megaman@discuss.tchncs.de to Technology@lemmy.worldEnglish · 4 months agoThe ESP32 "backdoor" that wasn't | Dark Mentor LLCdarkmentor.comexternal-linkmessage-square16fedilinkarrow-up1195arrow-down16cross-posted to: [email protected]
arrow-up1189arrow-down1external-linkThe ESP32 "backdoor" that wasn't | Dark Mentor LLCdarkmentor.commegaman@discuss.tchncs.de to Technology@lemmy.worldEnglish · 4 months agomessage-square16fedilinkcross-posted to: [email protected]
minus-squareShadowRam@fedia.iolinkfedilinkarrow-up6arrow-down32·4 months agoThe dude that wrote this blog is a goof… defines backdoor as “relating to something that is done secretly effectively constitute a “private API”, and a company’s choice to not publicly document their private API Idiot thinks these are two different things… Are they are trying to argue that malicious intent is needed to define it as a back door? Moron…
minus-squareFanBlade@lemmynsfw.comlinkfedilinkEnglisharrow-up11arrow-down1·4 months agoYou’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.
minus-squaremousetail@programming.devlinkfedilinkEnglisharrow-up6·4 months agoA backdoor requires malicious intent, otherwise it’s just a vulnerability
The dude that wrote this blog is a goof…
Idiot thinks these are two different things…
Are they are trying to argue that malicious intent is needed to define it as a back door?
Moron…
You’re very smart. I didn’t realize that until you called someone a goof, idiot and moron, but now it’s very clear that you have far superior intelligence.
A backdoor requires malicious intent, otherwise it’s just a vulnerability