You can use an online tool to look up the Bluetooth [1] or Wifi [2] MAC of the device. If it's espressive you've got one of their chips. That doesn't guerantee that it's not one of the others they make. You can also open up the device and look for the esp32. They almost always look the same with their metal can ontop.
Someone correct me if i'm wrong, but it looks like it's not the big deal the original blog post makes it out to be.
To issue those undocumented HCI commands one either needs to hijack a computer/soc/mcu that is connected to an esp32 with HCI UART transport enabled or put malicious software on the esp itself.
The mac spoofing might be interesting for people building hacking tools, however.
What I expect: Having their logo printed next to the lens on a phone which is marketed as a great camera-phone. They had no input on the phone other than how the logo looks.
What I want: A small portable point and shoot digital camera that actually takes photos on the level of a flagship-phone.
Sorry for being harsh, but if you use the "free "forever"" offering of any company as alternative to what google offers you learnt nothing from using google.
Nobody does anything anymore and we'll all just die. Gotcha.