Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Technology
  3. The ESP32 "backdoor" that wasn't | Dark Mentor LLC

The ESP32 "backdoor" that wasn't | Dark Mentor LLC

Scheduled Pinned Locked Moved Technology
technology
15 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ? Guest
    This post did not contain any content.
    S This user is from outside of this forum
    S This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #5

    Finally, some technical details that were sorely lacking from yesterday's article.

    Anyway, having direct unprivileged R/W access to platform memory is indeed a security hole, no matter the vendor.

    pelya@lemmy.worldP 1 Reply Last reply
    0
    • darkassassin07@lemmy.caD [email protected]

      Potato, potato....

      Whether we call them 'undocumented commands' or a 'backdoor', the affect is more or less the same; a series of high-level commands not listed within the specs, preventing systems engineers/designers from planning around vulnerabilities and their potential for malicious use.

      F This user is from outside of this forum
      F This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #6

      In that case, every stack that you use is riddled with those and we are all hosed. And yet somehow your computer, your phone and the internet keep on working most of the time.

      1 Reply Last reply
      0
      • S [email protected]

        Finally, some technical details that were sorely lacking from yesterday's article.

        Anyway, having direct unprivileged R/W access to platform memory is indeed a security hole, no matter the vendor.

        pelya@lemmy.worldP This user is from outside of this forum
        pelya@lemmy.worldP This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #7

        Anyway, having direct unprivileged R/W access to platform memory is indeed a security hole, no matter the vendor.

        It is not. ESP32 is an embedded chip with less than one megabyte of RAM. It cannot run apps or load websites with any malicious code, it only runs the firmware that you flash on it, nothing else, and of course your firmware has full access to every chip feature. If your firmware has a security hole, it's not the chip's fault.

        S 1 Reply Last reply
        0
        • S [email protected]

          The dude that wrote this blog is a goof....

          defines backdoor as “relating to something that is done secretly

          effectively constitute a “private API”, and a company’s choice to not publicly document their private API

          Idiot thinks these are two different things....

          Are they are trying to argue that malicious intent is needed to define it as a back door?

          Moron..

          F This user is from outside of this forum
          F This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #8

          You’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.

          1 Reply Last reply
          0
          • pelya@lemmy.worldP [email protected]

            Anyway, having direct unprivileged R/W access to platform memory is indeed a security hole, no matter the vendor.

            It is not. ESP32 is an embedded chip with less than one megabyte of RAM. It cannot run apps or load websites with any malicious code, it only runs the firmware that you flash on it, nothing else, and of course your firmware has full access to every chip feature. If your firmware has a security hole, it's not the chip's fault.

            S This user is from outside of this forum
            S This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #9

            Try reading the article next time.

            pelya@lemmy.worldP 1 Reply Last reply
            0
            • S [email protected]

              Try reading the article next time.

              pelya@lemmy.worldP This user is from outside of this forum
              pelya@lemmy.worldP This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #10

              There was no mention of over-the-air exploit, so eh.

              1 Reply Last reply
              0
              • ? Offline
                ? Offline
                Guest
                wrote on last edited by
                #11

                A backdoor requires malicious intent, otherwise it's just a vulnerability

                1 Reply Last reply
                0
                • darkassassin07@lemmy.caD [email protected]

                  Potato, potato....

                  Whether we call them 'undocumented commands' or a 'backdoor', the affect is more or less the same; a series of high-level commands not listed within the specs, preventing systems engineers/designers from planning around vulnerabilities and their potential for malicious use.

                  sharkattak@kbin.melroy.orgS This user is from outside of this forum
                  sharkattak@kbin.melroy.orgS This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #12

                  I don't get the downvotes, wether you call it backdoor or private API it's a security hole, and nitpicking on its name won't help fixing it.

                  darkassassin07@lemmy.caD 1 Reply Last reply
                  0
                  • sharkattak@kbin.melroy.orgS [email protected]

                    I don't get the downvotes, wether you call it backdoor or private API it's a security hole, and nitpicking on its name won't help fixing it.

                    darkassassin07@lemmy.caD This user is from outside of this forum
                    darkassassin07@lemmy.caD This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #13

                    It was all positive until the guy below me came in throwing insults. Then people started piling downvotes on both....

                    1 Reply Last reply
                    0
                    • ? Guest
                      This post did not contain any content.
                      F This user is from outside of this forum
                      F This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #14

                      I tried to offer a gentler backgrounder on this HCI business: https://lemmy.ml/comment/17160273

                      The opcodes that actually jumped out at me more than the undocumented ones were the ones that erases the flash.

                      But the conclusion stands. None of this is a 'backdoor' unless you can secretly access it from the wireless side and nothing in the presentation points to that. If I had to guess, the opcodes are for QA and tuning on the manufacturing line.

                      1 Reply Last reply
                      0
                      • G [email protected]

                        I mean, this doesn't really change anything from a practical perspective. It just highlights that the verbage in the press release was alarmist.

                        It's still a security concern that most users will be unaware of.

                        O This user is from outside of this forum
                        O This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #15

                        Yes, in the sense that every device you own has these same commands

                        The alarmist of the original was that this was somehow unique to the esp32

                        If your device has Bluetooth, it has these commands

                        1 Reply Last reply
                        0
                        • System shared this topic on
                          System shared this topic on
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups