azdle

joined 2 years ago
[–] [email protected] 11 points 2 days ago

Fry and the Slurm Factory

[–] [email protected] 3 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

Have they said that recently? The only definitive comment I remember from them was something along the lines "definitely not in the next 2-3 years" around launch, which was 3 years ago.

Not saying that means I "expect" it's happening, just curious if you know of anything more recent that says its not happening.

[–] [email protected] 2 points 1 month ago

It's not even over USB by default. It's an internal binary driver API. The USB part is a custom firmware for the ESP that exposes that api via USB that the people giving the talk wrote because it's useful for pentesting / development of exploits for other Bluetooth devices.

[–] [email protected] 3 points 1 month ago

Yep, I'm seeing it now too. 👍

[–] [email protected] 1 points 1 month ago

I know this website seems sketchy/scammy AF, but I found that these actually do a good job dimming the LEDs to reasonable levels, but keeping them visible.

https://www.lightdims.com/store.htm

I imagine (mostly because of all the "patent pending" bs) that this is a film you just just buy from somewhere else way cheaper, I just don't know what it is.

[–] [email protected] 6 points 1 month ago (3 children)

Idea Not Found

Tried creationg an account and still don't see it.

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

Another test.

Edit: Hey, @[email protected], ding dong?

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago) (1 children)

Test

@[email protected], blah blah, blah

[–] [email protected] 4 points 1 month ago* (last edited 1 month ago) (1 children)

Maybe we can find out for sure through the magic of the fediverse...

@[email protected] Is the "backdoor" mentioned in https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/ about what you shared in your RootedCON talk? If so, how worried should people using devices containing ESP32s be?

[–] [email protected] 31 points 1 month ago* (last edited 1 month ago)

I don't think is is a backdoor. At the moment I wouldn't consider this article any more than FUD.

It's unclear to me if the security company has actually said what the vuln is or not, but if it's what was presented in the slides linked in the article this is at worst something that can be "attacked" from a computer connected via USB (and I'm pretty sure it would also require special software already on the ESP32), where the attack is sending out possibly invalid bluetooth messages to try to attack other devices or flashing new firmware to the ESP itself. It's not a general "backdoor" in the ESP32 itself. At least that's the best interpretation I've been able to make. Happy to be corrected if anyone finds more info.

[–] [email protected] 4 points 1 month ago

I mean, if it were a backdoor, the one thing you can be sure of is that the people who put it there wouldn't be calling it a backdoor, ever.

Though, I think it's worth pointing out that the while the security company's blog calls whatever it is a "backdoor", "backdoor" (nor "puerta" (though, I have no idea if that would be translated literally or to something else)) doesn't appear in the the slides. So I'm going to lay that one at the marketing people trying to drum it up into something more impressive than it really is.

[–] [email protected] 8 points 1 month ago (2 children)

Huh, that is interesting. Though, that post doesn't seem to have any info about what the backdoor is either.

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. [...] This discovery is part of the ongoing research carried out by the Innovation Department of Tarlogic on the Bluetooth standard. Thus, the company has also presented at RootedCON, the world’s largest Spanish-language cybersecurity conference, BluetoothUSB, a free tool that enables the development of tests for Bluetooth security audits regardless of the operating system of the devices. [Emphasis mine.]

Maybe the presentation has nothing to do with the actual backdoor?

Though, this part later might seem to imply they are related:

In the course of the investigation, a backdoor was discovered in the ESP32 chip, [...] Tarlogic has detected that ESP32 chips [...] have hidden commands not documented by the manufacturer. These commands would allow modifying the chips arbitrarily to unlock additional functionalities, [...].

Which, best I can work out, seems to be talking about the information on slide titled "COMANDOS OCULTOS" (page 39 / "41").

If the "backdoor" is the couple of commands in red on that slide, I maintain what I said above. If it's not talking about that and there's another "backdoor" that they haven't described yet, well, then ¯\_(ツ)_/¯ we'll see what it is when they actually announce it.

I fully acknowledge there may be something I'm missing. If there's a real vuln/backdoor here, I'm sure we'll hear more about it.

 

What is really needed, [Linus Torvalds] said, is to find ways to get away from the email patch model, which is not really working anymore. He feels that way now, even though he is "an old-school email person".

 

I'm curious to see what information I'm blasting out to the various services I depend on for internet (ISP, DNS, probably Cloudflare, etc.).

Are there any easy to setup, entirely self-hosted tools I can run on my home network that would allow me to snoop on my own traffic.

I want more than just DNS, so I'm not just looking for pihole and its ilk. I want to see things like SNI and any non-protected traffic that any of the devices on my network might be sending that I just don't know about.

Ideally, it would be something I could leave on without affecting my speed/latency, but something to turn on occasionally and spot check would be better than nothing.

My router runs VyOS, so I should have quite a bit of flexibility in what I do with my traffic, though I never have figured out if/how to deploy custom software to it...

2
Sad - Poorly Drawn Lines (poorlydrawnlines.com)
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
1
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
 

I count 13 generic manufacturers: search lisdexamfetamine on https://www.accessdata.fda.gov/scripts/cder/ob/search_product.cfm

view more: next ›