However, the company asked its consultants to determine its supply chain risk. They reported that the company had two key vulnerabilities: access to Google’s Android operating system, the core software on which all non-Apple smartphones run, and the supply of the semiconductors that every smartphone requires.

