this post was submitted on 08 Mar 2025
18 points (69.6% liked)

Privacy

35326 readers
133 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] TheTechnician27@lemmy.world 2 points 3 days ago (4 children)

The discoverers themselves refer to it as a backdoor, so frankly I don't know what you're on about accusing this article of misrepresenting their findings.

[–] azdle@news.idlestate.org 2 points 3 days ago (2 children)

Huh, that is interesting. Though, that post doesn't seem to have any info about what the backdoor is either.

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. [...] This discovery is part of the ongoing research carried out by the Innovation Department of Tarlogic on the Bluetooth standard. Thus, the company has also presented at RootedCON, the world’s largest Spanish-language cybersecurity conference, BluetoothUSB, a free tool that enables the development of tests for Bluetooth security audits regardless of the operating system of the devices. [Emphasis mine.]

Maybe the presentation has nothing to do with the actual backdoor?

Though, this part later might seem to imply they are related:

In the course of the investigation, a backdoor was discovered in the ESP32 chip, [...] Tarlogic has detected that ESP32 chips [...] have hidden commands not documented by the manufacturer. These commands would allow modifying the chips arbitrarily to unlock additional functionalities, [...].

Which, best I can work out, seems to be talking about the information on slide titled "COMANDOS OCULTOS" (page 39 / "41").

If the "backdoor" is the couple of commands in red on that slide, I maintain what I said above. If it's not talking about that and there's another "backdoor" that they haven't described yet, well, then ¯\_(ツ)_/¯ we'll see what it is when they actually announce it.

I fully acknowledge there may be something I'm missing. If there's a real vuln/backdoor here, I'm sure we'll hear more about it.

[–] azdle@news.idlestate.org 1 points 3 days ago* (last edited 3 days ago) (1 children)

Maybe we can find out for sure through the magic of the fediverse...

@antoniovazquezblanco@mastodon.social Is the "backdoor" mentioned in https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/ about what you shared in your RootedCON talk? If so, how worried should people using devices containing ESP32s be?

[–] Feyr@lemmy.world 3 points 1 day ago

None. People that have physical access to you device can write malicious firmware. Which they can already do with physical access

It's an overblown nothing-burger. Calling it a backdoor is a security researcher juicing up some minor finding

load more comments (1 replies)