Proof was found that products manufactured by the Chinese tech giant Huawei have backdoors which allow access to spying. Actually, this is why US Senators banned the company from taking US government projects - it had been claimed that Huawei was a tool of the Chinese military. The only problem was that the backdoors in the Huawei equipment were put there because American spooks wanted to spy on everyone - in other words, the Chinese tech giant was just doing what it was told.

It turned out that if you chose traditional and reliable US companies because of your fear of Chinese intrusion, they would have exactly the same backdoor installed. The researchers presented a snapshot of dozens of “zero-day” exploits used to spy on both American citizens and foreigners. It seems that the National Security Agency is able to use zero-day exploits to track communications passing via the switches and routers of all the world’s largest networking vendors, Dell Cisco, Juniper Networks and Huawei.

It was proved that Dell and HP servers also have a backdoor, and Apple and Samsung devices were not an exception. It looks like the backdoor is in the server hardware systems at the BIOS level.

In the meantime, the reports of the National Security Agency admit that such exploits work across servers running the Microsoft Windows, Linux, FreeBSD and even Sun Solaris operating systems, which may give away the spook's plan - after all, how many terrorists are using Solaris?

The experts confirmed that Dell's best-selling PowerEdge servers (1850, 2850, 1950, 2950) all have a vulnerability which lets the NSA post spyware into the BIOS through either remote access or the inserting of a USB drive.

Similar NSA exploit, so-called GODSURGE, exploits a JTAG debugging interface in the Dell PowerEdge 1950 and 2950, which is normally used to test the BIOS/firmware for bugs. It turned out that it can also be used to reflash the BIOS from scratch.

Finally, HP’s Proliant 380DL G5 server can also be opened with IRONCHEF. The latter can extract information from the server via two-way RF communication.

Moreover, the National Security Agency has also developed an exploit for tapping Apple's iPhone dubbed DROPOUTJEEP and another for Vole's Windows Phone called TOTEGHOSTLY.