I didn’t watch the whole video but based on the article, it appears this guy is just putting up christmas lights using off the shelf hardware and software? He isn’t hacking anything here and this hobby is already pretty common anongst those with the money and electronics experience to build it.
Tom Betgeorge works in this industry and is pretty renowned for doing massive displays using all this same stuff every year and uploading it to Youtube.
Unless your lights are hard-wired or connecting to a locked down guest WiFi network, you are exposing your WiFi credentials to potential attackers.
The microcontrollers that control Christmas lights are riddled with backdoors and holes.
That’s probably the real reason that this piece of shit NSA spook wants everyone to have smart Christmas lights.
The security researcher, LimitedResults, coordinated disclosure with Espressif on their advisory and details of the exploit. The attack works against eFuse, a one-time programmable memory where data can be burned to the device.
By burning a payload into the device’s eFuse, no software update can ever reset the fuse and the chip must be physically replaced or the device discarded. A key risk is that the attack does not fully replace the firmware, so the device may appear to work as normal.
Why does a random esp32 chip need efuses in the first place??
It’s designed and implemented for copy protection. Otherwise you can design a esp32 device that includes software you’ve written and 15 minutes later a clone device with exactly the same software will appear on <insert Chinese electronics website here>