minus-squaremousetail@programming.devtoTechnology@lemmy.world•The ESP32 "backdoor" that wasn't | Dark Mentor LLClinkfedilinkEnglisharrow-up3·5 hours agoA backdoor requires malicious intent, otherwise it’s just a vulnerability linkfedilink
minus-squaremousetail@programming.devtoTechnology@lemmy.world•Undocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.linkfedilinkEnglisharrow-up4arrow-down1·6 hours agoThe exploit requires physical access. It’s not exploitable in 99% of cases linkfedilink
A backdoor requires malicious intent, otherwise it’s just a vulnerability