be linked to real activity (passworded logins, etc.) - maybe a front for something else? the only one that seems to claim a connection to a company that they appear to actually have founded but even that is a bit murky.
Then you have the PR firm - the weird use of the PR firm fits more than one possibility - it might indicate it was orchestrated from the start or it might not, and it doesn't necessarily narrow down what the goal was if it was orchestrated from the start. It also fits if this originally came out of them finding some vulnerabilities, possibly happened across by chance as they don't seem particularly competent, and going off half-cocked thinking they'd hit the big time.
There is too much bumbling around and attempts to backfill information to convince me this was designed as a scam from the start not to mention that these vulnerabilities aren't entirely conjured up from thin air or a proof of concept that was just something made up as being likely maybe sort of - the proof of concept at least checks out even if the ability to do anything useful with it gets shot down by AMD in the long run. They only needed to "link and run" to carry out a scam of the sort people are talking about and zero, less than zero, reason to engage with someone like Anandtech if it was a scam of that nature - at the most a quick PR piece not a long conversation where they at least, if somewhat incompetently, tried to cover technical information.
I don't buy it explaining AMD's silence either - there is no profit in it for AMD staying silent all the while they stay silent it works against them if it is a scam. Problem is AMD have a habit of staying silent when they should be saying something so that makes it even more murky.