WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

866

Is anyone surprised at all?

Archive: https://archive.today/mCfL2 Main Article: https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/ Main article Archive: https://archive.today/Qb4Jz

From the post: "The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented 'backdoor' that could be leveraged for attacks," writes BleepingComputer.

Is anyone surprised at all? Archive: https://archive.today/mCfL2 Main Article: https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/ Main article Archive: https://archive.today/Qb4Jz From the post: "The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented 'backdoor' that could be leveraged for attacks," writes BleepingComputer.

(post is archived)

[–] 2 pts

It's not a remote exploit so who cares? If someone has physical access to your device you're screwed anyways.

[–] 0 pt

That is a good point but I have seen very odd "local only" exploits become "remote" after more research. Not sure what else might be uncovered.

However... This could backfire in a huge way. Devices that use this and that firmware might now be "hackable" to add a custom/OSS firmware now because of these instructions existing.

[–] 1 pt

No, really. Oh no.