Looks like the company did originally call it a backdoor, but have since
re-termed as a "hidden feature".  That youtube showed a screenshot of this
page https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
where the title said backdoor.  The addendum at the bottom says "could
facilitate supply chain attacks, the concealment of backdoors in the
chipset, or the execution of more sophisticated attacks" but i think that
guy on YouTube is right - this is going to be a lot of pain for a lot of
tech teams of esp32-based products to do damage-control and education with
their management and customers.

On Sun, Mar 9, 2025 at 11:30 AM Pete Soper via TriEmbed <
[email protected]> wrote:

> Presumably this is a debunk. If not I can point to something thorough.
> TL;DR they mistook an unpublished SPI for a back door, "they being the
> click jockeys: the actual work never uses the term!
> Pete
> _______________________________________________
> Triangle, NC Embedded Interest Group mailing list
>
> To post message: [email protected]
> List info: http://mail.triembed.org/mailman/listinfo/triembed_triembed.org
> TriEmbed web site: https://TriEmbed.org
> To unsubscribe, click link and send a blank message: mailto:
> [email protected]?subject=unsubscribe
> Searchable email archive available at
> https://www.mail-archive.com/[email protected]/
>
>
_______________________________________________
Triangle, NC Embedded Interest Group mailing list

To post message: [email protected]
List info: http://mail.triembed.org/mailman/listinfo/triembed_triembed.org
TriEmbed web site: https://TriEmbed.org
To unsubscribe, click link and send a blank message: 
mailto:[email protected]?subject=unsubscribe
Searchable email archive available at 
https://www.mail-archive.com/[email protected]/

Reply via email to