eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

217
active users

#espressif

0 posts0 participants0 posts today
Olimex<p>Step by Step instructions how to make smart home WiFi device with ESP32-EVB and Home Assistant without single line of code! <a href="https://olimex.wordpress.com/2025/05/30/step-by-step-instructions-how-to-make-smart-home-wifi-connected-device-with-esp32-evb-and-home-assistant-without-any-programming/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">olimex.wordpress.com/2025/05/3</span><span class="invisible">0/step-by-step-instructions-how-to-make-smart-home-wifi-connected-device-with-esp32-evb-and-home-assistant-without-any-programming/</span></a> <a href="https://mastodon.social/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a> <a href="https://mastodon.social/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://mastodon.social/tags/iot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iot</span></a> <a href="https://mastodon.social/tags/homeassistant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homeassistant</span></a> <a href="https://mastodon.social/tags/esphome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esphome</span></a> <a href="https://mastodon.social/tags/wifi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wifi</span></a></p>
Olimex<p>More projects run on Open Source Hardware ESP32-P4-DevKit EUR 16 board with Espressif Dual Core RISC-V SOC <a href="https://www.youtube.com/shorts/PqLHHtLoO7w" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/shorts/PqLHHtLoO7w</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a> <a href="https://mastodon.social/tags/iot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iot</span></a> <a href="https://mastodon.social/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://mastodon.social/tags/riscv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>riscv</span></a></p>
PrivacyDigest<p>Undocumented commands found in <a href="https://mas.to/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> chip used by a billion devices</p><p>The ubiquitous <a href="https://mas.to/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> microchip made by Chinese manufacturer <a href="https://mas.to/tags/Espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espressif</span></a> and used by over 1 billion units as of 2023 contains undocumented commands that could be leveraged for <a href="https://mas.to/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a>.</p><p>The undocumented commands allow <a href="https://mas.to/tags/spoofing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spoofing</span></a> of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/china" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>china</span></a> </p><p><a href="https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/</span></a></p>
securityaffairs<p>Undocumented hidden feature found in <a href="https://infosec.exchange/tags/Espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espressif</span></a> <a href="https://infosec.exchange/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> <a href="https://infosec.exchange/tags/microchip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microchip</span></a> <br><a href="https://securityaffairs.com/175102/hacking/undocumented-hidden-feature-espressif-esp32-microchip.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175102/hac</span><span class="invisible">king/undocumented-hidden-feature-espressif-esp32-microchip.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Misinformation-Superhighwayman<p>It's easy to get scared when headlines combine terms like "backdoor", "Bluetooth", and "a billion devices".</p><p>Should you be worried? No.</p><p>The "attack" for ESP32 chips in some Internet of Things devices is some undocumented commands that are likely to be for testing by the manufacturer, Espressif, the in the factory. It cannot spread from one device to another like a virus/worm, and it takes a lot more than being within Bluetooth range -- it requires physical access to I/O pins on the chip itself or access to a USB port (if one is present). That's just the standard way to flash the firmware. It should go without saying that if a malicious person has physical access to the inside of your device then you may have more security concerns.</p><p>It's been fascinating to watch the propagation of fear and misinformation in a niche where I have dabbled enough to develop a bit of technical proficiency.</p><p>My interpretation of events is that Tarlogic Security is spreading panic to gain attention or notoriety.</p><p>Undocumented "backdoor" found in Bluetooth chip used by a billion devices:<br><a href="https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/</span></a></p><p>NIST (National Institute of Standards and Technology) has a CVE:<br><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27840" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/CVE-2</span><span class="invisible">025-27840</span></a></p><p>Edit to update:</p><p>Espressif’s Response to Claimed Backdoor and Undocumented Commands in ESP32 Bluetooth Stack<br><a href="https://www.espressif.com/en/news/Response_ESP32_Bluetooth" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">espressif.com/en/news/Response</span><span class="invisible">_ESP32_Bluetooth</span></a></p><p><a href="https://aus.social/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> <a href="https://aus.social/tags/Espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espressif</span></a> <a href="https://aus.social/tags/TarlogicSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TarlogicSecurity</span></a> <a href="https://aus.social/tags/IoT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoT</span></a> <a href="https://aus.social/tags/InternetOfThings" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetOfThings</span></a></p>
eicker.news ᳇ tech news<p>»The ubiquitous <a href="https://eicker.news/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> <a href="https://eicker.news/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> <a href="https://eicker.news/tags/chip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chip</span></a> made by Chinese manufacturer <a href="https://eicker.news/tags/Espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espressif</span></a> and used by over <a href="https://eicker.news/tags/billion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>billion</span></a> units contains an undocumented "<a href="https://eicker.news/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a>" that could be leveraged for <a href="https://eicker.news/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a>.« <a href="https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/?eicker.news" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/?eicker.news</span></a> <a href="https://eicker.news/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://eicker.news/tags/media" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>media</span></a></p>
Ricardo Martín<p>"The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented "backdoor" that could be leveraged for attacks."</p><p><a href="https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://mastodon.bsd.cafe/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a> <a href="https://mastodon.bsd.cafe/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a></p>
