Pro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 2 days agoModern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attackscyberinsider.comexternal-linkmessage-square13fedilinkarrow-up135arrow-down12file-text
arrow-up133arrow-down1external-linkModern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attackscyberinsider.comPro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square13fedilinkfile-text
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up1·1 day agoIf you have a very sensitive threat model, it can also limit charging to only when the device is off. Which is the most secure form of charging
If you have a very sensitive threat model, it can also limit charging to only when the device is off. Which is the most secure form of charging