Just updated three T-Beam v1.1s and a G1 Nano from 1.2.65 to 2.0.6- using Edge, as the Flasher GUI on Windows/Python was detecting a RAK for some reason. I actually like the Browser based method - very polished.
I found the Channel Encryption Tab (Stacked Papers Icon) and was happy to see AES256 with a long key. My question is: Are these keys randomly generated upon channel creation, or are there a bunch of canned keys embedded in the firmware, kind of like the old versions? ‘Refresh’ generates a new key. Where is the entropy grabbed from?
On the old versions, in order get a 256 bit random key, you had to specify ‘Random’ in the GUI Flasher or CLI - if not, it would use a weak key baked into the firmware - obviously not secure against a sophisticated attacker.
I also experimented with Manual Key entry, and that seems to work, as long as you stick to some limits on characters, length, and special symbols.
Great work Team, thank you.