I work near one of these and a couple of us decided to investigate purely out of curiosity one lunch time earlier this year.<p>We used a netbook with a fresh Windows XP on it and nothing of value and destroyed the disk afterwards.<p>It had on it some inane chart mp3s, a low quality DVD rip, a text file with 1337speak in it and what looked like a Ubuntu ISO. I doubt anyone else had actually plugged anything into it and these were probably the originator's files.<p>I can see the attraction and purpose of it, but the idealisms probably won't ever be realised with human nature as it stands. Someone will trash or break it and someone else will upload something nasty to it.<p>As for security, all these probably carry the <i>Internet clap</i> so don't go sticking them in anything of value (sounds like a certain human problem as well).
Wouldn't this be a tad easy to "troll"? All you would need to do is hit that USB port with a rock and it would be completely unusable, all effort into cementing it into the wall wasted.
This can't end well, I won't ever plug anything into my laptop if it is hidden in a wall.
See: <a href="http://www.fiftythree.org/etherkiller/" rel="nofollow">http://www.fiftythree.org/etherkiller/</a>
Here is Moustreet keys, located in Toulouse, France: <a href="http://blog.lamoustacherie.fr/?page_id=3981" rel="nofollow">http://blog.lamoustacherie.fr/?page_id=3981</a><p>The advantage they have is a female plug, you can't physically break it like standard usb key (most of these keys are broken after a year).<p>But they're disappearing too, people tend to paint walls :)
A LAN shareparty without internet access might be a better way to revitalize the sneakernet. You could just use a httpd to share your files and let others download what they want over a 1GB LAN. Or use some file-sharing system locally and only locally.<p>Curiously enough, in a LAN party the IP addresses are much less critical than on the internet. If we assume that there were MAFIAA infiltrators listening on your local torrent swarms then nobody really knows whose computer is behind, say, 192.168.0.67: a dhcp server will distribute ips pretty randomly to different participants without querying who they are. Of course, some computers connected to the same router will see the corresponding MACs but following those would require the infiltrator to know which port of the router can be used to find a certain MAC and you don't really see that unless you have access to the router console.<p>Conversely, ISPs generally keep track of who's using which IP at a given moment eventhough the internet is global and one might think that any IP address will just disappear in the sea of endless numbers.
It doesn't look like anyone has explained the <i>real</i> danger of plugging into one of these.<p>Any malware, skeezy content, etc. can be avoided by simply not opening files and having your computer not autorun usb drives.
But the real issue (at least the one that always comes to my mind) is if, say, the "USB device" was just a male connector connected directly to wall power. This would at least fry your computer's USB, possibly more.<p>It would also be trivial to set up a simple circuit inside a USB drive casing to step up voltage and potentially fry your computer's ports.
It they think I'm going to hold my shiny new laptop awkwardly against a wall and get it all scratched up only to get it riddled with child porn and malware, they are sadly mistaken.
Could someone please explain the risks of plugging into a random USB device?<p>I see a handful of people alluding to risks (viz. "USB Condom") but I don't understand precisely what the issue is.<p>On Windows, presumably there's autorun.inf which can launch any executable on the USB drive. Is that correct? What about if you plug in from Unix or MacOS?<p>Bonus question: What are the risk factors, both for you and the host, if you charge your smart-phone in a stranger's laptop through USB?
I could see this actually working...but not as advertised. And not if advertised.<p>Just as dealers hit street corners and people still buy off them knowing the risk, secret USB ports (not all over Hacker News or advertised on a web page) could pass software to a group of people who have a high barrier for membership insofar as they trust the other members of the group.<p>But then, isn't this just what people used to do before the internet? Now it's "anonymous, offline, p2p file sharing"!
Not this crap again it's so old and only 5 people in the whole world do it. Someone else spammed this on HN last month. I guess it's not as bad as a "how our company learnt from being stupid" splog posts we see daily here.