Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction
Posted: Sun Mar 08, 2020 6:14 pm
I'm very concerned.
https://limitedresults.com/2019/11/pwn- ... xtraction/
Opening the ESP 32 is performed by resetting the fuse bits stored in the chip at the start, which do not allow further reading of the encryption key. This is done by briefly 'turning off ' the power, after which the keys in eFuse are available for reading.
Errors in the fact that the chip should set the closed state in triggers by default .
Maybe it is possible to completely disable the com port? Then it would be better to resist the attack
https://limitedresults.com/2019/11/pwn- ... xtraction/
Opening the ESP 32 is performed by resetting the fuse bits stored in the chip at the start, which do not allow further reading of the encryption key. This is done by briefly 'turning off ' the power, after which the keys in eFuse are available for reading.
Errors in the fact that the chip should set the closed state in triggers by default .
Maybe it is possible to completely disable the com port? Then it would be better to resist the attack