est.social on üks paljudest sõltumatutest Mastodoni serveritest, mida saab fediversumis osalemiseks kasutada.
est.social on mõeldud Eestis üldkasutatavaks Mastodoni serveriks. est.social is meant to be a general use Mastodon server for Estonia.

Administraator:

Serveri statistika:

88
aktiivsed kasutajad

#esp32

2 postitusega2 osalejaga0 postitust täna
Vastatud lõimes

Idea for this PR is to add a network bridge mode for repeaters.

This will let you take multiple LoRa radios, setup meshcore repeater firmware and listen on any number of channels or with different antenna setups and bridge the routing across those different channels with a shared Wifi link(the two dotted white boxes).

I've tested it for a few days and it's pretty amazing to see meshcore automatically finding bridged routes.

github.com/ripplebiz/MeshCore/

Stupid question, someone may know.

ESP32-S3-MINI-1-N4R2 has PSRAM (2M).

It is Quad SPI, data sheet says that.

But is it 40MHz or 80MHz.

Anyone know? I could not find in data sheet. Data sheet says flash is 80MHz, but does not mention PSRAM speed. I don't want to just rely on what seems to work in case marginal.

@espressifsystem
#ESP32

It's easy to get scared when headlines combine terms like "backdoor", "Bluetooth", and "a billion devices".

Should you be worried? No.

The "attack" for ESP32 chips in some Internet of Things devices is some undocumented commands that are likely to be for testing by the manufacturer, Espressif, the in the factory. It cannot spread from one device to another like a virus/worm, and it takes a lot more than being within Bluetooth range -- it requires physical access to I/O pins on the chip itself or access to a USB port (if one is present). That's just the standard way to flash the firmware. It should go without saying that if a malicious person has physical access to the inside of your device then you may have more security concerns.

It's been fascinating to watch the propagation of fear and misinformation in a niche where I have dabbled enough to develop a bit of technical proficiency.

My interpretation of events is that Tarlogic Security is spreading panic to gain attention or notoriety.

Undocumented "backdoor" found in Bluetooth chip used by a billion devices:
bleepingcomputer.com/news/secu

NIST (National Institute of Standards and Technology) has a CVE:
nvd.nist.gov/vuln/detail/CVE-2

Edit to update:

Espressif’s Response to Claimed Backdoor and Undocumented Commands in ESP32 Bluetooth Stack
espressif.com/en/news/Response

BleepingComputer · Undocumented backdoor found in Bluetooth chip used by a billion devicesBill Toulas poolt
Jätkatud lõim

Whilst it’s unfortunately relatively common to see limited details in early-stage vulnerability announcements of commercial labs, the lack of technical evidence in such a significant claim raises even more significant questions.

The expectation is that further detailed information should be released through more technical channels to allow for proper evaluation and remediation.

In lack of that, it's slander in a teacup.

Jätkatud lõim

Tarlogic’s press release asserts that there is a backdoor in the ESP32 chip, but the headlines don't match the substance of the article. The article does not provide detailed technical evidence such as a live demonstration, specific conditions under which the vulnerability is triggered, or step-by-step instructions to reproduce the findings. The announcement primarily focuses on the potential risks and implications—likely as part of a broader strategy to promote their security tools—without delving into the granular technical details that would allow independent verification.

They use the term "backdoor", but I'm unsure that they understand what that word really means, or whether they understand the weight of such claims, which so far appear to be completely unsubstantiated.

I really hope they have something to show.

Vastatud lõimes

Rapidly moving my meshtastic nodes over to meshcore 🤘🏿

Going very smoothly so far. Meshcore is notably very fast at message delivery and delivery confirmations back to the sender.

Thinking I'll leave my primary meshtastic infrastructure nodes up and build meshcore nodes to deploy next to them so as the network matures I can do head to head comparisons.

RE: Alleged ESP32 so-called "backdoor"

The talk where a couple of researchers presented their findings in Madrid is about undocumented commands found in the ESP32. They presented themselves as civilians, but they also have a consultancy or work for a company called Tarlogic.

Nothing about the talk, and nothing about the Tarlogic article (that doubles as marketing material for their security product) says that they found anything about backdoors, or any malicious commands.
reg.rootedcon.com/cfp/schedule

Tarlogic
tarlogic.com/news/backdoor-esp

They don't claim that there is a backdoor, they use many conditionals such as "would" and "could", and they say "maybe" but they didn't demonstrate any exploits.

They've shown that they found interesting undocumented functionality, and they are extrapolating that it could possibly be used somehow, but they don't really know if it's possible or not.

Slander in a teacup

It seems that Espressif built in some debugging functionality? Is that a horrible thing? They don't know, but they make sure to promote their own security product to protect you. How nice of them.

There's too many time-wasters with very specific ideologies creating chaos and confusion out there, it's good to identify them.

@rootedconRootedCON Registration and control panelRootedCON registration area

bleepingcomputer.com/news/secu

“In total, they found 29 undocumented commands, collectively characterized as a "backdoor," that could be used for memory manipulation (read/write RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection.”

BleepingComputer · Undocumented backdoor found in Bluetooth chip used by a billion devicesBill Toulas poolt

This is amazing, and 27 quid on Amazon.

files.waveshare.com/wiki/ESP32

But…

What I don’t understand is the UART and boot/reset buttons, and logic. For a start they link the UART to boot and reset so you don’t need the buttons. But also the ESP32S3 does USB directly. You just need the 5k1s. So why waste space and components on two buttons a UART and some transistors on such a compact board?!

Am I missing the obvious here?

That guy hacked his air purifier, reversed part of the Android app, then the PCB, downloaded the firmware and reversed everything .. to integrate it to HomeAssistant! :o

Didn't know about MessagePack nor esp32knife.

jmswrnr.com/blog/hacking-a-sma

James Warner · Hacking a Smart Home DeviceHow I reverse engineered an ESP32-based smart home device to gain remote control access and integrate it with Home Assistant.