TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Don't Plug Your Phone into a Charger You Don't Own

153 pointsby vinhnxalmost 12 years ago

19 comments

msyalmost 12 years ago
I'd pay decent money for a small, neat little power-only USB passthrough/condom for peace of mind. Hotel clocks, planes, there's all sorts of places I'd like to charge my phone and every time it feels like a risk.
评论 #6146543 未加载
评论 #6150085 未加载
评论 #6147026 未加载
评论 #6146444 未加载
评论 #6146685 未加载
评论 #6147971 未加载
评论 #6147077 未加载
评论 #6146722 未加载
评论 #6146481 未加载
评论 #6150486 未加载
joshuahedlundalmost 12 years ago
&gt; It turns out that any device you connect with an iOS via the USB port can obtain your device&#x27;s Universal Device ID (UDID), as long as the device isn&#x27;t passcode-locked<p>&gt; The only defense is a very simple rule: don&#x27;t plug your phone into a charger you don&#x27;t own<p>These statements seem contradictory to me, unless I&#x27;m missing something. Shouldn&#x27;t it be, &quot;don&#x27;t unlock your phone while it&#x27;s plugged into a charger you don&#x27;t own&quot;? Or are they saying there are still vulnerabilities without the charger getting access to the UDID?
评论 #6147957 未加载
评论 #6147227 未加载
评论 #6147006 未加载
stevenracealmost 12 years ago
Paper: <a href="https://media.blackhat.com/us-13/US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-WP.pdf" rel="nofollow">https:&#x2F;&#x2F;media.blackhat.com&#x2F;us-13&#x2F;US-13-Lau-Mactans-Injecting...</a><p>Slides: <a href="https://media.blackhat.com/us-13/US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-Slides.pdf" rel="nofollow">https:&#x2F;&#x2F;media.blackhat.com&#x2F;us-13&#x2F;US-13-Lau-Mactans-Injecting...</a>
nwhalmost 12 years ago
You could alternatively use a USB condom; just a cable with the data lines completely removed.<p>(Well, for an iPhone they&#x27;d need to be tied together with a resistor in the other end, but the idea is still the same.)
评论 #6146470 未加载
评论 #6146424 未加载
评论 #6149836 未加载
评论 #6146839 未加载
jgrahamcalmost 12 years ago
I was on a BA Boeing 777 the other day and the seat back entertainment system had a USB socket on it for me to plug in my own device.<p>All I could think was (a) why would I do that? and (b) that looks like a security vulnerability.
评论 #6146947 未加载
评论 #6148029 未加载
616calmost 12 years ago
It is interesting because there was concern about rooted phones, especially for people like me, because I left ADB debug mode on. For the uninitiated, this USB bridge is like a serial connection that can, among a lot of things, open a terminal on the device.<p>The newest versions of ADB mode in Android have settings to address this. But at the time this was a big deal in the Android community (or I should say XDA), one recognized dev developed an app for it.<p><a href="https://play.google.com/store/apps/details?id=com.stericson.adbSecure&amp;hl=en" rel="nofollow">https:&#x2F;&#x2F;play.google.com&#x2F;store&#x2F;apps&#x2F;details?id=com.stericson....</a><p>I am glad all phone platforms are getting wise to these things.
xedariusalmost 12 years ago
I knew there was a good reason XCode kept telling me it couldn&#x27;t launch my app as the device was locked. So unless I missed something, if the device is locked this hack doesn&#x27;t work.
评论 #6150405 未加载
elifalmost 12 years ago
This title is a bit misleading.<p>It should be &#x27;don&#x27;t plug your iphone into a charger you don&#x27;t own&#x27;<p>the other 90% of us are unaffected by this hack.
评论 #6150733 未加载
Someonealmost 12 years ago
Why only those you don&#x27;t own? For all I know, the north Koreans&#x2F;Mossad&#x2F;NSA&#x2F;Chinese government&#x2F;... (Pick whoever you want as the villain) could have planted this functionality in every USB adapter Apple&#x2F;brand X (pick whoever you feel could fall for this) sells.
评论 #6146581 未加载
DavidWanjirualmost 12 years ago
Instead of carrying a power pack or USB condom and what not, isn&#x27;t it just easier to carry the charger you trust? After all, it&#x27;s the untrusted charger you want to avoid, no?
cjrpalmost 12 years ago
A few of these plugged in at airport boarding areas with a &quot;For your convenience&quot; sign would be very successful.
molbioguyalmost 12 years ago
I thought developer accounts were limited to 100 test devices per year. Does this get around that limit?
danielhughesalmost 12 years ago
It would be nice if phone manufacturers would simply separate the power and data ports into two. Designers probably cringe at that suggestion because it would interrupt the sleek form factor but isn&#x27;t it the best possible solution to this security risk?
评论 #6146705 未加载
评论 #6148061 未加载
sherazalmost 12 years ago
Wow -- this hadn&#x27;t even crossed my mind. Regarding Android devices (mine included):<p>Could I just hide a tiny linux OS inside a charger? Then when someone plugs in the device just auto-mounts the SD card and copies away? Is it that simple?
评论 #6146616 未加载
uptownalmost 12 years ago
I&#x27;ve always wondered how safe those dirt-cheap USB hubs on eBay are. Seems like a potential attack vector for unsuspecting buyers where you also likely know the name and address of the victim from shipping it to them.
tszmingalmost 12 years ago
If you can order from Taobao (China) directly, here is the device I bought last week: <a href="http://detail.tmall.com/item.htm?spm=a230r.1.14.27.Op5P4y&amp;id=21996816947" rel="nofollow">http:&#x2F;&#x2F;detail.tmall.com&#x2F;item.htm?spm=a230r.1.14.27.Op5P4y&amp;id...</a> (not affiliated, around $0.8 USD).<p>Another added advantage in using the device is it can double the current output from my Macbook Air USB port, i.e. from 500ma to 1000ma, so now I can fully charge my Samsung S4 within 4 hrs (as compared to 7-8 hrs previously).
fnayralmost 12 years ago
I don&#x27;t understand the threat.<p>All it does is install a provisioning profile on the device to allow it to install any app it wants, that can make private API calls that would normally be rejected by Apple if they tried to submit the app.<p>So essentially, it allows them to install apps that have the exact same restrictions as apps for jailbroken devices. Or do I have it wrong?
评论 #6146652 未加载
batemanesquealmost 12 years ago
on the subject: <a href="http://www.macobserver.com/tmo/article/apple-fixes-threat-from-fake-iphone-chargers-in-ios-7" rel="nofollow">http:&#x2F;&#x2F;www.macobserver.com&#x2F;tmo&#x2F;article&#x2F;apple-fixes-threat-fr...</a>
schtevalmost 12 years ago
Just use a wall socket adapter. Problem solved.
评论 #6150244 未加载