Sebastian Büttrich @ ITU<p><a href="https://social.itu.dk/tags/bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bluetooth</span></a> <a href="https://social.itu.dk/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> in <a href="https://social.itu.dk/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://social.itu.dk/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> chips ... this seems to be the primary source</p><p><a href="https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tarlogic.com/news/backdoor-esp</span><span class="invisible">32-chip-infect-ot-devices/</span></a></p>
Sebastian Büttrich @ ITU<p>Just preparing my next <a href="https://social.itu.dk/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> exercise as part of my <a href="https://social.itu.dk/tags/IoT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoT</span></a> course ... this comes in timely ...</p><p>study material for the <a href="https://social.itu.dk/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> unit ...</p><p><a href="https://social.itu.dk/tags/bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bluetooth</span></a> <a href="https://social.itu.dk/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> in <a href="https://social.itu.dk/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://social.itu.dk/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> chips ...</p><p><a href="https://thedefendopsdiaries.com/unveiling-the-esp32-backdoor-implications-for-iot-security/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/unveil</span><span class="invisible">ing-the-esp32-backdoor-implications-for-iot-security/</span></a></p>
JennyFluff :heart_trans: @ GPN23 DECT JENN<p>me: "Hey let's do something with that esp32-c3 devkit I got for free" from <a href="https://chitter.xyz/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a></p><p>How it's going:<br>E (39) boot_comm: Image requires chip rev &gt;= v0.3, but chip is v0.2</p><p>.. ugh?</p>
Jeff Rizzo<p>The worst part is that there isn't a single replacement part that's a go-to for all the uses I have - at least not one that isn't another <a href="https://sfba.social/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> part.</p><p>I've got some work ahead of me. :)</p><p><a href="https://sfba.social/tags/embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>embedded</span></a> <a href="https://sfba.social/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a></p>
adlerweb // BitBastelei<p>Undokumentierte Befehle in <a href="https://social.adlerweb.info/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a>, welche es ermöglichen per Bluetooth RAM und Flash auszulesen und zu manipulieren. Könnte eine <a href="https://social.adlerweb.info/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> sein - oder Codereste, die nicht in den Release sollten. Unschön ist es in jedem Fall, auch wenn IMO die Gefahr überschaubar ist, da ein Angreifer ja recht nah ran muss.</p><p><a href="https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/</span></a><br><a href="https://social.adlerweb.info/tags/RootedCON" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RootedCON</span></a> <a href="https://social.adlerweb.info/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a></p>
Tim Riemann<p>Der <a href="https://mastodon.social/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> C5 ist auf dem Weg. Jetzt auch endlich mit 5.8GHz. Der "Guy with the swiss accent" hat ein Engineering Sample mal getestet. <a href="https://mastodon.social/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://mastodon.social/tags/diy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>diy</span></a> <a href="https://mastodon.social/tags/maker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maker</span></a> <a href="https://www.youtube.com/watch?v=glEvHRHdboA" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=glEvHRHdboA</span><span class="invisible"></span></a></p>
Espen Andersen<p>Still trying to get my head around <a href="https://techhub.social/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> 's <a href="https://techhub.social/tags/bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bluetooth</span></a> and audio <a href="https://techhub.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> framework for a new <a href="https://techhub.social/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> project. Testing against an <a href="https://techhub.social/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> LyraT-Mini devkit, writing a bluetooth call recorder in <a href="https://techhub.social/tags/cplusplus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cplusplus</span></a> .</p><p>Intercepting the audio stream from my phone works just fine, but how do I process the incoming HCI audio buffer in order to record the voice call to the SD card? Audio data is presumably SBC encoded, but I don't recognize the format of the incoming data stream at all 😵‍💫 Anyone..?</p>
exponentialverteit<p>TIL: Open Source WiFi stack for esp32 is in the works: <a href="https://esp32-open-mac.be/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">esp32-open-mac.be/</span><span class="invisible"></span></a></p><p><a href="https://hessen.social/tags/38c3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>38c3</span></a> <a href="https://hessen.social/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a> <a href="https://hessen.social/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://hessen.social/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a></p>
adafruit<p>ESP32-P4 booting up and running CircuitPython 🚀🐍</p><p>Core CircuitPython dev Scott has been chugging away at adding ESP32-P4 support to CircuitPython - and today tossed us a bin file that runs on the Eval board we got last week from Espressif. Native USB is still in progress, but we can connect to the REPL and save files using the USB-Serial converter. It's so fast at 400mhz, and with 16 or 32 MHz of PSRAM, it's going to be an awesome board for embedded Python! More soon</p><p><a href="https://mastodon.cloud/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://mastodon.cloud/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a> <a href="https://mastodon.cloud/tags/esp32p4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32p4</span></a></p>
RevK :verified_r:<p>So, apparently, for ESP IDF, an IP_EVENT_STA_LOST_IP event is not an issue when your are a "mesh"client.</p><p>FFS, it have literally taken me all day to find that out.</p><p><a href="https://toot.me.uk/tags/ESP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP</span></a> <a href="https://toot.me.uk/tags/ESPIDF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESPIDF</span></a> <a href="https://toot.me.uk/tags/Espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espressif</span></a></p>
Olimex<p>Guess what is this? Wrong answers only! <a href="https://olimex.wordpress.com/2024/07/25/esp32-p4-dual-core-risc-v-open-source-hardware-board-is-almost-finished/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">olimex.wordpress.com/2024/07/2</span><span class="invisible">5/esp32-p4-dual-core-risc-v-open-source-hardware-board-is-almost-finished/</span></a> <a href="https://mastodon.social/tags/espressif" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espressif</span></a> <a href="https://mastodon.social/tags/esp32p4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32p4</span></a> <a href="https://mastodon.social/tags/riscv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>riscv</span></a> <a href="https://mastodon.social/tags/oshw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oshw</span></a> <a href="https://mastodon.social/tags/iot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iot</span></a></p>