Pro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 6 days agoModern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attackscyberinsider.comexternal-linkmessage-square14fedilinkarrow-up139arrow-down12file-text
arrow-up137arrow-down1external-linkModern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attackscyberinsider.comPro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square14fedilinkfile-text
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up2·5 days agoIf you have a very sensitive threat model, it can also limit charging to only when the device is off. Which is the most secure form of charging
If you have a very sensitive threat model, it can also limit charging to only when the device is off. Which is the most secure form of charging