Hacker News new | past | comments | ask | show | jobs | submit login

https://docs.espressif.com/projects/esp-idf/en/stable/esp32/... Doesn't say anything about reading the encrypted flash as being blocked, just that it will be the encrypted contents, same as if you pull the flash chip off and read it.

You need arbitrary code execution on the main cpu to execute the debug commands. Once you have that, it's game over anyway. Why not just post the data to a url rather than trying to smuggle it out in Bluetooth headers? Or just broadcast it via normal Bluetooth packets?

There's no issue here.






why do we believe their documentation, when they didn't list this in the first place?

they're either lying, or failed to disclose details previously.

why do you think they're doing a better job this time around? there may in fact be no serious threat, but now anything and everything is called into question.


I would hope so, but on

Tarlogics blog post, it is mentioned “modifying chips arbitrarily”, “infecting chips with malicious code”, “obtain confidential information stored on them”.

Even though they rephrased the backdoor wording, the remaining statements make me believe the undocumented functions can be used to gain code execution on the main cpu.


They do not. They require arbitrary code execution on the main cpu to be used.

So, they are basically saying that bash is vulnerable to arbitrary command execution?

Yes



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: