ESP32 Undocumented Bluetooth Commands: Clearing the Air · Developer Portal
ESP32 Undocumented Bluetooth Commands: Clearing the Air · Developer Portal
developer.espressif.com
ESP32 Undocumented Bluetooth Commands: Clearing the Air
ESP32 Undocumented Bluetooth Commands: Clearing the Air · Developer Portal
ESP32 Undocumented Bluetooth Commands: Clearing the Air
Does this even count as backdoor? Not really if you have to have access to the device in the first place.
https://www.youtube.com/watch?v=ndM369oJ0tk
It certainly opens up lost of "evil maid" attacks.
An ESP32 is a powerful thing, but it is also a microcontroller.
They are programmable as soon as you have physical access. They are NOT like whole PC's that you can lock up with passwords etc.
More like a gun that you can fire as soon as you have physical access.
I wonder where the expectation has come from? People seem to think that it should be different than it is.
Does it? The quoted passage is also in reference to a less commonly used configuration, in which it is basically used as a communications coprocessor.