megaman@discuss.tchncs.de to Technology@lemmy.worldEnglish · 21 hours agoThe ESP32 "backdoor" that wasn't | Dark Mentor LLCdarkmentor.comexternal-linkmessage-square16fedilinkarrow-up1161arrow-down16cross-posted to: [email protected]
arrow-up1155arrow-down1external-linkThe ESP32 "backdoor" that wasn't | Dark Mentor LLCdarkmentor.commegaman@discuss.tchncs.de to Technology@lemmy.worldEnglish · 21 hours agomessage-square16fedilinkcross-posted to: [email protected]
minus-squareShadowRam@fedia.iolinkfedilinkarrow-up6arrow-down29·20 hours agoThe dude that wrote this blog is a goof… defines backdoor as “relating to something that is done secretly effectively constitute a “private API”, and a company’s choice to not publicly document their private API Idiot thinks these are two different things… Are they are trying to argue that malicious intent is needed to define it as a back door? Moron…
minus-squaremousetail@programming.devlinkfedilinkEnglisharrow-up5·14 hours agoA backdoor requires malicious intent, otherwise it’s just a vulnerability
minus-squareFanBlade@lemmynsfw.comlinkfedilinkEnglisharrow-up9arrow-down1·17 hours agoYou’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.
The dude that wrote this blog is a goof…
Idiot thinks these are two different things…
Are they are trying to argue that malicious intent is needed to define it as a back door?
Moron…
A backdoor requires malicious intent, otherwise it’s just a vulnerability
You’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.