Daily Archives: 2025-03-10

DOJ: Google must sell Chrome, Android could be next

Source: Ars Technica

Article note: They're gonna spin a collusion engine as a quasi-independent entity. Basically the members of that Linux Foundation "Supporters of Chromium-Based Browsers" initiative will form an LLC or something to hold the trademarks, which will be de-facto controlled by Google and Microsoft as the largest employer of active developers and cashflow. They'll let Opera and Brave and such act like they have seats at the table to provide plausible deniability, while being such a center of gravity in the ecosystem the largest incumbents can be even bigger bullies except where the infighting gets in the way of collusion. Browsers themselves don't make any income, there is only secondary money in providing other parties access to user data/behavioral influence, so actually independent entities holding up the ridiculous complexity we've stuffed into borrowers is not really a serious proposition (as we've been seeing with Mozilla recently).
Comments
Posted in News | Leave a comment

The ESP32 Bluetooth Backdoor That Wasn’t

Source: Hack a Day

Article note: I didn't post anything when that hype was passing through because I was pretty sure it was "The documented API allowing an attached host to control the device." Sure enough.

Recently there was a panicked scrambling after the announcement by [Tarlogic] of a ‘backdoor’ found in Espressif’s popular ESP32 MCUs. Specifically a backdoor on  the Bluetooth side that would give a lot of control over the system to any attacker. As [Xeno Kovah] explains, much about these claims is exaggerated, and calling it a ‘backdoor’ is far beyond the scope of what was actually discovered.

To summarize the original findings, the researchers found a number of vendor-specific commands (VSCs) in the (publicly available) ESP32 ROM that can be sent via the host-controller interface (HCI) between the software and the Bluetooth PHY. They found that these VSCs could do things like writing and reading the firmware in the PHY, as well as send low-level packets.

The thing about VSCs is of course that these are a standard feature with Bluetooth controllers, with each manufacturer implementing a range of these for use with their own software SDK. These VSCs allow for updating firmware, report temperatures and features like debugging, and are generally documented (except for Broadcom).

Effectively, [Xeno] makes the point that VSCs are a standard feature in Bluetooth controllers, which – like most features – can also be abused. [Tarlogic] has since updated their article as well to distance themselves from the ‘backdoor’ term and instead want to call these VSCs a ‘hidden feature’. That said, if these VSCs in ESP32 chips are a security risk, then as [Xeno] duly notes, millions of BT controllers from Texas Instruments, Broadcom and others with similar VSCs would similarly be a security risk.

Posted in News | Leave a comment