• dance_ninja@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      Crazy that the USB-A housing is big enough for that. Makes me want to avoid anything that’s not C to C.

    • Jessica@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      That is amazing. The x-ray of it is kind of scary, honestly. That little chip could be all it would take to get into an air-gapped machine.

      • Bad_Engineering@fedia.io
        link
        fedilink
        arrow-up
        0
        ·
        3 months ago

        There are a ton of different payloads that can be run on these, for everything from simple keylogging, to root access, to network backdoors. I’ve only recently gotten into pentesting but with something like this there’s no real limit to the damage that could be done with only a few seconds of physical access.

        • thejml@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 months ago

          Honestly, as a Systems/DevOps engineer it’s always been well know that if you have physical access, you have zero chance of security. Sure it might take more time if precautions were followed, but you will be owned eventually, that’s guaranteed.

          • Dubiousx99@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 months ago

            This is one of our most frustrating fights I have with our security design reviewers. Effectively functionless mitigations that create extra obstacles for our service reps to deal with during troubleshooting. One example is our equipment is installed in access restricted areas, in a locked rack. We don’t need to disable unused Ethernet ports on our networking equipment that exists in a locked cabinet and it will take away our ability to repatch equipment to a different switch in the system to assist in troubleshooting.

    • d-RLY?@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      Came to check if anyone had already linked hak5. Glad to see you had shared the link!

  • Tetsuo@jlai.lu
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    There is also the whole “Bad USB” type of vulns that is pretty scary…

    • Tollana1234567@lemmy.today
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      assange, chelsea manning, the msm crucified these 2 as well. funny enough putin allows him to stay because hes useful propaganda.

      • in_my_honest_opinion@piefed.social
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        I wouldn’t include Assange in that list honestly. He was just out for himself in the end as he did muddy the waters in the 2016 election and was easily cajoled by the FSB to leak falsified documents and misinformation.

        Chelsea however was a fucking patriot who was pillaried by the state to be made example of. She literally did her patriotic duty and was imprisoned for it.

        • d-RLY?@lemmy.ml
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 months ago

          Maybe, might also be that since tech literacy has degraded since his leak. Which means that they don’t care because they are overwhelmed with the information that they don’t understand. Hell, I imagine that a lot of the press that where sent the information didn’t fully understand.

          The average person likely defaulted to what they always do, and just assumed that the leak meant the feds had to stop and treat it like any other historic reveal (example being stuff like COINTELPRO and believing that it was bad but isn’t done anymore). Hell, a shocking amount of libs honestly thought that Biden was going to bring Medicare for All (even though he said he wasn’t) just because he said “the Democratic Party is the party of healthcare” a few times.

          • chillpanzee@lemmy.ml
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 months ago

            I’m sure it’s a spectrum, and some people may legitimately not be aware, but its been 13 years. As a society, we’ve had ample time to get literate and develop knowledge. Instead we’ve had three presidents from both major parties hold the line that Snowden was a criminal for blowing the whistle on rampant illegal surveillance, and all 3 of them just stepped on the gas.

            Voters don’t even see the irony in the pedophiles’ ramping up the surveillance apparatus in the name of protecting the children.

    • Bunitonito@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      If you’re really paranoid you should buy all your stuff in a brick and mortar store. You’d have to be high up on a list for it to even be worth someone’s time, but intercepting a package and swapping the contents is pretty easy to do, typical Tuesday multi-agency gun ring bust for some postal inspectors

      • 「黃家駒 Wong Ka Kui」(he/him)@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        My older brother is abusive, and I need precautions to be safe.

        That’s my threat model.

        I actually would rather run a phone with stock OS with verified boot, rather than LineageOS but with bootloader unlocked. Evil Maid from someone you know wanting fuck around with you is more scary to me than government tbh

        (I don’t have a pixel for graphene)

        Edit: Also these cables cost like $200 online from HAK5. My brother definitely can pull some shit if he tried. He’s in Computer Science in college.

          • 「黃家駒 Wong Ka Kui」(he/him)@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 months ago

            Only with a few rare phones… most phones just gets bricked if you attempt to lock it under a custom os because they don’t support custom keys.

            Pixel supports it, but I don’t have a pixel. (If I did I would just use Graphene lol)

            New is expensive

            and I really distrust the used market… feels very sketchy and it could have hidden damage that doesn’t manifest itself until the return window is already passed (if they even allow a return at all), also I have a paranoia about getting an IMEI that a criminal have used and then cops come knocking thinking its ME doing the illegal activity (cuz you know they do the “oops wrong address” thing often and they’ve shot people to death over it )

  • abbadon420@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    America has a governmental deparment of CSS? No wonder your government is causing a Constant State of Suffering

  • Widdershins@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    I’ve been using wireless chargers for years. I find it “more secure” in the sense that my phone’s port is full of gunk and if I want to wake up with full batteries I can count on wireless a lot more.

    • HubertManne@piefed.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      I like wireless and magnetic mainly because fucking up the cable is like the most common thing I might do to a device. not saying I do it all the time but its the most likley break to happen.

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    I am not terribly worried about USB/thunderbolt attacks since Android requires authentication before it does anything.

        • 「黃家駒 Wong Ka Kui」(he/him)@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 months ago

          Shortcuts…

          A human on a keyboard attached to a device while its unlocked can navigate to a webpage just bypressing keys, so malicious USB can just do what a person can do, but automatically.

          It probably works much better on a computer after the user walks away, it’s a bit harder on a phone since most people instinctively presses the power button to turn off the screen so it autolocks (since you usually put it away in your pocket, so its muscle memory), but for a computer, there are certain people that just walks away to the bathroom or something and leave their device unlocked… so a person with access to a keyboard connected to that computer can do stuff on it… same as a script on a chip that sends keystrokes to the computer…

    • unit327@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      Lol, plug a usb mouse or keyboard into your android and it will just work. Anything you can do these things can do.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        My phone still requires auth to use plus there is no way for them to get what’s on the screen. I’m also pretty sure that typing a pin requires the screen but I could be mistaken.

        Even if there was a way to attack from USB, I still wouldn’t be that worried. USB attacks typically are only used against targeted individuals not some rando. The reason why you see warnings about chargers is because it makes easy clickbait.