You are witnessing an attempt to murky the waters. All one needs to do is compare any existing disk images and verifiably attribute them to a source.
I would like to see a credible claim that there was ever more than one. While it is true that Chinese agents will opportunistically slurp or steal devices for commercial purposes, there is no good evidence that I have seen that this has happened in this case.
You are witnessing an attempt to murky the waters. All one needs to do is compare any existing disk images and verifiably attribute them to a source.
I would like to see a credible claim that there was ever more than one. While it is true that Chinese agents will opportunistically slurp or steal devices for commercial purposes, there is no good evidence that I have seen that this has happened in this case.