Well, TI are obviously very proud of their 'SimpleLink' TM - and say they have patented it. So that's one barrier to implementing it right there.
Secondly, just watching that video made me sick. I mean, you have to craft a 15-20 character 'special-string' that includes your access point ssid and password, and then send that over the air?
Oh - but no - following some obvious criticism of this 'KISS' - so simple we didn't bother with security - now they have got some modest amounts of encryption (so long as the bad guys don't try to reverse engineer the initial config apps to get the key).
So my understanding is that the process in the video has been replaced with a dedicated app you have to run. Then you need to press a button on the device to initiate pairing!!
You can read more about it here:
http://electronics.stackexchange.com/questions/61704/how-does-ti-cc3000-wifi-smart-config-workA much better approach would be for the ESP to create an AP - something the CC3000's seem unable to do - then you visit that AP and configure your wifi from there. No crazy 20 character strings to compose - no dodgy beacons with security by obscurity!!
We're working on this and have some code that now - creates an access point, scans available stations, presents a list of stations to join, accepts a password and then programs the ESP and reboots. see
https://github.com/hamishcunningham/fishy-wifi/tree/master/joinme for our code.
We'd like the page to be made available over https and also to act as a captive portal - but as it is, it works.
UNLIKE TI, I would like to make it absolutely clear that (at the moment) there is no security on this process, and anyone sniffing traffic would be able to see your ssid and password sailing by in plain text.
But I think it is already quite a bit more simple than other, more heavily trademarked, approaches.
G