• CmdrShepard42@lemm.ee
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    12 hours ago

    I didn’t watch the whole video but based on the article, it appears this guy is just putting up christmas lights using off the shelf hardware and software? He isn’t hacking anything here and this hobby is already pretty common anongst those with the money and electronics experience to build it.

    Tom Betgeorge works in this industry and is pretty renowned for doing massive displays using all this same stuff every year and uploading it to Youtube.

    • socphoenix@midwest.social
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      2
      ·
      13 hours ago

      The security researcher, LimitedResults, coordinated disclosure with Espressif on their advisory and details of the exploit. The attack works against eFuse, a one-time programmable memory where data can be burned to the device.

      By burning a payload into the device’s eFuse, no software update can ever reset the fuse and the chip must be physically replaced or the device discarded. A key risk is that the attack does not fully replace the firmware, so the device may appear to work as normal.

      Why does a random esp32 chip need efuses in the first place??

      • Dave.@aussie.zone
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        3 hours ago

        It’s designed and implemented for copy protection. Otherwise you can design a esp32 device that includes software you’ve written and 15 minutes later a clone device with exactly the same software will appear on <insert Chinese electronics website here>