doopinglouie@feddit.org to Technology@lemmy.worldEnglish · 2 days agoESP32 Undocumented Bluetooth Commands: Clearing the Air · Developer Portaldeveloper.espressif.comexternal-linkmessage-square6fedilinkarrow-up139arrow-down12cross-posted to: hackernews
arrow-up137arrow-down1external-linkESP32 Undocumented Bluetooth Commands: Clearing the Air · Developer Portaldeveloper.espressif.comdoopinglouie@feddit.org to Technology@lemmy.worldEnglish · 2 days agomessage-square6fedilinkcross-posted to: hackernews
minus-squarepartial_accumen@lemmy.worldlinkfedilinkEnglisharrow-up5arrow-down2·2 days agoIt certainly opens up lost of “evil maid” attacks.
minus-squareNeoNachtwaechter@lemmy.worldlinkfedilinkEnglisharrow-up13·1 day agoAn ESP32 is a powerful thing, but it is also a microcontroller. They are programmable as soon as you have physical access. They are NOT like whole PC’s that you can lock up with passwords etc. More like a gun that you can fire as soon as you have physical access. I wonder where the expectation has come from? People seem to think that it should be different than it is.
minus-squarepelya@lemmy.worldlinkfedilinkEnglisharrow-up5·1 day agoThat’s because the article that started the whole argument tried very hard to present an expected behavior for embedded chips as a security hole.
minus-squareJWBananas@lemmy.worldlinkfedilinkEnglisharrow-up1·1 day agoDoes it? The quoted passage is also in reference to a less commonly used configuration, in which it is basically used as a communications coprocessor.
It certainly opens up lost of “evil maid” attacks.
An ESP32 is a powerful thing, but it is also a microcontroller.
They are programmable as soon as you have physical access. They are NOT like whole PC’s that you can lock up with passwords etc.
More like a gun that you can fire as soon as you have physical access.
I wonder where the expectation has come from? People seem to think that it should be different than it is.
That’s because the article that started the whole argument tried very hard to present an expected behavior for embedded chips as a security hole.
Does it? The quoted passage is also in reference to a less commonly used configuration, in which it is basically used as a communications coprocessor.