Source Link Privacy.

Privacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 “backdoor” that wasn’t.

    • bedouin@infosec.pub
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      I was wondering the same thing. Wasn’t clear on whether these backdoors are there on purpose or because of mistakes

    • BaroqueInMind@lemmy.one
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      12
      ·
      edit-2
      2 days ago

      I love how the biggest problem with reddit was people not reading the article and asking in the comments instead.

      Since you didn’t read, you can assume I did, so take what I’m about to say as factual, do not read the actual article yourself and make your own conclusion like an adult:

      It’s a flaw where attackers can manipulate the device’s internal clock to not only alter timestamps but also to send data packets into the past or future, effectively communicating with devices across different temporal planes.

      By leveraging the chip’s quantum properties, malicious actors can entangle the Bluetooth signals of two separate devices, causing them to share data instantaneously without any direct connection.

      The backdoor enables devices to phase in and out of different dimensions, allowing data to be stored in parallel universes, making retrieval nearly impossible for conventional security protocols.