Looks like the company did originally call it a backdoor, but have since re-termed as a "hidden feature". That youtube showed a screenshot of this page https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/ where the title said backdoor. The addendum at the bottom says "could facilitate supply chain attacks, the concealment of backdoors in the chipset, or the execution of more sophisticated attacks" but i think that guy on YouTube is right - this is going to be a lot of pain for a lot of tech teams of esp32-based products to do damage-control and education with their management and customers.
On Sun, Mar 9, 2025 at 11:30 AM Pete Soper via TriEmbed < [email protected]> wrote: > Presumably this is a debunk. If not I can point to something thorough. > TL;DR they mistook an unpublished SPI for a back door, "they being the > click jockeys: the actual work never uses the term! > Pete > _______________________________________________ > Triangle, NC Embedded Interest Group mailing list > > To post message: [email protected] > List info: http://mail.triembed.org/mailman/listinfo/triembed_triembed.org > TriEmbed web site: https://TriEmbed.org > To unsubscribe, click link and send a blank message: mailto: > [email protected]?subject=unsubscribe > Searchable email archive available at > https://www.mail-archive.com/[email protected]/ > >
_______________________________________________ Triangle, NC Embedded Interest Group mailing list To post message: [email protected] List info: http://mail.triembed.org/mailman/listinfo/triembed_triembed.org TriEmbed web site: https://TriEmbed.org To unsubscribe, click link and send a blank message: mailto:[email protected]?subject=unsubscribe Searchable email archive available at https://www.mail-archive.com/[email protected]/
